On Wed, 18 Jul 2018 at 03:21:14 +0200
Adam Borowski <kilob...@angband.pl> wrote:

> On Tue, Jul 17, 2018 at 05:24:11PM -0700, Rick Moen wrote:
>> Quoting Adam Borowski (kilob...@angband.pl):
>>
>>> Then there are local exploits.  Ted Ts'o for example keeps fuzzying
>>> ext4 for years yet exploitable bugs still pop up frequently -- usually
>>> just DoS but arbitrary code execution isn't unheard of.  
>>
>> I've read a lot of e2fsprogs CVEs, and cannot recall any ever having
>> been _proved exploitable_ to allow arbitrary code execution.  In a
>> number of cases, there have been bugs, generally buffer overflows, that
>> in theory could _possibly_ lead to arbitrary code execution that in
>> theory might exploit privileged code such as e2fsprogs mount code, thus
>> in theory possibly supporting privilege escalation.  
>
> I'm talking about kernel not progs, and those don't get issued CVEs.

  A 5 secs search for "linux kernel CVE" disagrees with you:
https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33

  Why on Earth would ever a kernel vulnerability not be issued a CVE?

> There's only so much preaching about "don't blindly mount untrusted
> filesystems" that gets ignored by distros one can do before giving up on the
> issue.

  What do user's securitity malpractises have to do with kernel backdoors?

>> Where I'm pretty sure you are massively exaggerating is by eliding the
>> necessary qualifiers 'in theory' and 'possibly' and claiming observed
>> paths to arbitrary code execution (leveraging privileged routines).
>> There is a gaping hole between 'buffer overflow that someone might
>> eventually figure out how to do bad things with' and 'arbitrary code
>> execution'.  
>
> A bug is a bug.

  And it's not a backdoors.

>  Most serious kernel developers don't put much heed into
> whether the problem is exploitable or not, they just fix it.  It's only
> security folks that analyze those.

  Right.  Hoever, how does this address Rick's observations?

>> If we're going to have realistic discussions of security on Dng, it
>> would help to forego 'Bad things are possible, ergo doomsday just
>> happened' rhetoric.  
>
> It's about attack types.  Breaking the kernel with nothing but network
> access is major news (as opposed to taking over a network daemon first).
> Taking over the daemon is userspace issue thus out of scope for kernel devs,
> although obviously it's interesting for _users_.

  Yawnn...

> As for local exploits, I find it very likely that three-letter-agencies of
> all major countries do have some kind of ring 0 exploit, the attack surface
> is big enough.

  More off-topic babbling.

> As for physical access exploits, it's pretty much a lost cause.  Distros
> automount filesystems from removable media (USB, SD cards, ...), and this
> attack avenue alone is enough.  I read filesystem-related mailing lists
> enough to know there's no way there's not a single arbitrary code execution
> bug _somewhere_, in addition to many many many mere crashers.  Thus, that
> locked laptop is easy pickings.

  As before.

>> Concur that USB is a security Typhoid Mary.  I would dearly love to see
>> hardware devices enforcing USB class identities on connected devices, so
>> that, say, a USB key drive can claim all it wants to be a USB HID-class
>> device rather than UMS-class,  but isn't believed.  Short of that, I'm
>> just really careful what hardware I permit.  
>
> There's no way to enforce identity: the other side of a connector has no way
> of verifying that.

  OK.  How could thst become a backdoor, please?  A *kernel* backdoor?

> On the other hand, letting userspace block any new devices of a certain
> class would fix this particular attack: even for distros that insist on
> automounting stuff without asking, it's pointless to do so while locked. 
> The only types that make sense are: 1. pure chargers, 2. HID (so you can
> unlock even if your keyboard got dislodged).  Any extra capabilities of the
> link partner can be queried only after unlocking.
>
> That's for laptop/phone-type machines, a server might have a different
> policy.

  Does the subject line read "A Devuan kernel?" or does it read "An all-round
security audit of Devuan?"

>> Attacks relying on USB devices masquerading as a different class come up
>> fairly often on Schneier's blog, e.g.,
>> https://www.schneier.com/blog/archives/2011/06/yet_another_peo.html  
>
> None of the devices in the article fake their class.  Blocking automount
> wouldn't also help here: no matter if you have automount, click-to-mount or
> root only mount, cases when an user connects an USB stick but doesn't
> immediately follow with mounting it are extremely, extremely rare.

  I suppose you don't run Linux out of security concerns, do you?


Alessandro
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to