[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
I can't find any poc for sound card.  I imagine it would be possible though,  
maybe it depends on the card like probably a plugged in one.  But i'm talking 
out my ass and have no idea what I'm talking about.  Maybe in future qubes will 
be isolating the sound controller as well lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a30d7d4-94f3-47d2-b52e-87e4f033bb9e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
On Friday, July 15, 2016 at 12:00:57 AM UTC-4, neilh...@gmail.com wrote:
> Oh OK. I see you have now updated with a new answer.
> 
> "The main benefit would be to try and prevent dma attacks from the network 
> card and the netvm,   which receives all the packets from the internet"

maybe just a MITM,  maybe your infected router infecting your netcard.  I mean 
I really don't know there is many possibilities on where the malicious packet 
is coming from.

I don't really think attack would be coming from an infected appvm,  which 
should be noted is also not easy to make persistent.  But it is possible for an 
infected appvm to then infect netvm and then change your netcard firmware I 
guess.  again not as easy as just that magic packet coming from god knows where 
to your very vulnerable network card.

You know what,  get the iommu machine,  its also not 100% (nothing is) but it 
would make it alot harder.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6449d6ef-eb1d-4423-b71c-40bf12a81545%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread neilhardley
So essentially, this is isolating the network card/Wifi from dom0..

Just like you create a USB qube, to isolate USB from dom0

But still.. no one has ever shown a proof of concept for this... You see plenty 
of videos of people exploiting browsers with Metasploit... but no videos of 
anyone doing DMA attacks

Still, I take Joanna's word for it that it's a real thing. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3488f64-b5da-4581-a77f-972225ad7bd2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
On Friday, July 15, 2016 at 12:00:11 AM UTC-4, raah...@gmail.com wrote:
> On Thursday, July 14, 2016 at 11:57:48 PM UTC-4, neilh...@gmail.com wrote:
> > But it's still not clear how these malicious packets can be sent to the 
> > network card can these be sent after compromising an App VM (via 
> > something like a browser exploit)...?? 
> > 
> > Or can they be sent just purely over the internet itself to any device 
> > connected to the web...? Directly send packets just over the web?
> > 
> > Or does it require attacking the Net VM, and not just the App VM... however 
> > that would be done...?
> > 
> > I'm just trying to figure out FROM WHERE the network card could be attacked.
> 
> all network packets go to your network card.  I'm not sure what you mean?  It 
> can be attacked from anywhere in the world wide web.

I guess you are asking me specifically how?  I dunno man i'm a noob.  I guess 
there is many ways,  for example reverse shell from buggy dhclient or icmp 
packet.  or who the heck knows.  Probably too many possibilities to list.  
Joannas blog mentioned poc from buffer overflow.

Anothing thing to consider is you have to trust the intel firmware sometimes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b0d3cd9-2dd1-48c3-9279-852f3ccd083d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread neilhardley
Oh OK. I see you have now updated with a new answer.

"The main benefit would be to try and prevent dma attacks from the network card 
and the netvm,   which receives all the packets from the internet"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c59266e7-0738-4ed0-af25-90996a5d1322%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
On Thursday, July 14, 2016 at 11:57:48 PM UTC-4, neilh...@gmail.com wrote:
> But it's still not clear how these malicious packets can be sent to the 
> network card can these be sent after compromising an App VM (via 
> something like a browser exploit)...?? 
> 
> Or can they be sent just purely over the internet itself to any device 
> connected to the web...? Directly send packets just over the web?
> 
> Or does it require attacking the Net VM, and not just the App VM... however 
> that would be done...?
> 
> I'm just trying to figure out FROM WHERE the network card could be attacked.

all network packets go to your network card.  I'm not sure what you mean?  It 
can be attacked from anywhere in the world wide web.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f786f78-c036-4dfd-900d-a6bca73db465%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread neilhardley
But it's still not clear how these malicious packets can be sent to the network 
card can these be sent after compromising an App VM (via something like a 
browser exploit)...?? 

Or can they be sent just purely over the internet itself to any device 
connected to the web...? Directly send packets just over the web?

Or does it require attacking the Net VM, and not just the App VM... however 
that would be done...?

I'm just trying to figure out FROM WHERE the network card could be attacked.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24ed289e-dec9-4d6e-86b8-14763a5bcf37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
On Thursday, July 14, 2016 at 10:22:28 PM UTC-4, neilh...@gmail.com wrote:
> From the user FAQ:
> 
> https://www.qubes-os.org/doc/user-faq/#can-i-install-qubes-on-a-system-without-vt-d
> 
> "an attacker could always use a simple DMA attack to go from the NetVM to 
> Dom0"
> 
> So what does this mean though..?
> 
> Can they launch this DMA attack from a compromised App VM..?
> 
> Could they simply do a browser exploit in an App VM, and then do a DMA attack 
> from there to go to dom0..?
> 
> Or is it a lot harder than that..?
> 
> I'm just trying to work out whether it's really worth buying a new laptop 
> just to get VT-D I currently have VT-X, but not VT-D.
  

I'm no expert but I'll try to answer your questions.

DMA generally means malware put in the network card or graphics card to get 
direct memory access.  In other words malware going straight from the piece 
hardware bypassing the operating system software to use, or retrieve, or 
manipulate the running memory directly.  

Its not a browser exploit unless somehow the browser exploits and infects the 
graphics card which is highly unlikely in qubes since most of the gpu functions 
is limited to dom0 and not in the appvm where you would be running your browser.

The main benefit would be to try and prevent dma attacks from the network card 
and the netvm,   which receives all the packets from the internet, and which 
qubes considers always unsafe.  How hard is it?  Probably not as hard as 
infecting the gpu card, and well i'm only a noob but I doubt its very easy.  
Its probably something that would happen from a more personal or targeted 
attack, not something random.  But then again this is 2016 so who knows lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0ad504e-04fc-423f-8a79-bd6082e2a1ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question on DMA attacks

2016-07-14 Thread raahelps
On Thursday, July 14, 2016 at 10:22:28 PM UTC-4, neilh...@gmail.com wrote:
> From the user FAQ:
> 
> https://www.qubes-os.org/doc/user-faq/#can-i-install-qubes-on-a-system-without-vt-d
> 
> "an attacker could always use a simple DMA attack to go from the NetVM to 
> Dom0"
> 
> So what does this mean though..?
> 
> Can they launch this DMA attack from a compromised App VM..?
> 
> Could they simply do a browser exploit in an App VM, and then do a DMA attack 
> from there to go to dom0..?
> 
> Or is it a lot harder than that..?
> 
> I'm just trying to work out whether it's really worth buying a new laptop 
> just to get VT-D I currently have VT-X, but not VT-D.

I guess its up to your budget man.  Maybe this will help you decide.  
http://theinvisiblethings.blogspot.com/2010/04/remotely-attacking-network-cards-or-why.html

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f741e714-84a1-4847-a6a3-a0bd1a8527a7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.