Security Overview

This document provides an overview of the security features and practices implemented within the Livepatch Client. It aims to give users a general perspective on how security is handled, outlining built-in protections and pointing to more detailed documentation for specific cryptographic approaches and operational guides.

Built-in Protection

The Livepatch client incorporates several mechanisms to ensure the integrity and authenticity of patches and the security of communication:

  • Patch Verification: Patches undergo a verification process using SHA256 checksums to ensure file integrity upon download. For more details, refer to the Cryptographic Documentation.

  • Patch Signatures: All Linux kernel modules distributed as part of patches are cryptographically signed by Canonical using SHA512 with RSA. This verifies their authenticity and prevents the installation of malicious patches. Further information can be found in the Cryptographic Documentation.

  • TLS Communication: The Livepatch client uses HTTPS and relies on TLS v1.2 or higher for secure communication with the Livepatch server, utilizing host machine CA certificates and additional fixed certificates for server authentication. Details on TLS communication are available in the Cryptographic Documentation.

Risks

While the Livepatch client is designed with security in mind, it is important to be aware of potential risks:

  • TLS Enforcement (On-premises deployments): Although the Canonical hosted Livepatch server redirects HTTP to HTTPS, there is no client-side enforcement for TLS usage in on-premises deployments. Forgoing TLS in such scenarios is not recommended due to security implications.

  • Privileged access to Auth Tokens: Authentication for the Livepatch Client, with the Livepatch Server, can be established using Auth Tokens or Resource Tokens. After successful client registration, a machine token is issued to the Livepatch client which can be used for subsequent authentication. Privileged access to this token must be controlled to prevent usage by a malicious third-party.

Related Security Documentation

Patch Security: This document provides in-depth details on the cryptographic approaches used by the Livepatch client for patch verification, signatures, and secure communication.

This page was last modified 3 months ago. Help improve this document in the forum.