Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-14 Thread Mirimir
On 10/13/2018 10:50 PM, grarpamp wrote:



>> But write-once CDs are pretty safe, I think. No?
> 
> In customary use, probably, far more than any of the formerly
> mentioned non hardware write protectable devices.
> 
> To be sure you'd need to use it in a old drive that has no
> writing capability, or a writer that had its writing physically
> disabled.

Yeah, good point. But hey, they're probably about free on eBay.

> Yet there's probably not really a thing as hardware
> write once optical...

Right. I'd forgotten about multisession recording on CD-R:[0]

| With multisession-capable recording software, you can reuse
| a partially used CD-R by creating a new session on the remaining
| blank space of the disc. When you do so, however, the previous
| sessions become inaccessible. Only the last session on the disc
| can be read. This might be useful if you back up a small number
| of files every day and you don’t need the previous day’s backups
| after you have made today’s copy. You could use the same CD
| several times and always have access to the most recent copies.

That in itself wouldn't be very useful for a system running from the
CD-R, because it would nuke itself by doing multisession recording.

But ...

> There's a spinning layer of stuff with a laser pointing at it,
> and a firmware blob deciding to tell it to fire.
> There's no hardware write protect for the laser enable, or the
> firmware, and the firmware is clearly hackable and flashable by
> the user, hacked, or backdoor commanded system. That's enough
> to burn down unburnt bits on the media causing instruction /
> addressing / data changes, extending capacity by raw appending
> or extra sessions, etc.

So yeah, stuff could probably be written. Maybe it'd help to use all
disk capacity when writing, by appending random-data file(s) at the end
of the write. But ...

> Last thing needed is laser sync into pre existing track
> (possibly using servo tracks) for the burn down / append /
> additional sessions. Totally forget all of little about the media
> and laser controller there so you'd have to research what the
> laser servo mech uses to do something useful.

That's over my head. Maybe there are gaps in tracks, which could be used
to store new data. Or maybe it's possible to write slightly off track,
without hosing existing data. I have no clue.

> Under attack, optical is probably not as "write once" as people
> might think, let alone as random / corruptive scribble proof.

Those are good points. So what? Paper tape, in a reader that can't punch
holes? But seriously, using CD readers with wimpy lasers that can't
alter the disks is probably best.

> Exploiting optical would be worth a big pile of Defcon / CCC
> lulz for anyone who can demo a POC of it.
> 
> Explore it :)

:)

0) https://www.techrepublic.com/article/all-about-cd-r-and-cd-rw/


Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-13 Thread grarpamp
>> There is never "no" disk, just a matter of which ones
>> are plugged into the box, physically, or remotely.

> using USB

... is using an attached disk, ie: a read-write [block device],
that can be trivially written to by / through the kernel driver
interfaces or in the raw. Unless it has a hardware write protect
that is enabled.

> But write-once CDs are pretty safe, I think. No?

In customary use, probably, far more than any of the formerly
mentioned non hardware write protectable devices.

To be sure you'd need to use it in a old drive that has no
writing capability, or a writer that had its writing physically
disabled.

Yet there's probably not really a thing as hardware
write once optical...

There's a spinning layer of stuff with a laser pointing at it,
and a firmware blob deciding to tell it to fire.
There's no hardware write protect for the laser enable, or the
firmware, and the firmware is clearly hackable and flashable by
the user, hacked, or backdoor commanded system. That's enough
to burn down unburnt bits on the media causing instruction /
addressing / data changes, extending capacity by raw appending
or extra sessions, etc.
Last thing needed is laser sync into pre existing track
(possibly using servo tracks) for the burn down / append /
additional sessions. Totally forget all of little about the media
and laser controller there so you'd have to research what the
laser servo mech uses to do something useful.

Under attack, optical is probably not as "write once" as people
might think, let alone as random / corruptive scribble proof.

Exploiting optical would be worth a big pile of Defcon / CCC
lulz for anyone who can demo a POC of it.

