TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Inception - Root any machine over FireWire, Thunderbolt, others

125 pointsby rdnover 11 years ago

13 comments

seldoover 11 years ago
It seems like the root problem here, as in lots of security problems, is an assumption made early on is no longer valid (e.g. "this application only runs on our LAN, so no need to protect against malicious actors"). In this case, PCI was originally an internal technology -- adding a new PCI device involved opening the case and plugging in a new card. Pluggable PCIe devices changed that assumption, so things that were previously pretty safe (trusting a new piece of hardware physically installed into the box) became unsafe (trusting a random device plugged into the box).
评论 #7123815 未加载
评论 #7126072 未加载
teddyhover 11 years ago
This part was especially interesting:<p><i>Q: Isn’t FireWire a dying horse? Few laptops ship with FireWire ports these days, which makes Inception a useless tool.<p>A: You can use any interface that expands the PCIe bus, for example PCMCIA, ExpressCards, the new Thunderbolt interface and perhaps SD&#x2F;IO to hotplug a FireWire interface into the victim machine. The OS will install the necessary drivers on the fly, even when the machine is locked.</i>
评论 #7123713 未加载
comexover 11 years ago
Note that on newer processors, VT-d is supposed to entirely prevent this attack on CPUs that support it (damn Intel), and OSes do use it [1]. I&#x27;m curious whether anyone has tried to search for bugs in those implementations.<p>[1] <a href="https://developer.apple.com/library/mac/documentation/HardwareDrivers/Conceptual/ThunderboltDevGuide/DebuggingThunderboltDrivers/DebuggingThunderboltDrivers.html" rel="nofollow">https:&#x2F;&#x2F;developer.apple.com&#x2F;library&#x2F;mac&#x2F;documentation&#x2F;Hardwa...</a>
评论 #7124275 未加载
captainmuonover 11 years ago
Wait, firewire devices are allowed to write to any address in memory they like to? How ridiculous is that? Why is there no memory protection?<p>I wonder how to block this... It seems like it can only write to the lower 4 GB... RAM is cheap... so add an addtional 4 GB and then modify the kernel to load everything critical above the boundary?
评论 #7126006 未加载
userbinatorover 11 years ago
Nothing exciting here... if you have physical access, it&#x27;s game over.
评论 #7123768 未加载
评论 #7123678 未加载
评论 #7125645 未加载
Sanddancerover 11 years ago
While this attack is a bit old, the proofs of concept remain, except you can do more fun things with certain hardware released in the interim. For example, Apple&#x27;s firewire display uses a broadcom networking chip that is susceptable to people writing malicious firmware for -- <a href="http://esec-lab.sogeti.com/post/2010/11/21/Presentation-at-Hack.lu-%3A-Reversing-the-Broacom-NetExtreme-s-firmware" rel="nofollow">http:&#x2F;&#x2F;esec-lab.sogeti.com&#x2F;post&#x2F;2010&#x2F;11&#x2F;21&#x2F;Presentation-at-H...</a> . Fitting a malicious payload into the given space may be a bit tough, but I imagine the intrepid hacker can do it with style and flare.
runn1ngover 11 years ago
(2011) should be added to the title; see the date of the comments below the article.
drakaalover 11 years ago
Couple of caveats. Many Laptops have Firewire ports that are attached via USB for cost reasons. These 1394 ports will do DV, and attached storage but are not DMA.<p>Thunderbolt on Windows 8 has an option for Allow DMA by Default, or not. This option is so that you can do a bit more prioritizing of your bandwidth.<p>Windows 8 also has a setting for &quot;install new hardware automatically&quot; which if you disable you can only install hardware if you are logged in and click the install button.<p>Windows 8 will also not allow you to install a new device if you are not logged in as Admin, or you have the Annoying UAC enabled.<p>So while Mac and some Linux systems will have this vulnerability because you don&#x27;t have to be an admin to have new hardware enabled if the drivers are on the system, Windows should be safe unless you changed your rights.<p>On a corporate network with machines where the users run in least user privilege, Windows 8, and Windows 7 users are safe.
kallebooover 11 years ago
&gt; Don’t panic – if you are using FileVault2 and OS X Lion (10.7.2) and higher, the OS will automatically turn off DMA when locked – you’re still vulnerable to attacks when unlocked, though<p>So, not really a problem then?
评论 #7124580 未加载
vezzy-fnordover 11 years ago
This is relatively old. I first recall seeing it a few years ago.
评论 #7123538 未加载
ballardover 11 years ago
0. Is there a way to disable FireWire and Thunderbolt ports on OSX?<p>1. Is there yet any I&#x2F;O firewall like Little Snitch or Hands Off! are for files and network?<p>2. Linux and Windows also desperately need I&#x2F;O firewalls.
评论 #7125652 未加载
alanhover 11 years ago
<i>OS X: Don’t panic – if you are using FileVault2 and OS X Lion (10.7.2) and higher, the OS will automatically turn off DMA when locked – you’re still vulnerable to attacks when unlocked, though</i><p>Phew.
almosnowover 11 years ago
Awesome work, loved thr name