lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050729155646.I86052@fledge.watson.org>
Date: Fri Jul 29 21:01:49 2005
From: arr at watson.org (Andrew R. Reiter)
Subject: Cisco IOS Shellcode Presentation

On Fri, 29 Jul 2005, Tim wrote:

:> How about adopting an architecture that incorporates special-purpose 
:> security safeguards into the CPU? Routers and switches don't need to 
:> execute arbitrary code, Cisco knows ahead of time, before they deploy a 
:> product, what code that product should be allowed to execute.
:> 
:> Do you think there is no way in hardware to limit the code that gets 
:> executed? Maybe you should join the FBI.
:
:Hardware has bugs too.
:
:Arbitrary code execution isn't too hard on the XBox, for instance, even
:with complex crypto checks.
:
:Intel screwed up their design of hyperthreading with caches, and as a
:result, local users can steal data from one another.

Intel did?  How's that?  This cache issue has been a problem before at 
different levels.  You're stating that it's the CPU's job to determine 
scheduling of what threads are running on the HTT enabled CPU.  Do you 
want another cache for each 'virtual' cpu?  Sounds like you might just 
want to go the next step and do a true MP system instead of virtual :).  
I'd blame the OS scheduler before Intel with regards to this cache issue.



:
:I think your broad suggestion is flawed.  Perhaps the only reason we
:*don't* see as many hardware-based bugs, is that when you are getting
:ready to put something in hardware, you are generally more interested in
:getting it right the first time, given the production costs.  The 
:problem is, the mode of failure is astronmically worse, as you can't
:easily patch any problems that do crop up.

I agree and disagree, I think if there were folks (kiddies) out there who 
could understand hardware design in & out's like they do PHP scripting, 
you'd find that there might be more bugs published in that arena.  
However, your point regarding "getting it right" is a good one... cost is 
key when doing hardware, so ensuring things are done "right" in the 
beginning is key.


:
:On another note:
:The unfortunately common misconception that 'appliances' are safe
:because they are "hardware devices" really needs to go.  Everything is a
:combination of hardware and software, and that's how it should be, from
:an engineering perspective.  
:
:>From a security perspective, software should be viewed as a living thing
:that constantly needs feeding, whether it is on a funny-looking
:rackmount proprietary computer, in your mobile phone, or on your
:desktop.
:
:tim
:_______________________________________________
:Full-Disclosure - We believe in it.
:Charter: http://lists.grok.org.uk/full-disclosure-charter.html
:Hosted and sponsored by Secunia - http://secunia.com/
:
:

--
Andrew R. Reiter
arr@...son.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