github.com/k1rill-fedoseev/go-ethereum@v1.9.7/cmd/clef/docs/setup.md (about)

     1  # Setting up Clef
     2  
     3  This document describes how Clef can be used in a more secure manner than executing it from your everyday laptop, 
     4  in order to ensure that the keys remain safe in the event that your computer should get compromised. 
     5  
     6  ## Qubes OS
     7  
     8  
     9  ### Background 
    10  
    11  The Qubes operating system is based around virtual machines (qubes), where a set of virtual machines are configured, typically for 
    12  different purposes such as:
    13  
    14  - personal
    15     - Your personal email, browsing etc
    16  - work
    17    - Work email etc
    18  - vault
    19    - a VM without network access, where gpg-keys and/or keepass credentials are stored. 
    20  
    21  A couple of dedicated virtual machines handle externalities:
    22  
    23  - sys-net provides networking to all other (network-enabled) machines
    24  - sys-firewall handles firewall rules
    25  - sys-usb handles USB devices, and can map usb-devices to certain qubes.
    26  
    27  The goal of this document is to describe how we can set up clef to provide secure transaction
    28  signing from a `vault` vm, to another networked qube which runs Dapps.
    29  
    30  ### Setup
    31  
    32  There are two ways that this can be achieved: integrated via Qubes or integrated via networking. 
    33  
    34  
    35  #### 1. Qubes Integrated
    36  
    37  Qubes provdes a facility for inter-qubes communication via `qrexec`. A qube can request to make a cross-qube RPC request 
    38  to another qube. The OS then asks the user if the call is permitted. 
    39  
    40  ![Example](qubes/qrexec-example.png)
    41  
    42  A policy-file can be created to allow such interaction. On the `target` domain, a service is invoked which can read the
    43  `stdin` from the `client` qube. 
    44  
    45  This is how [Split GPG](https://www.qubes-os.org/doc/split-gpg/) is implemented. We can set up Clef the same way:
    46  
    47  ##### Server
    48  
    49  ![Clef via qrexec](qubes/clef_qubes_qrexec.png)
    50  
    51  On the `target` qubes, we need to define the rpc service.
    52  
    53  [qubes.Clefsign](qubes/qubes.Clefsign):
    54  
    55  ```bash
    56  #!/bin/bash
    57  
    58  SIGNER_BIN="/home/user/tools/clef/clef"
    59  SIGNER_CMD="/home/user/tools/gtksigner/gtkui.py -s $SIGNER_BIN"
    60  
    61  # Start clef if not already started
    62  if [ ! -S /home/user/.clef/clef.ipc ]; then
    63  	$SIGNER_CMD &
    64  	sleep 1
    65  fi
    66  
    67  # Should be started by now
    68  if [ -S /home/user/.clef/clef.ipc ]; then
    69      # Post incoming request to HTTP channel
    70  	curl -H "Content-Type: application/json" -X POST -d @- http://localhost:8550 2>/dev/null
    71  fi
    72  
    73  ```
    74  This RPC service is not complete (see notes about HTTP headers below), but works as a proof-of-concept. 
    75  It will forward the data received on `stdin` (forwarded by the OS) to Clef's HTTP channel.  
    76  
    77  It would have been possible to send data directly to the `/home/user/.clef/.clef.ipc` 
    78  socket via e.g `nc -U /home/user/.clef/clef.ipc`, but the reason for sending the request 
    79  data over `HTTP` instead of `IPC` is that we want the ability to forward `HTTP` headers.
    80  
    81  To enable the service:
    82  
    83  ``` bash
    84  sudo cp qubes.Clefsign /etc/qubes-rpc/
    85  sudo chmod +x /etc/qubes-rpc/ qubes.Clefsign
    86  ```
    87  
    88  This setup uses [gtksigner](https://github.com/holiman/gtksigner), which is a very minimal GTK-based UI that works well 
    89  with minimal requirements. 
