On Tue, 7 Jan 2003, Nate Lawson wrote:

> On Tue, 7 Jan 2003, Bosko Milekic wrote:

[...]

> >  An "attacker" might as well just
> >   rely on temperature to guess at how to interpret what he/she's seeing
> >   in those few bytes.  The data in our case is probably DMA'd straight
> >   out of the mbuf's data region so what you'll probably find in there is
> >   just randomness from something before, not necessarily network data.
>
> Since the mbuf pool is statically allocated at boot, it's likely only mbuf
> hdrs or contents would leak this way.  Still, this is data leakage even
> though it's a small channel.

This is definitely a security problem.  It is also not new.  First
time I saw it was over five years ago; we could "poll" data from
machines running various unix flavours.  Just by pinging them we got
snippets of data from inside the kernel of the target machine,
including data from local connections and pipes.

It was actually pretty easy to demonstrate significant leakage of
recognizable information.

   $.02,
   /Mikko

P.S. "rl" bzeros padding.

 Mikko Työläjä[EMAIL PROTECTED]
 RSA Security


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-net" in the body of the message

Reply via email to