Rod Whitworth wrote:

> And you are aware of how insecure firewire is, I hope? 

Yeah, somewhat.

> With physical access admittedly

Pretty much anything is possible with physical access and some time.

> ... but it does DMA transfers without talking to the OS etc.

It appears that could be turned off, but I doubt any hardware makers
will spend the effort.

> See http://www.ruxcon.org.au/files/2006/firewire_attacks.pdf I saw
> the demo and heard the talk that is not on the slides .... Scary!

Thanks.  Interesting presentation.  There's a lot out there. e.g.:

http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=211201211
http://blogs.23.nu/RedTeam/0000/00/antville-5201/

Again, it looks like it *might* be possible to fix problem at the driver
level by having DMA turned off by default or disabled:

        "Because FireWire and USB were designed with the
        intention of connecting high-speed disk drives, both
        specifications have provisions for DMA. This means that,
        under many circumstances, a device that's plugged into a
        FireWire or USB interface has the ability to read and
        write to individual physical memory locations inside a
        the host computer. Such access necessarily bypasses the
        host operating system and any security checks that it
        might wish to implement."

 http://www.csoonline.com/article/220868/Attack_of_the_iPods_?page=2

What would be fine to avoid would be the marketing of shortcomings in
IEEE hardware and drivers leveraged to push DRM'd hardware like the
"hanging chads" were used to usher in blackbox voting.  The last Dell
notebook I looked at had TCPM in the hardware and the Apples seem to now
have HDCP:
http://arstechnica.com/apple/news/2008/11/apple-brings-hdcp-to-a-new-aluminum-macbook-near-you.ars

Regards
-Lars

Reply via email to