Skip to content

fix: add code signing requirements to xpc connections #206

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: ethan/networking-in-launchdaemon
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions Coder-Desktop/Coder-Desktop/AppHelperXPCClient.swift
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ import VPNLib
_ = self.connect()
}
logger.info("connecting to \(helperAppMachServiceName)")
connection.setCodeSigningRequirement(Validator.xpcPeerRequirement)
connection.resume()
self.connection = connection
return connection
Expand Down
2 changes: 2 additions & 0 deletions Coder-Desktop/Coder-DesktopHelper/HelperXPCListeners.swift
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ class HelperNEXPCServer: NSObject, NSXPCListenerDelegate, @unchecked Sendable {
conns.removeAll { $0 == newConnection }
logger.debug("connection interrupted")
}
newConnection.setCodeSigningRequirement(Validator.xpcPeerRequirement)
newConnection.resume()
conns.append(newConnection)
return true
Expand Down Expand Up @@ -145,6 +146,7 @@ class HelperAppXPCServer: NSObject, NSXPCListenerDelegate, @unchecked Sendable {
conns.removeAll { $0 == newConnection }
logger.debug("app connection invalidated")
}
newConnection.setCodeSigningRequirement(Validator.xpcPeerRequirement)
newConnection.resume()
conns.append(newConnection)
return true
Expand Down
1 change: 1 addition & 0 deletions Coder-Desktop/VPN/NEHelperXPCClient.swift
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ final class HelperXPCClient: @unchecked Sendable {
connection.interruptionHandler = { [weak self] in
self?.connection = nil
}
connection.setCodeSigningRequirement(Validator.xpcPeerRequirement)
connection.resume()
self.connection = connection
return connection
Expand Down
124 changes: 0 additions & 124 deletions Coder-Desktop/VPNLib/Download.swift
Original file line number Diff line number Diff line change
@@ -1,130 +1,6 @@
import CryptoKit
import Foundation

public enum ValidationError: Error {
case fileNotFound
case unableToCreateStaticCode
case invalidSignature
case unableToRetrieveInfo
case invalidIdentifier(identifier: String?)
case invalidTeamIdentifier(identifier: String?)
case missingInfoPList
case invalidVersion(version: String?)
case belowMinimumCoderVersion

public var description: String {
switch self {
case .fileNotFound:
"The file does not exist."
case .unableToCreateStaticCode:
"Unable to create a static code object."
case .invalidSignature:
"The file's signature is invalid."
case .unableToRetrieveInfo:
"Unable to retrieve signing information."
case let .invalidIdentifier(identifier):
"Invalid identifier: \(identifier ?? "unknown")."
case let .invalidVersion(version):
"Invalid runtime version: \(version ?? "unknown")."
case let .invalidTeamIdentifier(identifier):
"Invalid team identifier: \(identifier ?? "unknown")."
case .missingInfoPList:
"Info.plist is not embedded within the dylib."
case .belowMinimumCoderVersion:
"""
The Coder deployment must be version \(Validator.minimumCoderVersion)
or higher to use Coder Desktop.
"""
}
}

public var localizedDescription: String { description }
}

public class Validator {
// Whilst older dylibs exist, this app assumes v2.20 or later.
public static let minimumCoderVersion = "2.20.0"

private static let expectedName = "CoderVPN"
private static let expectedIdentifier = "com.coder.Coder-Desktop.VPN.dylib"
private static let expectedTeamIdentifier = "4399GN35BJ"

private static let infoIdentifierKey = "CFBundleIdentifier"
private static let infoNameKey = "CFBundleName"
private static let infoShortVersionKey = "CFBundleShortVersionString"

private static let signInfoFlags: SecCSFlags = .init(rawValue: kSecCSSigningInformation)

// `expectedVersion` must be of the form `[0-9]+.[0-9]+.[0-9]+`
public static func validate(path: URL, expectedVersion: String) throws(ValidationError) {
guard FileManager.default.fileExists(atPath: path.path) else {
throw .fileNotFound
}

var staticCode: SecStaticCode?
let status = SecStaticCodeCreateWithPath(path as CFURL, SecCSFlags(), &staticCode)
guard status == errSecSuccess, let code = staticCode else {
throw .unableToCreateStaticCode
}

let validateStatus = SecStaticCodeCheckValidity(code, SecCSFlags(), nil)
guard validateStatus == errSecSuccess else {
throw .invalidSignature
}

var information: CFDictionary?
let infoStatus = SecCodeCopySigningInformation(code, signInfoFlags, &information)
guard infoStatus == errSecSuccess, let info = information as? [String: Any] else {
throw .unableToRetrieveInfo
}

guard let identifier = info[kSecCodeInfoIdentifier as String] as? String,
identifier == expectedIdentifier
else {
throw .invalidIdentifier(identifier: info[kSecCodeInfoIdentifier as String] as? String)
}

guard let teamIdentifier = info[kSecCodeInfoTeamIdentifier as String] as? String,
teamIdentifier == expectedTeamIdentifier
else {
throw .invalidTeamIdentifier(
identifier: info[kSecCodeInfoTeamIdentifier as String] as? String
)
}

guard let infoPlist = info[kSecCodeInfoPList as String] as? [String: AnyObject] else {
throw .missingInfoPList
}

try validateInfo(infoPlist: infoPlist, expectedVersion: expectedVersion)
}

private static func validateInfo(infoPlist: [String: AnyObject], expectedVersion: String) throws(ValidationError) {
guard let plistIdent = infoPlist[infoIdentifierKey] as? String, plistIdent == expectedIdentifier else {
throw .invalidIdentifier(identifier: infoPlist[infoIdentifierKey] as? String)
}

guard let plistName = infoPlist[infoNameKey] as? String, plistName == expectedName else {
throw .invalidIdentifier(identifier: infoPlist[infoNameKey] as? String)
}

