|
|
Message-ID: <20120108211806.GF8030@nef.pbox.org>
Date: Sun, 8 Jan 2012 22:18:07 +0100
From: Alistair Crooks <agc@...bsd.org>
To: oss-security@...ts.openwall.com
Cc: Florian Weimer <fw@...eb.enyo.de>
Subject: Re: Malicious devices & vulnerabilties
On Mon, Jan 09, 2012 at 03:48:20AM +0800, Eugene Teo wrote:
> On 01/08/2012 07:19 PM, Florian Weimer wrote:
> > * Xi Wang:
> >
> >> I am wondering where to draw the line. Should such device drivers
> >> be considered vulnerable or not? Thanks.
> >
> > I think they should be considered vulnerable. Some applications need
> > some robustness to attacks even from the local console (e.g., student
> > computer rooms).
> >
> > USB is also a popular transport in many air-gapped environments.
>
> I would consider them vulnerable with low security impacts. If you are
> fixing such issues, do post them to the list.
One very interesting datapoint here is Antti Kantee's rump subsystem
in NetBSD
http://www.netbsd.org/docs/rump/
http://blog.netbsd.org/tnf/entry/runnable_userspace_meta_programs_in
which allows for userspace-mounting of devices and filesystems
thereon. Unknown provenance USB sticks are one of the use cases
mentioned.
+ rump_msdos: USB sticks with FAT file systems are a common
sight. Mounting an untrusted image from removable media with
the file system driver running in the kernel is risky in many
ways: inopportune unplugging of the media or a corrupted file
system may have adverse effects such as system crashes or
worse. By using the rump_msdos command instead of
mount_msdos, the file system service runs in userspace and is
accessed via puffs. This isolates the main kernel from any
resulting problems such as buffer overflows.
The usage of mount_msdos and rump_msdos are equivalent...
If USB is a transport in air-gapped environments, I personally have a
concern with that. A good thing airgaps aren't used for anything in RL,
right? ;-)
Regards,
Alistair
PS. Obvious disclaimer - I am biased.
PPS. Just reading REAMDE right now
--
Alistair Crooks
{agc,security-officer}@...BSD.org
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.