mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-12-21 20:31:33 -05:00
Secure Time Synchronization on macOS (#139)
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
e5993f32be
commit
d7a8bd7849
@ -386,6 +386,8 @@ If decide on using NTS with chronyd, consider using multiple, independent time p
|
||||
|
||||
GrapheneOS uses a [quite nice chrony configuration](https://github.com/GrapheneOS/infrastructure/blob/main/chrony.conf) for their infrastructure. I recommend that you replicate their `chrony.conf` on your system.
|
||||
|
||||
![Verifying NTS configuration](/images/nts.png)
|
||||
|
||||
### Pluggable Authentication Modules (PAM)
|
||||
|
||||
[PAM](https://wiki.archlinux.org/title/PAM)'s [settings can be hardened](https://madaidans-insecurities.github.io/guides/linux-hardening.html#pam) to improve authentication security (though keep in mind the bypassable nature of PAM as opposed to encryption).
|
||||
|
193
content/posts/macos/Secure Time Synchronization on macOS.md
Normal file
193
content/posts/macos/Secure Time Synchronization on macOS.md
Normal file
@ -0,0 +1,193 @@
|
||||
---
|
||||
title: "Secure Time Synchronization on macOS"
|
||||
date: 2023-06-25
|
||||
tags: ['macOS', 'Security']
|
||||
author: Tommy
|
||||
---
|
||||
|
||||
![macOS NTP](/images/macos-ntp.png)
|
||||
|
||||
macOS by default uses the unencrypted and unauthenticated Network Time Protocol (NTP) for time synchronization. A popular solution to mitigate problem this is to use [ChronyControl](https://whatroute.net/chronycontrol.html) to setup NTS. However, the application requires administrator privileges, which less than ideal.
|
||||
|
||||
In this post, I will go over how you leverage virtualization to setup a local Linux server, update its time using NTS, and synchronize your macOS host with it using NTP, all without needing a privileged application.
|
||||
|
||||
## Installing UTM
|
||||
|
||||
The virtualization software we are going for this setup is [UTM](https://mac.getutm.app/). You can obtain it through [App Store](https://apps.apple.com/us/app/utm-virtual-machines/id1538878817) for $10 USD or directly through [GitHub](https://github.com/utmapp/UTM/releases) free of charge.
|
||||
|
||||
Personally, I would recommend using the App Store, since you are getting automatic updates with it, and a small donation would really help out the developers.
|
||||
|
||||
Note that I am recommending UTM here over other solutions like [Parallels](https://www.parallels.com/) here, specifically for the [Emulated VLAN](https://docs.getutm.app/settings-qemu/devices/network/network/#network-mode) network setup. Parallels only supports the [Shared Network mode](https://kb.parallels.com/4948) where all VMs and the host are connected to the same VLAN, which is less that ideal considering that we will still communicate with our Linux server using the insecure NTP protocol. I have not tried VMWare Fusion or VirtualBox yet, but the general idea is that you should be connecting to the NTP server using a private interface which only the host and the target VM have access to. Another nice thing about UTM is that it is a [sandboxed](https://developer.apple.com/documentation/xcode/configuring-the-macos-app-sandbox/) application and runs without any special privileges.
|
||||
|
||||
## Choosing your Linux distribution
|
||||
|
||||
Generally, any distribution with `chrony` 4.0 or above would work fine. I recommend using Fedora since it is easy to manage, generally up to date, and has mostly sane defaults.
|
||||
|
||||
You download Fedora Server from their [official website](https://fedoraproject.org/server/download/).
|
||||
|
||||
## Setting up the virtual machine
|
||||
|
||||
Next, create your Linux VM in UTM. Make sure that you use the QEMU backend (as opposed to Apple Virtualization), set the Network Mode to Emulated VLAN, and port forward port `123/UDP` and `22/TCP`.
|
||||
|
||||
![macOS NTP Port Forwarding](/images/macos-ntp-port-forwarding.png)
|
||||
|
||||
Optionally, you can also:
|
||||
* Set the CPU allocation to 2 vCPUs. The NTP server does not need access to all of your performance cores.
