To ensure the highest level of host integrity, VMware ESXi utilizes a multi-layered Chain of Trust. This workflow transition from the physical hardware up to the centralized management layer in vCenter.
Following is the detailed technical workflow as depicted in your image:
Phase 1: Hardware & UEFI Initialization
The security process begins the moment the physical server is powered on.
The Root of Trust: The server’s motherboard initializes the UEFI Firmware.
Signature Database: The firmware accesses its internal Allowed Keys Database (DB). This database contains the public keys of trusted software vendors (like VMware).
Objective: To ensure that the hardware only communicates with verified, untampered low-level software.
Phase 2: Bootloader Verification
Before the UEFI hands over control to the operating system, it must verify the "messenger."
The Target: The UEFI firmware locates the ESXi bootloader, mboot.efi.
The Validation: It checks the digital signature of mboot.efi against the keys in the DB.
Signature OK: If verified, the bootloader is executed.
Signature Invalid: If the code has been tampered with or is unsigned, the boot process is halted immediately to prevent a bootkit attack.
Phase 3: ESXi Kernel & VIB Verification
Once the bootloader is running, it performs a secondary check on the hypervisor itself.
Kernel Loading: The bootloader verifies and starts the ESXi Kernel.
VIB Verification (The Guardrail): ESXi is modular, consisting of various VIBs (vSphere Installation Bundles) for drivers and plugins.
Certified Drivers: VIBs from VMware, Cisco, or other trusted partners have valid signatures and are allowed to load (PASSED).
The Block: If an Unsigned VIB (like a community-supported driver) is detected, the kernel enforces "Purity." The boot is blocked, often resulting in a Purple Screen of Death (PSOD) to ensure that no unverified code ever runs in the kernel space.
Phase 4: vCenter Attestation & Reporting
The final phase moves the verification from the local host to the management network.
The Role of TPM: The physical TPM 2.0 (Trusted Platform Module) chip on the server records "measurements" of every step taken during Phases 1 through 3.
Remote Attestation: When the host connects to the vCenter Server, vCenter queries the TPM.
Reporting:
If the boot measurements match the expected "known good" state, vCenter reports "Hardware Attestation: Passed."
Comments
Post a Comment