Security and privacy of iOS

From Wikipedia, the free encyclopedia
(Redirected from Secure Enclave)

The iOS operating system utilizes many security features in both hardware and software, from the boot process to biometrics.

Secure Boot[edit]

Before fully booting into iOS, there is low-level code that runs from the Boot ROM. Its task is to verify that the Low-Level Bootloader is signed by the Apple Root CA public key before running it. This process is to ensure that no malicious or otherwise unauthorized software can be run on an iOS device. After the Low-Level Bootloader finishes its tasks, it runs the higher level bootloader, known as iBoot. If all goes well, iBoot will then proceed to load the iOS kernel as well as the rest of the operating system.[1]

Secure Enclave[edit]

The Secure Enclave is a coprocessor found in iOS devices part of the A7 and newer chips used for data protection. It includes the user data pertaining to Touch ID, Face ID, and Apple Pay, among other sensitive data.[2] The purpose of the Secure Enclave is to handle keys and other info such as biometrics that is sensitive enough to not be handled by the Application Processor (AP). It is isolated with a hardware filter so the AP cannot access it.[2] It shares RAM with the AP, but its portion of the RAM (known as TZ0) is encrypted. The secure enclave itself is a flashable 4 MB AKF processor core called the secure enclave processor (SEP) as documented in Apple Patent Application 20130308838. The technology used is similar to ARM's TrustZone/SecurCore but contains proprietary code for Apple KF cores in general and SEP specifically. It is also responsible for generating the UID key on A9 or newer chips that protects user data at rest.[citation needed]

It has its own secure boot process to ensure that it is completely secure. A hardware random number generator is also included as a part of this coprocessor. Each device's Secure Enclave has a unique ID that is given to it when it is made and cannot be changed. This identifier is used to create a temporary key that encrypts the memory in this portion of the system. The Secure Enclave also contains an anti-replay counter to prevent brute force attacks.[1]

The SEP is located in the devicetree under IODeviceTree:/arm-io/sep and managed by the AppleSEPManager driver.[3]

In 2020, security flaws in the SEP were discovered, causing concerns about Apple devices such as iPhones.[4]

Face ID[edit]

Face ID is a face scanner that is embedded in the notch on iPhone models X, XS, XS Max, XR, 11, 11 Pro, 11 Pro Max, 12, 12 Mini, 12 Pro, 12 Pro Max, 13, 13 Mini, 13 Pro, 13 Pro Max, 14, and the 14 Plus. On the iPhone 14 Pro, 14 Pro Max, IPhone 15, IPhone 15 Plus, IPhone 15 Pro, and IPhone 15 Pro Max, it is embedded in the Dynamic Island.[5] It can be used to unlock the device, make purchases, and log into applications among other functions. When used, Face ID only temporarily stores the face data in encrypted memory in the Secure Enclave, as described above. There is no way for the device's main processor or any other part of the system to access the raw data that is obtained from the Face ID sensor.[1]

Passcode[edit]

iOS devices can have a passcode that is used to unlock the device, make changes to system settings, and encrypt the device's contents. Until recently, these were typically four numerical digits long. However, since unlocking the devices with a fingerprint by using Touch ID has become more widespread, six-digit passcodes are now the default on iOS with the option to switch back to four or use an alphanumeric passcode.[1]

Touch ID[edit]

Touch ID is a fingerprint scanner that is embedded in the home button and can be used to unlock the device, make purchases, and log into applications among other functions. When used, Touch ID only temporarily stores the fingerprint data in encrypted memory in the Secure Enclave, as described above. Like Face ID, there is no way for the device's main processor or any other part of the system to access the raw fingerprint data that is obtained from the Touch ID sensor.[1]

Address Space Layout Randomization[edit]

Address Space Layout Randomization (ASLR) is a low-level technique of preventing memory corruption attacks such as buffer overflows. It involves placing data in randomly selected locations in memory in order to make it more difficult to predict ways to corrupt the system and create exploits. ASLR makes app bugs more likely to crash the app than to silently overwrite memory, regardless of whether the behavior is accidental or malicious.[citation needed]

Non-executable memory[edit]

iOS utilizes the ARM architecture's Execute Never (XN) feature. This allows some portions of the memory to be marked as non-executable, working alongside ASLR to prevent buffer overflow attacks including return-to-libc attacks.[1]

Encryption[edit]

As mentioned above, one use of encryption in iOS is in the memory of the Secure Enclave. When a passcode is utilized on an iOS device, the contents of the device are encrypted. This is done by using a hardware AES 256 implementation that is very efficient because it is placed directly between the flash storage and RAM.[1]

iOS, in combination with its specific hardware, uses crypto-shredding when erasing all content and settings by obliterating all the keys in 'effaceable storage'. This renders all user data on the device cryptographically inaccessible.[6]

Keychain[edit]

The iOS keychain is a database of login information that can be shared across apps written by the same person or organization.[1] This service is often used for storing passwords for web applications.[7]

App security[edit]

Third-party applications such as those distributed through the App Store must be code signed with an Apple-issued certificate. In principle, this continues the chain of trust all the way from the Secure Boot process as mentioned above to the actions of the applications installed on the device by users. Applications are also sandboxed, meaning that they can only modify the data within their individual home directory unless explicitly given permission to do otherwise. For example, they cannot access data owned by other user-installed applications on the device. There is a very extensive set of privacy controls contained within iOS with options to control apps' ability to access a wide variety of permissions such as the camera, contacts, background app refresh, cellular data, and access to other data and services. Most of the code in iOS, including third-party applications, runs as the "mobile" user which does not have root privileges. This ensures that system files and other iOS system resources remain hidden and inaccessible to user-installed applications.[1]

