[tor-relays] Exploiting firmware
diffusae
punasipuli at t-online.de
Wed Dec 7 22:48:38 UTC 2016
Which "other parts" do you mean? The GPU blob or Raspbian?
You don't need to use the stock distribution.
On 07.12.2016 23:10, Duncan Guthrie wrote:
> What I was originally getting at was that the parts of the Raspberry Pi
> that are completely proprietary - while there is a free software
> implementation of the GPU blob, most people don't use that, as they are
> on stock Rasbian, which includes all the nasty "other parts" - are a
> great possibility for hijacking, perhaps through malicious code running
> on the GPU, which controls the CPU in several ways. The problem with
> this isn't that this is unique (Intel computers having so much more
> attack surface) but that a flaw in lots of these small computers that
> power a portion of the network means that an exploit in them due to lack
> of diversity would be much more serious.
Better a lots of these small computers than none ...
> The management engine blob is also very serious. One possible mitigation
> might be to run the relays in VMs with good isolation, e.g. Xen on
> recent hardware which has good IOMMU. This makes it much harder to
> exploit the actual software that runs on the ME since the VMs would, in
> theory, have no access to hardware.
>
> It should be of concern on any hardware that is being used for related
> purposes, I think. However, whether it works out in practice as a
> backdoor that is worth exploiting vs other methods is debatable.
>
> Regardless, diversity is good.
That's true!
Regards,
> On 07/12/16 20:35, Gumby wrote:
>> Subject seems to have changed a bit, so not hijacking it.
>> When thinking of any exploitation of firmware - should there be
>> concerns of Intel's Management Engine in the CPU of any relays
>> running on "home hardware" in any common unused pc or laptop?
>> Should that be a concern on ANY newer Intel hardware?
>>
>> Gumby
More information about the tor-relays
mailing list