1 <html devsite> 2 <head> 3 <title>System and kernel security</title> 4 <meta name="project_path" value="/_project.yaml" /> 5 <meta name="book_path" value="/_book.yaml" /> 6 </head> 7 <body> 8 <!-- 9 Copyright 2017 The Android Open Source Project 10 11 Licensed under the Apache License, Version 2.0 (the "License"); 12 you may not use this file except in compliance with the License. 13 You may obtain a copy of the License at 14 15 http://www.apache.org/licenses/LICENSE-2.0 16 17 Unless required by applicable law or agreed to in writing, software 18 distributed under the License is distributed on an "AS IS" BASIS, 19 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 20 See the License for the specific language governing permissions and 21 limitations under the License. 22 --> 23 24 25 26 <p>At the operating system level, the Android platform provides the security of 27 the Linux kernel, as well as a secure inter-process communication (IPC) 28 facility to enable secure communication between applications running in 29 different processes. These security features at the OS level ensure that even 30 native code is constrained by the Application Sandbox. Whether that code is 31 the result of included application behavior or an exploitation of an 32 application vulnerability, the system is designed to prevent the rogue 33 application from harming other applications, the Android system, or the device 34 itself. See 35 <a href="/devices/tech/config/kernel.html">Kernel Configuration</a> 36 for measures you can take to strengthen the kernel on your devices. See the 37 <a href="/compatibility/cdd.html">Android Compatibility Definition 38 Document (CDD)</a> for required settings.</p> 39 <h2 id="linux-security">Linux Security</h2> 40 <p>The foundation of the Android platform is the Linux kernel. The Linux kernel 41 has been in widespread use for years, and is used in millions of 42 security-sensitive environments. Through its history of constantly being 43 researched, attacked, and fixed by thousands of developers, Linux has become a 44 stable and secure kernel trusted by many corporations and security 45 professionals.</p> 46 <p>As the base for a mobile computing environment, the Linux kernel provides 47 Android with several key security features, including:</p> 48 <ul> 49 <li>A user-based permissions model</li> 50 <li>Process isolation</li> 51 <li>Extensible mechanism for secure IPC</li> 52 <li>The ability to remove unnecessary and potentially insecure parts of the kernel</li> 53 </ul> 54 <p>As a multiuser operating system, a fundamental security objective of the Linux 55 kernel is to isolate user resources from one another. The Linux security 56 philosophy is to protect user resources from one another. Thus, Linux:</p> 57 <ul> 58 <li>Prevents user A from reading user B's files</li> 59 <li>Ensures that user A does not exhaust user B's memory</li> 60 <li>Ensures that user A does not exhaust user B's CPU resources</li> 61 <li>Ensures that user A does not exhaust user B's devices (e.g. telephony, GPS, 62 Bluetooth)</li> 63 </ul> 64 <h2 id="the-application-sandbox">The Application Sandbox</h2> 65 <p>The Android platform takes advantage of the Linux user-based protection as a 66 means of identifying and isolating application resources. The Android system 67 assigns a unique user ID (UID) to each Android application and runs it as that user 68 in a separate process. This approach is different from other operating systems 69 (including the traditional Linux configuration), where multiple applications 70 run with the same user permissions.</p> 71 <p>This sets up a kernel-level Application Sandbox. The kernel enforces security 72 between applications and the system at the process level through standard Linux 73 facilities, such as user and group IDs that are assigned to applications. By 74 default, applications cannot interact with each other and applications have 75 limited access to the operating system. If application A tries to do something 76 malicious like read application B's data or dial the phone without permission 77 (which is a separate application), then the operating system protects against 78 this because application A does not have the appropriate user privileges. The 79 sandbox is simple, auditable, and based on decades-old UNIX-style user 80 separation of processes and file permissions.</p> 81 <p>Because the Application Sandbox is in the kernel, this security model extends to 82 native code and to operating system applications. All of the software above the 83 kernel, such as operating system libraries, application 84 framework, application runtime, and all applications, run within the Application 85 Sandbox. On some platforms, developers are constrained to a specific 86 development framework, set of APIs, or language in order to enforce security. 87 On Android, there are no restrictions on how an application can be written that 88 are required to enforce security; in this respect, native code is just as 89 secure as interpreted code.</p> 90 <p>In some operating systems, memory corruption errors in one application may 91 lead to corruption in other applications housed in the same memory space, 92 resulting in a complete compromise of the security of the device. Because all 93 applications and their resources are sandboxed at the OS level, a memory 94 corruption error will allow arbitrary code execution only in 95 the context of that particular application, with the permissions established by 96 the operating system.</p> 97 <p>Like all security features, the Application Sandbox is not unbreakable. 98 However, to break out of the Application Sandbox in a properly configured 99 device, one must compromise the security of the Linux kernel.</p> 100 <h2 id="system-partition-and-safe-mode">System Partition and Safe Mode</h2> 101 <p>The system partition contains Android's kernel as well as the operating system 102 libraries, application runtime, application framework, and applications. This 103 partition is set to read-only. When a user boots the device into Safe Mode, 104 third-party applications may be launched manually by the device owner but are 105 not launched by default.</p> 106 <h2 id="filesystem-permissions">Filesystem Permissions</h2> 107 <p>In a UNIX-style environment, filesystem permissions ensure that one user cannot 108 alter or read another user's files. In the case of Android, each application 109 runs as its own user. Unless the developer explicitly shares files with other 110 applications, files created by one application cannot be read or altered by 111 another application.