Hey everyone, I've been doing some light research both here (grapheneos.org guides) and the AOSP website (source.android.com). I was wondering if there's any kind of debug-level endpoint that can be examined to track the use of keys, see which apps/utilities use which keys, and get a better look at how the Android operating system uses it's keystore.
Since my journey began as a Pixel user (and with Graphene, which I love) it seems as though the documentation is scarce concerning the precise Android security model. It also seems as though (by default) an Android device doesn't have access to it's own keys - applications and device builds are usually signed by the manufacturer or OS distributor, with the user having no way of gaining a higher level control over signed files. As a Linux user, I want to have the agency to be stupid with my own keys.
I understand that signing with my own keys makes the build incompatible with OTAs and destroys a large part of the security model. But for the hardcore Linux features I want, I would argue that Graphene OS is still by far the best option for me and other users could who would be using a root setup anyways if Graphene didn't exist. I truly believe Graphene is an everyman's OS supporting multiple use-cases in one way or another. Even power users/devs who like to mess around with their device could benefit (i.e. Graphene with root is still unsafe, but still infinitely safer than Lineage with root due to the additional sand-boxing and memory protection). Even just being able to toggle network usage for different apps makes a huge difference in security, not to mention the other features Graphene has built-in.
At the end of the day, the keystore runs the show, getting to decide which apps should be granted which permissions and for which purposes. I'm trying to investigate how these keys are used during runtime for my own custom build that I use for personal development and writing privileged bash scripts. From what I can tell reading AOSP documentation the keys are necessary for certain vendor features that Linux users may find attractive, such as DLKM. I'd rather have my own keychain for features like this, which would also opens the door for other development possibilities such as APEX packages as a hobby/side project. These normally aren't possible because in 99% of Android devices somebody else owns your private keychain. Even the ones that are documented (media, network stack, testkey, etc.) are just a few keys inside the build system. In reality, I found a metric fuckload (hundreds of undocumented private keys) in the AOSP repo by using a grep command. How can an Android user have any idea what the chain of trust looks like when everything is so obfuscated and poorly documented?
Does anyone know how to track keys? It goes without saying that custom Graphene OS builds don't fall in-line with the standard security model, but it still seems high above any other OS for my purposes. I'd still be using Cyanogenmod if it wasn't for Graphene! The Graphene OS team has done amazing things for the Android community as a whole, which includes many types of users.
In theory, it should be possible for people to sign their own builds and still be able to use attestation, like a "poor man's ro.secure." Of course, this can only be guaranteed to the extent that you aren't doing things that change the signatures or cause a mismatch during attestation (which happens to be a lot of root-related things). Ultimately though, validation is still accomplished by signature checking certain hashes - and even a rooted phone maintains it's own set of signatures. Having keys that are not centralized or widely distributed seems like it could be a somewhat valid (but ultimately less secure) approach to security for obscure builds running on only a handful of devices. I'm curious to find out if Graphene's Auditor app could be used for peer-to-peer attestation in this case - where keys are not widely distributed or known by a centralized party. To be honest, it seems kind of crazy to me that people blindly trust Google with their private keys and see this as completely normal..