App Store bypasses[edit]

Companies can apply to Apple for enterprise developer certificates. These can be used to sign apps such that iOS will install them directly (sometimes called "sideloading"), without the app needing to be distributed via the App Store.[8] The terms under which they are granted make clear that they are only to be used for companies who wish to distribute apps directly to their employees.[8]

Circa January–February 2019, it emerged that a number of software developers were misusing enterprise developer certificates to distribute software directly to non-employees, thereby bypassing the App Store. Facebook was found to be abusing an Apple enterprise developer certificate to distribute an application to underage users that would give Facebook access to all private data on their devices.[9][10][11] Google was abusing an Apple enterprise developer certificate to distribute an app to adults to collect data from their devices, including unencrypted data belonging to third parties.[12][8] AltStore, AppValley, Panda Helper, TweakBox and TutuApp have all been abusing enterprise developer certificates to distribute apps that offer pirated software.[13]

Network security[edit]

iOS supports TLS with both low- and high-level APIs for developers. By default, the App Transport Security (ATS) framework requires that servers use at least TLS 1.2. However, developers are free to override this framework and utilize their own methods of communicating over networks. When Wi-Fi is enabled, iOS uses a randomized MAC address so that devices cannot be tracked by anyone sniffing wireless traffic.[1]

Two-factor authentication[edit]

Two-factor authentication is an option in iOS to ensure that even if an unauthorized person knows an Apple ID and password combination, they cannot gain access to the account. It works by requiring not only the Apple ID and password, but also a verification code that is sent to an iDevice or mobile phone number that is already known to be trusted.[1] If an unauthorized user attempts to sign in using another user's Apple ID, the owner of the Apple ID receives a notification that allows them to deny access to the unrecognized device.[14]

Hardened memory allocation[edit]

iOS features a hardened memory allocator known as kalloc_type that was introduced in iOS 15. Since the XNU kernel is primarily written in memory unsafe languages such as C and C++,[15] kalloc_type is designed to mitigate the large amount of vulnerabilities that result from the use of these languages in the kernel. In order to achieve this, kalloc_type implements mitigations such as type isolation in order to prevent type confusion and buffer overflow vulnerabilities. Ultimately, the prevention of privilege escalation is intended.[16]

References[edit]

  1. ^ a b c d e f g h i j k Apple Inc. (May 2016). "iOS Security Guide" (PDF). Apple.com. Archived (PDF) from the original on February 27, 2016.
  2. ^ a b "Secure Enclave". Apple Support. Retrieved 2023-06-22.
  3. ^ "I/O registry dump". winocm blag. Archived from the original on September 23, 2013. Retrieved August 11, 2020.
  4. ^ Espósito, Filipe (August 1, 2020). "New 'unpatchable' exploit allegedly found on Apple's Secure Enclave chip, here's what it could mean". 9to5Mac. Archived from the original on November 5, 2021. Retrieved November 5, 2021.
  5. ^ "All the apps and features Dynamic Island Supports". techSpark. 9 November 2022. Archived from the original on November 1, 2022. Retrieved November 9, 2022.
  6. ^ "Crypto-shredding using effaceable storage in iOS on stanford.edu". Archived from the original on September 11, 2018. Retrieved September 21, 2018.
  7. ^ "iOS Keychain Services Tasks". Apple Developer. Archived from the original on December 20, 2016. Retrieved December 6, 2016.
  8. ^ a b c Whittaker, Zack (February 2019). "Everything you need to know about Facebook, Google's app scandal". TechCrunch. Archived from the original on January 11, 2023. Retrieved February 20, 2019.
  9. ^ Constine, Josh (January 29, 2019). "Facebook pays teens to install VPN that spies on them". TechCrunch. Archived from the original on March 7, 2020. Retrieved February 20, 2019.
  10. ^ Owen, Malcolm (January 30, 2019). "Apple has revoked Facebook's enterprise developer certificates after sideload violations [u]". AppleInsider. Archived from the original on February 21, 2019. Retrieved February 20, 2019.
  11. ^ Warren, Tom; Kastrenakes, Jacob (January 30, 2019). "Apple blocks Facebook from running its internal iOS apps". The Verge. Archived from the original on February 3, 2021. Retrieved February 20, 2019.
  12. ^ Whittaker, Zack; Constine, Josh; Lunden, Ingrid (January 30, 2019). "Google will stop peddling a data collector through Apple's back door". TechCrunch. Archived from the original on Dec 16, 2019. Retrieved February 20, 2019.
  13. ^ "Loophole allows pirated apps to be installed on Apple iPhones". NBC News. Reuters. February 14, 2019. Archived from the original on February 20, 2019. Retrieved February 20, 2019.
  14. ^ "Two-factor authentication for Apple ID". Apple Support. Archived from the original on December 20, 2016. Retrieved December 6, 2016.
  15. ^ "XNU". GitHub. Apple OSS Distributions. Archived from the original on November 17, 2022. Retrieved 17 November 2022.
  16. ^ "Towards the next generation of XNU memory safety: kalloc_type". Apple Security Blog. October 27, 2022. Archived from the original on November 16, 2022. Retrieved 17 November 2022.