|
||||
* Reduce the allocated Memory to 2048. This is a fairly lightweight server.
|
||||
* Enable memory ballooning.
|
||||
* Use local time for base clock.
|
||||
|
||||
Next, install your operating system. If you are using Fedora, I recommend going with the "Minimal Install" option.
|
||||
|
||||
## Post operating system installation
|
||||
|
||||
Once the operating system is installed, shut down the VM. Remove "USB Drive" from your VM configuration to ensure that you have the correct boot order.
|
||||
|
||||
You can also remove other unncessary features from the VM for attack surface reduction:
|
||||
|
||||
* Disable USB support
|
||||
* Disable Clipboard sharing
|
||||
* Delete the display device (we will run the server headless)
|
||||
* Delete the audio device
|
||||
|
||||
Start the VM, then SSH into it via `127.0.0.1`:
|
||||
|
||||
```bash
|
||||
ssh 127.0.0.1
|
||||
```
|
||||
|
||||
Update the OS:
|
||||
|
||||
```bash
|
||||
#This is an example for Fedora:
|
||||
sudo dnf upgrade -y
|
||||
```
|
||||
|
||||
You can also consider installing the `qemu-guest-agent`. It will help against insane clocks caused by snapshotting and rolling back if UTM implements these features in the future.
|
||||
|
||||
```bash
|
||||
#This is an example for Fedora:
|
||||
sudo dnf install qemu-guest-agent -y
|
||||
```
|
||||
|
||||
If your operating system comes with `systemd-timesyncd` instead of `chrony` by default (as is the case with Ubuntu and Arch Linux), disable it and replace it with `chrony`. Fedora users can skip this step, since it already uses `chrony` by default.
|
||||
|
||||
```bash
|
||||
#This is an example for Ubuntu:
|
||||
sudo systemctl disable --now systemd-timesyncd
|
||||
sudo apt purge -y systemd-timesyncd
|
||||
sudo apt install -y chrony
|
||||
sudo systemctl enable --now chronyd
|
||||
```
|
||||
|
||||
Enable automatic updates:
|
||||
|
||||
```bash
|
||||
#This is an example for Fedora:
|
||||
sudo dnf install dnf-automatic
|
||||
sudo sed -i 's/apply_updates = no/apply_updates = yes\nreboot = when-needed/g' /etc/dnf/automatic.conf
|
||||
sudo systemctl enable --now dnf-automatic.timer
|
||||
```
|
||||
|
||||
## Configuring `chrony`
|
||||
|
||||
Next, configure `chrony` to use NTS. On Fedora, the configuration file is `/etc/chrony.conf`. We will use [GrapheneOS's configuration](https://github.com/GrapheneOS/infrastructure/blob/main/chrony.conf) as a reference.
|
||||
|
||||
Your configuration should look something like this:
|
||||
|
||||
```
|
||||
server time.cloudflare.com iburst nts
|
||||
server ntppool1.time.nl iburst nts
|
||||
server nts.netnod.se iburst nts
|
||||
server ptbtime1.ptb.de iburst nts
|
||||
|
||||
minsources 2
|
||||
authselectmode require
|
||||
|
||||
driftfile /var/lib/chrony/drift
|
||||
ntsdumpdir /var/lib/chrony
|
||||
|
||||
leapsectz right/UTC
|
||||
makestep 1.0 3
|
||||
|
||||
rtconutc
|
||||
rtcsync
|
||||
|
||||
cmdport 0
|
||||
|
||||
allow 10.0.2.2/32
|
||||
```
|
||||
|
||||
If you are confused about what this configuration is doing, here are some quick explanations:
|
||||
|
||||
* We get our time from 4 different sources:
|
||||
|
||||
```
|
||||
server time.cloudflare.com iburst nts
|
||||
server ntppool1.time.nl iburst nts
|
||||
server nts.netnod.se iburst nts
|
||||
server ptbtime1.ptb.de iburst nts
|
||||
```
|
||||
|
||||
* Should there be a discrepancy, a time change will only happen if at least 2 sources agree on it:
|
||||
|
||||
```
|
||||
minsources 2
|
||||
```
|
||||
|
||||
* Lastly, we add this line to the configuration file to allow macOS to get time from it:
|
||||
|
||||
```
|
||||
allow 10.0.2.2/32
|
||||
```
|
||||
|
||||
Note that `10.0.2.2/32` is the default IP address of the macOS host from the virtual machine's perspective. If you changed the Host Address using the Advanced Settings in the virtual machine's network configuration, you need to adjust it accordingly here.