Explore it :)


Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-13 Thread Zenaan Harkness
On Sat, Oct 13, 2018 at 08:35:09PM -0400, Steve Kinney wrote:
> On 10/13/2018 08:42 AM, Mirimir wrote:
> >> There is never "no" disk, just a matter of which ones
> >> are plugged into the box, physically, or remotely.
> > 
> > OK, I should have said "unless there _is_ no disk, as there _can be_ in
> > Tails". I've run Tails (and my own LiveCDs) on diskless machines. And
> > yes, using USB for live systems is iffy. But write-once CDs are pretty
> > safe, I think. No?
> 
> Well heck, CDs are cheap.  Write once, use once, melt once.  If your
> trust in the Live CD vendor and the "trusted" device used to burn your
> stack of Live OS CDs is well founded, and the device booted into has no
> drive (or a power switch on the drive - a very trivial hack even with a
> laptop), the only things left to worry about are undocumented debugging
> modules on the CPU, and maybe undocumented BIOS or video chip features.
> 
> If your activities present a target important enough to justify use of
> TS/SCI techniques against you, your activities are probably important
> enough to justify purchasing obsolete laptops in bulk and destroying
> each after one use.  "Fingerprint MY hardware will ya, you bastards?
> HA!  Take that!"  Just sayin'.

Indeed.

Chameleon HW ftw I guess - #OpenHW #OpenFabs

Parameterizable everything - as in, every parameter which can be used
to identify say a network device and any anomalies it might otherwise
present to the world (clock skew, obvious MAC addy, any software/bios
built into the network chip "hardware" and its parameters) and of
course up the stack.


> Everything depends largely on one's threat model.  Who are your
> potential adversaries, what are their potential resources, and what's
> their cost/benefit ratio for doing what it takes to crack your system?
> Educated guesses here establish parameters for reasonable defensive
> measures also based on cost/benefit factors.  Spoiler:  For most of the
> users most of the time, precautions beyond using a Live OS on a stick
> don't make much sense.

Ack.


> Always consider that the cost of using information obtained via a
> previously unsuspected attack vector includes a risk of exposing that
> vector's existence.  Parallel construction covers a multitude of sins
> but not all of them, all of the time.
> 
> :o)


Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-13 Thread Steve Kinney


On 10/13/2018 08:42 AM, Mirimir wrote:

>> There is never "no" disk, just a matter of which ones
>> are plugged into the box, physically, or remotely.
> 
> OK, I should have said "unless there _is_ no disk, as there _can be_ in
> Tails". I've run Tails (and my own LiveCDs) on diskless machines. And
> yes, using USB for live systems is iffy. But write-once CDs are pretty
> safe, I think. No?

Well heck, CDs are cheap.  Write once, use once, melt once.  If your
trust in the Live CD vendor and the "trusted" device used to burn your
stack of Live OS CDs is well founded, and the device booted into has no
drive (or a power switch on the drive - a very trivial hack even with a
laptop), the only things left to worry about are undocumented debugging
modules on the CPU, and maybe undocumented BIOS or video chip features.

If your activities present a target important enough to justify use of
TS/SCI techniques against you, your activities are probably important
enough to justify purchasing obsolete laptops in bulk and destroying
each after one use.  "Fingerprint MY hardware will ya, you bastards?
HA!  Take that!"  Just sayin'.

Everything depends largely on one's threat model.  Who are your
potential adversaries, what are their potential resources, and what's
their cost/benefit ratio for doing what it takes to crack your system?
Educated guesses here establish parameters for reasonable defensive
measures also based on cost/benefit factors.  Spoiler:  For most of the
users most of the time, precautions beyond using a Live OS on a stick
don't make much sense.

Always consider that the cost of using information obtained via a
previously unsuspected attack vector includes a risk of exposing that
vector's existence.  Parallel construction covers a multitude of sins
but not all of them, all of the time.

:o)






signature.asc
Description: OpenPGP digital signature


Re: Media Write Protection / Crypto Devices / BadUSB - #OpenFabs #OpenHW

2018-10-13 Thread Mirimir
On 10/12/2018 11:56 PM, grarpamp wrote:
 This is the use case for Tails. . . . [T]here are no writes to storage,
 unless users configure [otherwise] . . . .
> 
>> Sure, but this isn't a _Tor_ issue. It's just about Tor browser, which
>> is just (heavily) modified Firefox. And although I'm no software expert,
>> I'm guessing that it's impossible to guarantee what some code will or
>> won't leave behind when it crashes. Even if you tweaked the browser to
>> never write temp files to disk, and keep everything in RAM, you couldn't
>> guarantee that the OS won't write stuff to disk.
> 
>> That is, unless there _is_ no disk, as in Tails. Even with Whonix,
>> traces likely remain in the virtual disk.
> 
> There is never "no" disk, just a matter of which ones
> are plugged into the box, physically, or remotely.

OK, I should have said "unless there _is_ no disk, as there _can be_ in
Tails". I've run Tails (and my own LiveCDs) on diskless machines. And
yes, using USB for live systems is iffy. But write-once CDs are pretty
safe, I think. No?