On 2023-08-18, whistlez <whistlez...@riseup.net> wrote:
>
> 2. There are multiple methods for RAM dumping, some of which cannot be
> circumvented and do not require specific software or interfaces. For
> example:
>     a. Through a 'cold boot attack,' it's possible to dump RAM from an
> uncompromised operating system. (Reference:
> https://en.wikipedia.org/wiki/Cold_boot_attack)
>     b. Through a DMA attack, leveraging FireWire or other hardware
> interfaces, it's possible to dump RAM. I believe that, in this case, as
> in the previous one, the kernel would be completely unaware. An example
> of this kind of attack and dump is "inception"
> (https://github.com/carmaa/inception).
>     c. In a virtualized environment such as VMM, VirtualBox, VMware,
> etc. (we know OpenBSD can be virtualized), you can acquire RAM without
> the operating system knowing.

I think it would be better to concentrate on the above methods.

They don't rely on bypassing security measures in the OS (allowing /dev/mem
from userland means you turn some possible attacks from "must subvert the
kernel" to "must subvert root"), and sidestep the "can you trust the kernel"
problem.


-- 
Please keep replies on the mailing list.

Reply via email to