lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20080306223022.GI5138@sentinelchicken.org>
Date: Thu, 6 Mar 2008 14:30:22 -0800
From: Tim <tim-security@...tinelchicken.org>
To: Glenn.Everhart@...se.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: [Full-disclosure] Firewire Attack on Windows Vista

Hi Glenn,

> It should be realized though that fixing this is not necessarily a simple
> thing, nor are architectural considerations missing. 

I most probably understated the difficulty of implementing a safe
ieee1394 DMA driver earlier.  However, it's one of those things where
the drivers ought to at least default to a safe configuration and allow
those who like operating in the "wild west" for the purposes of speed to
do so.

> As for what can be done by Windows (as opposed to "any OS"), that is perhaps
> limited by the great range of underlying hardware. A compromise which might allow
> DMA to/from disks, tapes, or CDs but disallow it for most other peripherals
> might turn out to be the best general solution available, or something 
> comparably ugly.

In the specific case of FireWire, Windows already does this, but that is
exactly how the restrictions were bypassed.  You can't trust a disk
device any more than any other device, since a laptop can simply emulate
a storage device.

cheers,
tim

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