Ague Mill:
> On Fri, Oct 12, 2012 at 06:15:07PM -0700, Steve Weis wrote:
>> Hi. I booted Tails' latest release and was able to scrape memory contents
>> via FireWire. All the necessary firewire modules are enabled by default and
>> Inception worked out of the box. This would let someone root a machine
>> through, say, a daisy chained thunderbolt monitor.
>>
>> I'd either remove support from the kernel, blacklist the modules in
>> modprobe, or disable support with a boot param.
> 
> We can't just do that. Tails is also meant to be a safe environment to
> produce sensitive documents. Being able to retrieve a video from a DV
> camera, edit it and send it online is a use case Tails should support.
> 

I'd hardly call this safe. I mean, sure - those video people are safely
able to download videos over firewire - but for every person that does
that, how many people will be vulnerable to DMA attacks without even
having a clue about firewire?

> From the recent discussions regarding ExpressCards and the likes, it
> looks like we are moving to a common pattern of "you have 5 minutes to
> plug things on those ports that can be dangerous, otherwise, they will
> be disabled". This should work for FireWire too, even if it feels more
> cumbersome to me than for an expansion card.
> 

As this is a modular kernel - is there a reason not to simply add a
"enable firewire" widget? That way everyone is secure by default and
when someone wishes to enable it, someone will be able to be notified of
the danger they have just enabled?

All the best,
Jacob

_______________________________________________
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev

Reply via email to