Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Sign here, please!

Sign here, please!

An application ID might define your app among all others, but its signature is what proves and confirms its identity and integrity. From working in distributed teams to fending off fraudulent clones of your application, you eventually come to understand the importance of signatures.

In this talk we’ll take a deep dive into the Android keystore system, certificates and signatures, and go over key points necessary for any application’s long and productive life. Also, we will cover some security tips and tricks that will help ensure your app is safe to use, even if the users are faced with its evil twin.

At the end you should walk away with a deeper insight into everyday mechanisms that are often taken for granted, and the impact that they have on your users’ security.

Ana Baotić

April 24, 2018
Tweet

More Decks by Ana Baotić

Other Decks in Technology

Transcript

  1. Present in
 54
 countries Over 22,300
 highly committed employees 6th


    largest software & services vendor in Europe 1,813
 m EUR sales revenues in 2016 176
 m EUR operating profit in 2016 1bln
 EUR market capitalization • Founded in 1991 • 6th largest software producer in Europe • Traded on the WSE, included in the WIG20 blue chip index • International presence ASSECO at a glance
  2. CERTIFICATE Electronic document that proves ownership of a public key

    X.509 - structure TLS, electronic signatures CERTIFICATE @abaotic
  3. KEYS ▸ Private (owner) ▸ Decrypts messages ▸ Calculates signatures

    ▸ Public (shared) ▸ Encrypts messages ▸ Confirms signatures @abaotic
  4. DIGITAL SIGNATURE ▸ authentication, non-repudiation and integrity ▸ Calculate a

    digest/hash of the message DIGITAL SIGNATURE @abaotic
  5. DIGITAL SIGNATURE ▸ authentication, non-repudiation and integrity ▸ Calculate a

    digest/hash of the message ▸ Sender encrypts with private key DIGITAL SIGNATURE @abaotic
  6. DIGITAL SIGNATURE ▸ authentication, non-repudiation and integrity ▸ Calculate a

    digest/hash of the message ▸ Sender encrypts with private key ▸ Recipient decrypts with public key DIGITAL SIGNATURE @abaotic
  7. CA CA CERTIFICATE ▸ Self-signed certificate ▸ Browsers, Android, OSX

    ▸ Comodo, IdenTrust, Symantec, GoDaddy, Let’s Encrypt ▸ Impact of updates! @abaotic
  8. CA SUBVERSION ▸ Primary risk key theft ▸ Scheme flawed

    ▸ HSM for key storage ▸ Offline @abaotic
  9. SIGNING ANDROID APPLICATIONS - SIGN THE APP ALTERNATIVE ▸ keytool

    to generate a key ▸ zipalign to align unsigned apk ▸ jarsigner to sign aligned apk @abaotic
  10. SIGN THE APK DECISIONS TO BE MADE ▸ Who will

    be responsible for the signing key? @abaotic
  11. WE THE DEVELOPERS PREREQUISITES ▸ Signing key must be safe

    ▸ Signing key must be accessible @abaotic
  12. WE THE DEVELOPERS REALITY NIGHTMARE signingConfigs { release { storeFile

    file("/not_where_you_think_it_is/ks.jks") storePassword "password" keyAlias "my-alias" keyPassword "password" } } @abaotic
  13. GOOGLE PLAY APP SIGNING NEW APPS ▸ Create upload key

    and sign apk ▸ Google Play App Signing ->Accept ▸ Upload signed apk ▸ Register app signing key! @abaotic
  14. GOOGLE PLAY APP SIGNING EXISTING APPS ▸ Opt-in ▸ Submit

    signing key to Google and ▸ Create upload key ▸ Update keystores ▸ Continue signing with upload key @abaotic
  15. SIGN THE APK DECISIONS TO BE MADE ▸ Who will

    be responsible for the signing key? ▸ Applicable to all modules/applications/flavours? @abaotic
  16. SIGN THE APK PROS AND CONS ▸ Modularity ▸ Permission

    based sharing ▸ update-able ▸ Single point of failure @abaotic
  17. ANDROID KEYSTORE SYSTEM The Android Keystore system safeguards your cryptographic

    keys from extraction. ANDROID KEYSTORE SYSTEM @abaotic
  18. ANDROID KEYSTORE SYSTEM EXTRACTION PREVENTION ▸ System process in charge

    of cryptographic operations ▸ Key material bound to TEE, SE @abaotic
  19. ANDROID KEYSTORE SYSTEM KEY USE AUTHORIZATIONS ▸ Once defined, immutable

    ▸ Cryptography ▸ Temporal validity interval ▸ User authentication @abaotic
  20. ANDROID KEYSTORE SYSTEM KEYCHAIN VS ANDROID KEYSTORE PROVIDER ▸ System-wide

    credentials ▸ System provided UI ▸ App-specific credentials ▸ No interaction ▸ AndroidKeystore API 18 @abaotic
  21. KEY PAIR ENTRY IN KEYSTORE KeyPairGenerator kpg = KeyPairGenerator.getInstance( KeyProperties.KEY_ALGORITHM_EC,

    "AndroidKeyStore"); kpg.initialize(new KeyGenParameterSpec.Builder( alias, KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY) .setDigests(KeyProperties.DIGEST_SHA256, KeyProperties.DIGEST_SHA512) .build()); KeyPair kp = kpg.generateKeyPair(); GENERATE KEYPAIR @abaotic
  22. KEY PAIR ENTRY IN KEYSTORE KeyPairGenerator kpg = KeyPairGenerator.getInstance( KeyProperties.KEY_ALGORITHM_EC,

    "AndroidKeyStore"); kpg.initialize(new KeyGenParameterSpec.Builder( alias, KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY) .setDigests(KeyProperties.DIGEST_SHA256, KeyProperties.DIGEST_SHA512) .build()); KeyPair kp = kpg.generateKeyPair(); GENERATE KEYPAIR @abaotic
  23. KEY PAIR ENTRY IN KEYSTORE KeyPairGenerator kpg = KeyPairGenerator.getInstance( KeyProperties.KEY_ALGORITHM_EC,

    "AndroidKeystore"); kpg.initialize(new KeyGenParameterSpec.Builder( alias, KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY) .setDigests(KeyProperties.DIGEST_SHA256, KeyProperties.DIGEST_SHA512) .build()); KeyPair kp = kpg.generateKeyPair(); GENERATE KEYPAIR @abaotic
  24. KEY ATTESTATION KEY ATTESTATION ▸ Is a key stored in

    hardware-backed keystore ▸ Small number of devices API 24+ @abaotic