|
||||
|
||||
Once you are happy with the configuration, restart `chronyd`:
|
||||
|
||||
```bash
|
||||
sudo systemctl restart chronyd
|
||||
```
|
||||
|
||||
Verify that NTS is working:
|
||||
|
||||
```
|
||||
sudo chronyc -N authdata
|
||||
```
|
||||
|
||||
![Verifying NTS configuration](/images/nts.png)
|
||||
|
||||
## Open the firewall
|
||||
|
||||
We will need to open port 123/udp inside of the virtual machine to allow connections from the macOS host:
|
||||
|
||||
```bash
|
||||
#This is an example for Fedora:
|
||||
sudo firewall-cmd --permanent --add-service=ntp
|
||||
sudo firewall-cmd --reload
|
||||
```
|
||||
|
||||
## Use the NTP server with macOS
|
||||
|
||||
Now, we can use our NTP server as the time server for your macOS. Set the time source to `127.0.0.1` in your macOS settings:
|
||||
|
||||
![macOS time source](/images/macos-time-source.png)
|
||||
|
||||
Verify that NTP works on your macOS host:
|
||||
|
||||
```
|
||||
sntp 127.0.0.1
|
||||
```
|
||||
|
||||
![macOS SNTP verification](/images/macos-sntp-verification.png)
|
||||
|
||||
Once you have verified that everything is working, you can optionally remove the port `22/TCP` forwarding since we will no longer need it.
|
||||
|
||||
## Automatically start the NTP server at boot
|
||||
|
||||
Finally, follow the [official documentation](https://docs.getutm.app/advanced/remote-control/) to automatically start the virtual machine at boot.
|
||||
|
||||
Note that for some reason, adding the shortcut to "Login Items" alone is not enough - UTM will launch but it will not start the VM. UTM also needs to be added to the list of "Login Items" for this to work properly. You can follow the discussion regarding this on [GitHub](https://github.com/utmapp/UTM/issues/4179#issuecomment-1606041021).
|
||||
|
||||
|
||||
![macOS login items](/images/macos-login-items.png)
|
7
content/posts/macos/_index.md
Normal file
7
content/posts/macos/_index.md
Normal file
@ -0,0 +1,7 @@
|
||||
---
|
||||
title: macOS
|
||||
ShowReadingTime: false
|
||||
ShowWordCount: false
|
||||
---
|
||||
|
||||
A collection of posts about macOS and related applications. macOS hardening guides can be found here.
|
BIN
static/images/macos-login-items.png
Normal file
BIN
static/images/macos-login-items.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 664 KiB |
BIN
static/images/macos-ntp-port-forwarding.png
Normal file
BIN
static/images/macos-ntp-port-forwarding.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 742 KiB |
BIN
static/images/macos-ntp.png
Normal file
BIN
static/images/macos-ntp.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 3.5 MiB |
BIN
static/images/macos-sntp-verification.png
Normal file
BIN
static/images/macos-sntp-verification.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 366 KiB |
BIN
static/images/macos-time-source.png
Normal file
BIN
static/images/macos-time-source.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 87 KiB |
BIN
static/images/nts.png
Normal file
BIN
static/images/nts.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 296 KiB |
Loading…
Reference in New Issue
Block a user