On 01/27/18 13:33, Sebastian Götte wrote:
On 01/22/2018 08:33 AM, Peter Todd wrote:
Note that flash drives with physical write protect switches are available, such
as the Kanguru FlashBlu30 line.
While better than a regular r/w USB drive, I would not actually trust these. 
There's only going to be a regular USB flash controller inside, and the 
firmware on that one is just as good as the firmware on other USB drives.

The type of attack DVDs prevent is one where a compromised "download" or 
"checksum" machine compromises the USB drive firmware. The compromised USB drive then 
presents different data to different machines, e.g. the original iso to anyone checksumming and a 
modified iso to anyone booting. This attack requires a compromise of the USB flash drive controller 
via USB. This is realistic and has been demonstrated in the past.

I don't see the benefit of using a DVD (we're talking about USB DVD readers here) but maybe it's only me being thick... If the machine used to copy or checksum the payload/iso is compromised, then IMO it's already "game over" so I don't see how using a true read-only medium vs a regular flash drive would help.

A "physical write protect switch" is only going to be routed into that chip 
through a GPIO, so it does *not* protect against this attack. Write-protect on or off, 
most of the USB protocol logic inside the controller must be working in order to serve 
read requests.

DVDs fare better in this scenario. Even though you could also attack the reader 
firmware, the attacker has only one (large) static payload read by the firmware 
(the DVD). In case of the USB drive, the attacker has an interactive session 
over a complex, multi-layer protocol presenting much more attack surface.

Assuming the machine is not compromised and the payload/iso is legit, the only way for the bad USB device to modify the data would be on-the-fly:

- when writing the iso to the medium (in which case using a write-once-then-read-only doesn't help at all vs using a writable medium)

- when reading it, for instance at boot, presenting different data to different machines like you mentioned.

But:

1- How really feasible is it to implement this attack ? It would require tremendous processing power to properly alter the payload when it's been copied to the medium; it would also require tailoring the attack to qubes' isos, thus making it a targeted attack; I imagine that if you get to that point you probably have more important problems.

2- both the DVD reader and flash drive have a USB firmware, so how would the DVD reader's firmware be more "secure" than the USB flash drive's one ?

But then, I'm not a security expert and I may be talking total nonsense :) - I'd be happy to be proved wrong and learn something in the process...

Cheers,
Ivan

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/7438ac52-2a6c-be7a-0dc0-64fd41baaf98%40maa.bz.
For more options, visit https://groups.google.com/d/optout.

Reply via email to