Hi,

some approaches were discussed in 2010, by Graeme Neilson from NZ here:

https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf

a later year, at the same conference, he gave a private session demonstrating 
basically the same stuff for JunOS, as ongoing (and, at the time, non-public) 
research.

happy NYE to everybody

Enno

On Tue, Dec 31, 2013 at 06:50:11PM +0200, Saku Ytti wrote:
> On (2013-12-31 09:03 -0600), Leo Bicknell wrote:
> 
> > If I were Cisco/Juniper/et all I would have a team working on this right 
> > now.
> > It should be trivial for them to insert code into the routers that say, 
> > hashes all sorts of things (code image, BIOS, any PROMS and EERPOMS and
> > such on the linecards) and submits all of those signatures back.  Any
> 
> I asked earlier today JTAC (#2013-1231-0033) and JTAC asked SIRT for tool to
> read BIOS and output SHA2 or SHA3 hash, and such tool does not exist yet.  I'm
> dubious, it might be possible even with existing tools. At least it's possible
> to reflash the BIOS with stock JunOS, as lot of us had to do due to
> misformatted SSD disks.
> But fully agreed some of these sanity checks should be added, it's not cure
> all, maybe the attack changes the answers before showing them, maybe BIOS
> comes infected from Juniper or from Kontron. But it would create additional
> barrier.
> 
> I also emailed Kontrol and told it would be prudent for them to do press
> release also. Just to know what their public/official statement is.
> 
> > I also wonder how this will change engineering going forward.  Maybe the
> > BIOS should be a ROM chip, not an EEPROM again.  Maybe the write line needs
> > to be run through a physical jumper on the motherboard that is normally
> > not present.
> 
> We can take page from XBOX360 which is designed to be resistant against attack
> with physical access. Key idea is that use PKI and hide key in such place
> where it's difficult to recover, namely, if it's inside modern lithography CPU
> in read-only, it's just financially unviable vector. MS just goofed and forgot
> to sign DVD firmware.
> 
> > Why do we accept our devices, be it a PC or a router, can be "persistently"
> > infected.  The hardware industry needs to do better.
> 
> I'm still taking all these revelations with grain of salt, until real
> speciment is dissected.
> 
> -- 
>   ++ytti
> 

-- 
Enno Rey

ERNW GmbH - Carl-Bosch-Str. 4 - 69115 Heidelberg - www.ernw.de
Tel. +49 6221 480390 - Fax 6221 419008 - Cell +49 173 6745902 

Handelsregister Mannheim: HRB 337135
Geschaeftsfuehrer: Enno Rey

=======================================================
Blog: www.insinuator.net || Conference: www.troopers.de
=======================================================

Reply via email to