On 11/03/2014 07:07 AM, Lars Boegild Thomsen wrote: > On Sunday 02 November 2014 12:08:15 Lars Boegild Thomsen wrote: >> 1. 100 % Automatic >> >> The device check at regular intervals if a new binary firmware is available >> and if that is the case it just updates. This one is entirely possible and >> not hard to implement. I am however not sure I like it. If someone managed >> to hijack our domain name that someone could brick all devices in one go. >> There is also the possibility of accidental bricking of thousands devices >> (even Microsoft have released updates that crashed Windows, and Google have >> screwed up their android updates quite often). In short - I personally >> don't like this one but I am willing to stand corrected and be convinced >> otherwise. >> >> 2. Automatic update of Tor alone >> >> This is a bit software as in the binary firmware stays as it is but only the >> Tor package gets updated. It's got the same security issues as number 1, >> but less of a risk of bricking accidentally and a path to recovery IF a bad >> update was submitted. >> >> 3. Visual indication of "action needed" >> >> In our current hardware design we actually included a RGB LED for this very >> reason. We could have that flashing RED (and label it "Update needed" on >> the box) if not up to date but still leave it for the user to update. I am >> personally leaning towards this one unless the issues with 1 or 2 can be >> solved but I am aware that a lot of people won't update. >> >> 4. Refuse to function unless updated >> >> Would flash red as in 3 but refuse to run unless the firmware is updated. I >> personally think this one is too annoying from a usability point of view. > > I thought of another one that might be the best option so far: > > 5. Have a dedicated status LED that will flash RED if system need upgrade. I > don't like the idea of a fully automatic upgrade, but the device _will_ have > a button and it could be that when the RED upgrade LED flashes, the device > can be upgraded with a press of the button. That approach is still to some > degree vulnerable to a man in the middle (DNS hijack) attack though. >
Well, I hope you will implement firmware signature check⦠this would prevent most of the MitM problems. This should be optional though, in order to let "power-users" mess with their own firmware if they want. Better: let them push their own key on their very own device so that they might as well secure their updates. -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