    90  
    91  ##### Client
    92  
    93  
    94  On the `client` qube, we need to create a listener which will receive the request from the Dapp, and proxy it. 
    95  
    96  
    97  [qubes-client.py](qubes/client/qubes-client.py):
    98  
    99  ```python
   100  
   101  """
   102  This implements a dispatcher which listens to localhost:8550, and proxies
   103  requests via qrexec to the service qubes.EthSign on a target domain
   104  """
   105  
   106  import http.server
   107  import socketserver,subprocess
   108  
   109  PORT=8550
   110  TARGET_DOMAIN= 'debian-work'
   111  
   112  class Dispatcher(http.server.BaseHTTPRequestHandler):
   113      def do_POST(self):
   114          post_data = self.rfile.read(int(self.headers['Content-Length']))
   115          p = subprocess.Popen(['/usr/bin/qrexec-client-vm',TARGET_DOMAIN,'qubes.Clefsign'],stdin=subprocess.PIPE, stdout=subprocess.PIPE)
   116          output = p.communicate(post_data)[0]
   117          self.wfile.write(output)
   118  
   119  
   120  with socketserver.TCPServer(("",PORT), Dispatcher) as httpd:
   121      print("Serving at port", PORT)
   122      httpd.serve_forever()
   123  
   124  
   125  ```
   126  
   127  #### Testing
   128  
   129  To test the flow, if we have set up `debian-work` as the `target`, we can do
   130   
   131  ```bash
   132  $ cat newaccnt.json 
   133  { "id": 0, "jsonrpc": "2.0","method": "account_new","params": []}
   134  
   135  $ cat newaccnt.json| qrexec-client-vm debian-work qubes.Clefsign
   136  ```
   137  
   138  This should pop up first a dialog to allow the IPC call:
   139  
   140  ![one](qubes/qubes_newaccount-1.png)
   141  
   142  Followed by a GTK-dialog to approve the operation
   143  
   144  ![two](qubes/qubes_newaccount-2.png)
   145  
   146  To test the full flow, we use the client wrapper. Start it on the `client` qube:
   147  ```
   148  [user@work qubes]$ python3 qubes-client.py 
   149  ```
   150  
   151  Make the request over http (`client` qube):
   152  ```
   153  [user@work clef]$ cat newaccnt.json | curl -X POST -d @- http://localhost:8550
   154  ```
   155  And it should show the same popups again. 
   156  
   157  ##### Pros and cons
   158  
   159  The benefits of this setup are:
   160  
   161  - This is the qubes-os intended model for inter-qube communication,
   162  - and thus benefits from qubes-os dialogs and policies for user approval
   163  
   164  However, it comes with a couple of drawbacks:
   165  
   166  - The `qubes-gpg-client` must forward the http request via RPC to the `target` qube. When doing so, the proxy
   167    will either drop important headers, or replace them. 
   168    - The `Host` header is most likely `localhost` 
   169    - The `Origin` header must be forwarded
   170    - Information about the remote ip must be added as a `X-Forwarded-For`. However, Clef cannot always trust an `XFF` header, 
   171    since malicious clients may lie about `XFF` in order to fool the http server into believing it comes from another address.
   172  - Even with a policy in place to allow rpc-calls between `caller` and `target`, there will be several popups:
   173    - One qubes-specific where the user specifies the `target` vm
   174    - One clef-specific to approve the transaction
   175    
   176  
   177  #### 2. Network integrated
   178  
   179  The second way to set up Clef on a qubes system is to allow networking, and have Clef listen to a port which is accessible
   180  form other qubes. 
   181  
   182  ![Clef via http](qubes/clef_qubes_http.png)
   183  
   184  
   185  
   186  
   187  ## USBArmory
   188  
   189  The [USB armory](https://inversepath.com/usbarmory) is an open source hardware design with an 800 Mhz ARM processor. It is a pocket-size
   190  computer. When inserted into a laptop, it identifies itself as a USB network interface, basically adding another network
   191  to your computer. Over this new network interface, you can SSH into the device. 
   192  
   193  Running Clef off a USB armory means that you can use the armory as a very versatile offline computer, which only
   194  ever connects to a local network between your computer and the device itself.
   195  
   196  Needless to say, the while this model should be fairly secure against remote attacks, an attacker with physical access
   197  to the USB Armory would trivially be able to extract the contents of the device filesystem. 
   198