Re: [Hampshire] [OT] Saturday afternoon paranoia

2010-07-04 Thread Vic


> One [1] suggests that USB hardware can be used as a Trojan horse to
> steal your data.

I don't know if this is flawed research or flawed reporting, but the
article leaves a very misleading impression.

The researcher has correctly identified that there is an explicit trust
relationship between the OS and the hardware plugged into a USB port; the
identifiers handed over during the handshake are trusted as true. If
you're a military researcher - as these guys seem to be - then that's
probably the sort of thing that warrants investigation.

But what is to be gained from spoofing these identifiers? Simply that the
wrong driver is used to attempt to handle the device.

And here's where the article becomes misleading: USB devices do not inject
driver code, they use driver code that is already on the computer. Certain
OSes prompt for drivers if nothing suitable is already installed, others
just ignore the problem (and the device).

So to get malware onto the system, the driver installation route must be
compromised, as that is the only way for code to be placed onto the
machine.

Spoofing identifiers does give a potential attacker a better choice of
poor drivers to attempt to break - but the problem there is still in code
quality, not in system security. If drivers are written well in the first
place, a malfunctioning / nefarious piece of USB hardware should not be
able to bring the box down. And, of course, strange devices are likely to
be reported to the user - that is likely to lead to discovery of the
attack.

The details of their experiments are somewhat scant, but for them to have
had the successes they claim, either they deliberately loaded compromised
drivers, or they were running drivers that are easily compromised. The
first of these is easily discounted - it's hardly a feat to compromise a
box when you deliberately load the compromise yourself - and the latter is
just the usual noise about shoddy driver code.

Guess how much sleep I'm going to lose over this article...

Vic.


-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--


Re: [Hampshire] [OT] Saturday afternoon paranoia

2010-07-04 Thread Victor Churchill
interesting to see the range of opinions in the NS articles' comments,
regarding the 'rights and wrongs' of the reaearch being disclosed.

On 04/07/2010, Anton Piatek  wrote:
> On 3 July 2010 17:17, Dr A. J. Trickett  wrote:
>>
>>> One [1] suggests that USB hardware can be used as a Trojan horse to
>>> steal your data.
>>
>> It's possible. Though there are probably easier ways to steal data.
>
> I was wondering about this - but what device would it have to identify
> as in order to have a driver load that reads data from the OS? Surely
> the security flaw here is purely with any drivers that allow a USB
> device to read system activity. I would hope any device that has such
> drivers would need to be explicitly configured after plugging in...
>
> If you wanted to hack something by plugging in a USB device, then
> surely nobody will notice an extra USB dongle hanging out the back of
> their PC (A colleague at work certainly didn't notice the extra mouse
> going to the next desk, which allowed weeks of fun as you "tweak" his
> computer usage by occasionally moving his mouse around or scrolling
> unexpectedly)
>
> Anton
> --
> Anton Piatek
> email: an...@piatek.co.uk 
> blog/photos:  http://www.strangeparty.com
> pgp: [74B1FA37]   (http://www.strangeparty.com/anton.asc)
> fingerprint: 7401 96D3 E037 2F8F 5965  A358 4046 71FD 74B1 FA37
>
> No trees were destroyed in the sending of this message, however, a
> significant number of electrons were terribly inconvenienced.
>
> --
> Please post to: Hampshire@mailman.lug.org.uk
> Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
> LUG URL: http://www.hantslug.org.uk
> --
>


-- 
regards,

Victor Churchill
The Software Shack, Ltd

-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--


Re: [Hampshire] Lucid network manager

2010-07-04 Thread Chris Dennis
On 04/07/10 10:06, Rob Malpass wrote:
> *From:* hampshire-boun...@mailman.lug.org.uk
> [mailto:hampshire-boun...@mailman.lug.org.uk] *On Behalf Of *Jan Henkins
> *Sent:* 03 July 2010 19:45
> *To:* Hampshire LUG Discussion List
> *Subject:* Re: [Hampshire] Lucid network manager
>
> Thanks for your advice but I’m afraid one of the commands doesn’t work
> for me – and I’ve never been too hot with the route command... Here’s
> what happened:
>
> r...@gough:~$ sudo route del default gw

That should be just

   sudo route del default

cheers

Chris

-- 
Chris Dennis  cgden...@btinternet.com
Fordingbridge, Hampshire, UK

-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--

[Hampshire] suggest a laptop

2010-07-04 Thread pavithran
I am looking for a light weight laptop which is powerfull and also is
supported in GNU/linux ( hopes for all free drivers)

It would be nice if the laptop could run compiz + openoffice+ firefox(
10 tabs +gmail) without any delays .

Regards,
Pavithran



-- 
pavithran sakamuri

-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--


Re: [Hampshire] Lucid network manager

2010-07-04 Thread Rob Malpass
 

 

From: hampshire-boun...@mailman.lug.org.uk
[mailto:hampshire-boun...@mailman.lug.org.uk] On Behalf Of Jan Henkins
Sent: 03 July 2010 19:45
To: Hampshire LUG Discussion List
Subject: Re: [Hampshire] Lucid network manager

 

Thanks for your advice but I'm afraid one of the commands doesn't work for
me - and I've never been too hot with the route command...   Here's what
happened:

 

r...@gough:~$ sudo route del default gw

Usage: inet_route [-vF] del {-host|-net} Target[/prefix] [gw Gw] [metric M]
[[dev] If]

   inet_route [-vF] add {-host|-net} Target[/prefix] [gw Gw] [metric M]

  [netmask N] [mss Mss] [window W] [irtt I]

  [mod] [dyn] [reinstate] [[dev] If]

   inet_route [-vF] add {-host|-net} Target[/prefix] [metric M] reject

   inet_route [-FC] flush  NOT supported

 

The other commands do work - but not this one.   Grateful for any help.

 

Cheers

Rob

 

-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--

Re: [Hampshire] [OT] Saturday afternoon paranoia

2010-07-04 Thread Anton Piatek
On 3 July 2010 17:17, Dr A. J. Trickett  wrote:
>
>> One [1] suggests that USB hardware can be used as a Trojan horse to
>> steal your data.
>
> It's possible. Though there are probably easier ways to steal data.

I was wondering about this - but what device would it have to identify
as in order to have a driver load that reads data from the OS? Surely
the security flaw here is purely with any drivers that allow a USB
device to read system activity. I would hope any device that has such
drivers would need to be explicitly configured after plugging in...

If you wanted to hack something by plugging in a USB device, then
surely nobody will notice an extra USB dongle hanging out the back of
their PC (A colleague at work certainly didn't notice the extra mouse
going to the next desk, which allowed weeks of fun as you "tweak" his
computer usage by occasionally moving his mouse around or scrolling
unexpectedly)

Anton
-- 
Anton Piatek
email: an...@piatek.co.uk   
blog/photos:http://www.strangeparty.com
pgp: [74B1FA37] (http://www.strangeparty.com/anton.asc)
fingerprint: 7401 96D3 E037 2F8F 5965  A358 4046 71FD 74B1 FA37

No trees were destroyed in the sending of this message, however, a
significant number of electrons were terribly inconvenienced.

-- 
Please post to: Hampshire@mailman.lug.org.uk
Web Interface: https://mailman.lug.org.uk/mailman/listinfo/hampshire
LUG URL: http://www.hantslug.org.uk
--