</p> 112 <h2 id="se-linux">Security-Enhanced Linux</h2> 113 <p>Android uses Security-Enhanced 114 Linux (SELinux) to apply access control policies and establish 115 mandatory access control (mac) on processes. See 116 <a href="/security/selinux/index.html">Security-Enhanced Linux in 117 Android</a> for details.</p> 118 <h2 id="verified-boot">Verified boot</h2> 119 <p> 120 Android 6.0 and later supports verified boot and device-mapper-verity. Verified 121 boot guarantees the integrity of the device software starting from a hardware 122 root of trust up to the system partition. During boot, each stage 123 cryptographically verifies the integrity and authenticity of the next stage 124 before executing it. 125 </p> 126 <p> 127 Android 7.0 and later supports strictly enforced verified boot, which means 128 compromised devices cannot boot. 129 </p> 130 <p> 131 See <a href="/security/verifiedboot/index.html">Verified boot</a> for 132 more details. 133 </p> 134 135 <h2 id="crypto">Cryptography</h2> 136 <p> Android provides a set of cryptographic APIs for use by applications. These 137 include implementations of standard and commonly used cryptographic primitives 138 such as AES, RSA, DSA, and SHA. Additionally, APIs are provided for higher level 139 protocols such as SSL and HTTPS. </p> 140 <p> Android 4.0 introduced the 141 <a href="http://developer.android.com/reference/android/security/KeyChain.html">KeyChain</a> 142 class to allow applications to use the system credential storage for private 143 keys and certificate chains. </p> 144 <h2 id="rooting-devices">Rooting of Devices</h2> 145 <p>By default, on Android only the kernel and a small subset of the core 146 applications run with root permissions. Android does not prevent a user or 147 application with root permissions from modifying the operating system, kernel, 148 or any other application. In general, root has full access to all 149 applications and all application data. Users that change the permissions on an 150 Android device to grant root access to applications increase the security 151 exposure to malicious applications and potential application flaws. </p> 152 <p>The ability to modify an Android device they own is important to developers 153 working with the Android platform. On many Android devices users have the 154 ability to unlock the bootloader in order to allow installation of an alternate 155 operating system. These alternate operating systems may allow an owner to gain 156 root access for purposes of debugging applications and system components or to 157 access features not presented to applications by Android APIs. </p> 158 <p>On some devices, a person with physical control of a device and a USB cable is 159 able to install a new operating system that provides root privileges to the 160 user. To protect any existing user data from compromise the bootloader unlock 161 mechanism requires that the bootloader erase any existing user data as part of 162 the unlock step. Root access gained via exploiting a kernel bug or security 163 hole can bypass this protection. </p> 164 <p>Encrypting data with a key stored on-device does not protect the application 165 data from root users. Applications can add a layer of data protection using 166 encryption with a key stored off-device, such as on a server or a user 167 password. This approach can provide temporary protection while the key is not 168 present, but at some point the key must be provided to the application and it 169 then becomes accessible to root users. </p> 170 <p>A more robust approach to protecting data from root users is through the use of 171 hardware solutions. OEMs may choose to implement hardware solutions that limit 172 access to specific types of content such as DRM for video playback, or the 173 NFC-related trusted storage for Google wallet. </p> 174 <p>In the case of a lost or stolen device, full filesystem encryption on Android 175 devices uses the device password to protect the encryption key, so modifying 176 the bootloader or operating system is not sufficient to access user data 177 without the users device password. </p> 178 <h2 id="user-security">User Security Features</h2> 179 <h3 id="filesystem-encryption">Filesystem Encryption</h3> 180 <p>Android 3.0 and later provides full filesystem encryption, so all user data can 181 be encrypted in the kernel.</p> 182 <p> 183 Android 5.0 and later supports 184 <a href="/security/encryption/full-disk.html">full-disk encryption</a>. 185 Full-disk encryption uses a single keyprotected with the users device 186 passwordto protect the whole of a devices userdata partition. Upon boot, 187 users must provide their credentials before any part of the disk is accessible. 188 </p> 189 <p> 190 Android 7.0 and later supports 191 <a href="/security/encryption/file-based.html">file-based encryption</a>. 192 File-based encryption allows different files to be encrypted with different 193 keys that can be unlocked independently. 194 </p> 195 196 <p>More details on implementation of filesystem encryption are available in the 197 <a href="/security/encryption/index.html">Encryption</a> section.</p> 198 <h3 id="password-protection">Password Protection</h3> 199 <p>Android can be configured to verify a user-supplied password prior to providing 200 access to a device. In addition to preventing unauthorized use of the device, 201 this password protects the cryptographic key for full filesystem encryption.</p> 202 <p>Use of a password and/or password complexity rules can be required by a device 203 administrator.</p> 204 <h2 id="device-administration">Device Administration</h2> 205 <p>Android 2.2 and later provide the Android Device Administration API, which 206 provides device administration features at the system level. For example, the 207 built-in Android Email application uses the APIs to improve Exchange support. 208 Through the Email application, Exchange administrators can enforce password 209 policies including alphanumeric passwords or numeric PINs across 210 devices. Administrators can also remotely wipe (that is, restore factory 211 defaults on) lost or stolen handsets.</p> 212 <p>In addition to use in applications included with the Android system, these APIs 213 are available to third-party providers of Device Management solutions. Details 214 on the API are provided at <a 215 href="https://developer.android.com/guide/topics/admin/device-admin.html">Device 216 Administration</a>.</p> 217 218 </body> 219 </html> 220