// Downloaded dylib must match the version of the server
guard let dylibVersion = infoPlist[infoShortVersionKey] as? String,
expectedVersion == dylibVersion
else {
throw .invalidVersion(version: infoPlist[infoShortVersionKey] as? String)
}

// Downloaded dylib must be at least the minimum Coder server version
guard let dylibVersion = infoPlist[infoShortVersionKey] as? String,
// x.compare(y) is .orderedDescending if x > y
minimumCoderVersion.compare(dylibVersion, options: .numeric) != .orderedDescending
else {
throw .belowMinimumCoderVersion
}
}
}

public func download(
src: URL,
dest: URL,
Expand Down
128 changes: 128 additions & 0 deletions Coder-Desktop/VPNLib/Validate.swift
Original file line number Diff line number Diff line change
@@ -0,0 +1,128 @@
import Foundation

public enum ValidationError: Error {
case fileNotFound
case unableToCreateStaticCode
case invalidSignature
case unableToRetrieveInfo
case invalidIdentifier(identifier: String?)
case invalidTeamIdentifier(identifier: String?)
case missingInfoPList
case invalidVersion(version: String?)
case belowMinimumCoderVersion

public var description: String {
switch self {
case .fileNotFound:
"The file does not exist."
case .unableToCreateStaticCode:
"Unable to create a static code object."
case .invalidSignature:
"The file's signature is invalid."
case .unableToRetrieveInfo:
"Unable to retrieve signing information."
case let .invalidIdentifier(identifier):
"Invalid identifier: \(identifier ?? "unknown")."
case let .invalidVersion(version):
"Invalid runtime version: \(version ?? "unknown")."
case let .invalidTeamIdentifier(identifier):
"Invalid team identifier: \(identifier ?? "unknown")."
case .missingInfoPList:
"Info.plist is not embedded within the dylib."
case .belowMinimumCoderVersion:
"""
The Coder deployment must be version \(Validator.minimumCoderVersion)
or higher to use Coder Desktop.
"""
}
}

public var localizedDescription: String { description }
}

public class Validator {
// Whilst older dylibs exist, this app assumes v2.20 or later.
public static let minimumCoderVersion = "2.20.0"

private static let expectedName = "CoderVPN"
private static let expectedIdentifier = "com.coder.Coder-Desktop.VPN.dylib"
private static let expectedTeamIdentifier = "4399GN35BJ"

private static let infoIdentifierKey = "CFBundleIdentifier"
private static let infoNameKey = "CFBundleName"
private static let infoShortVersionKey = "CFBundleShortVersionString"

private static let signInfoFlags: SecCSFlags = .init(rawValue: kSecCSSigningInformation)

// `expectedVersion` must be of the form `[0-9]+.[0-9]+.[0-9]+`
public static func validate(path: URL, expectedVersion: String) throws(ValidationError) {
guard FileManager.default.fileExists(atPath: path.path) else {
throw .fileNotFound
}

var staticCode: SecStaticCode?
let status = SecStaticCodeCreateWithPath(path as CFURL, SecCSFlags(), &staticCode)
guard status == errSecSuccess, let code = staticCode else {
throw .unableToCreateStaticCode
}

let validateStatus = SecStaticCodeCheckValidity(code, SecCSFlags(), nil)
guard validateStatus == errSecSuccess else {
throw .invalidSignature
}

var information: CFDictionary?
let infoStatus = SecCodeCopySigningInformation(code, signInfoFlags, &information)
guard infoStatus == errSecSuccess, let info = information as? [String: Any] else {
throw .unableToRetrieveInfo
}

guard let identifier = info[kSecCodeInfoIdentifier as String] as? String,
identifier == expectedIdentifier
else {
throw .invalidIdentifier(identifier: info[kSecCodeInfoIdentifier as String] as? String)
}

guard let teamIdentifier = info[kSecCodeInfoTeamIdentifier as String] as? String,
teamIdentifier == expectedTeamIdentifier
else {
throw .invalidTeamIdentifier(
identifier: info[kSecCodeInfoTeamIdentifier as String] as? String
)
}

guard let infoPlist = info[kSecCodeInfoPList as String] as? [String: AnyObject] else {
throw .missingInfoPList
}

try validateInfo(infoPlist: infoPlist, expectedVersion: expectedVersion)
}

public static let xpcPeerRequirement = "anchor apple generic" + // Apple-issued certificate chain
" and certificate leaf[subject.OU] = \"" + expectedTeamIdentifier + "\"" // Signed by the Coder team
Comment on lines +101 to +102
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably should go onto it's own class since it seems unrelated to the binary signature validation.


private static func validateInfo(infoPlist: [String: AnyObject], expectedVersion: String) throws(ValidationError) {
guard let plistIdent = infoPlist[infoIdentifierKey] as? String, plistIdent == expectedIdentifier else {
throw .invalidIdentifier(identifier: infoPlist[infoIdentifierKey] as? String)
}

guard let plistName = infoPlist[infoNameKey] as? String, plistName == expectedName else {
throw .invalidIdentifier(identifier: infoPlist[infoNameKey] as? String)
}

// Downloaded dylib must match the version of the server
guard let dylibVersion = infoPlist[infoShortVersionKey] as? String,
expectedVersion == dylibVersion
else {
throw .invalidVersion(version: infoPlist[infoShortVersionKey] as? String)
}

// Downloaded dylib must be at least the minimum Coder server version
guard let dylibVersion = infoPlist[infoShortVersionKey] as? String,
// x.compare(y) is .orderedDescending if x > y
minimumCoderVersion.compare(dylibVersion, options: .numeric) != .orderedDescending
else {
throw .belowMinimumCoderVersion
}
}
}
Loading