Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F0AF251.20705@suse.de>
Date: Mon, 09 Jan 2012 14:57:37 +0100
From: Ludwig Nussel <ludwig.nussel@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: Malicious devices & vulnerabilties

Alistair Crooks wrote:
> On Mon, Jan 09, 2012 at 03:48:20AM +0800, Eugene Teo wrote:
>> On 01/08/2012 07:19 PM, Florian Weimer wrote:
>>>> I am wondering where to draw the line.  Should such device drivers
>>>> be considered vulnerable or not?  Thanks.
>>>
>>> I think they should be considered vulnerable.  Some applications need
>>> some robustness to attacks even from the local console (e.g., student
>>> computer rooms).
>>>
>>> USB is also a popular transport in many air-gapped environments.
>>
>> I would consider them vulnerable with low security impacts. If you are
>> fixing such issues, do post them to the list.
> 
> One very interesting datapoint here is Antti Kantee's rump subsystem
> in NetBSD
> 
> 	http://www.netbsd.org/docs/rump/
> 	http://blog.netbsd.org/tnf/entry/runnable_userspace_meta_programs_in
> 
> which allows for userspace-mounting of devices and filesystems
> thereon.  Unknown provenance USB sticks are one of the use cases
> mentioned.

Nice. Using fuse for mounting hot plugged devices where performance
isn't a priority anyways is what I dream about sometimes too :-)
I wonder how hard it would be to create some glue code and re-use the
existing kernel fs drivers 1:1.

cu
Ludwig

-- 
 (o_   Ludwig Nussel
 //\
 V_/_  http://www.suse.de/
SUSE LINUX Products GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg) 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.