Kernel security: beyond bug fixing
Kernel security: beyond bug fixing
Posted Nov 1, 2015 8:08 UTC (Sun) by JdGordy (subscriber, #70103)In reply to: Kernel security: beyond bug fixing by alonz
Parent article: Kernel security: beyond bug fixing
Store the kernel as an archive library (.a file) on the device, and make the boot loader complete the link process—and randomize the order of sections/functions while doing so. This can add much more “noise” to kernel addresses than plain KASLR."
Both of those need a good source of randomness at boot time, which IoT devices wont have (or if they have they will be assumed to be backdoored)
Posted Nov 1, 2015 8:37 UTC (Sun)
by alonz (subscriber, #815)
[Link] (5 responses)
How pessimistic :)
Many chipsets already provide hardware RNGs; I can hope that there will be more of those as time goes by.
As for these RNGs being backdoored... I know the ones I designed were not (alas, I'm not certain what chipsets still use those). I believe this is the case for at least most of the devices: contrary to popular belief, most companies designing IoT devices truly care about their customers' security (or, at least, they truly are afraid of the backlash if they're revealed to have put backdoors in place without advertising them).
Posted Nov 2, 2015 9:51 UTC (Mon)
by cladisch (✭ supporter ✭, #50193)
[Link] (4 responses)
For example, Atmel's ATSHA204* and some other chips appear to have a very poor random source, and try to paper over this with a PRNG based on a unique serial number. They do store the current state in their EEPROM, so you have to choose between repeated values, or risking to wear out the EEPROM.
A very common error is trying to use a von Neumann extractor to remove correlations (this extractor is guaranteed to work only on data that has no correlations to begin with). Lots of software, and Intel's 82802 and Via's Padlock RNGs have this error.
Posted Nov 3, 2015 5:24 UTC (Tue)
by JdGordy (subscriber, #70103)
[Link] (3 responses)
pardon?!
Posted Nov 3, 2015 7:42 UTC (Tue)
by cladisch (✭ supporter ✭, #50193)
[Link] (2 responses)
Posted Nov 16, 2015 4:10 UTC (Mon)
by kevinm (guest, #69913)
[Link] (1 responses)
Posted Nov 16, 2015 5:55 UTC (Mon)
by cladisch (✭ supporter ✭, #50193)
[Link]
> Both of those need a good source of randomness at boot time, which IoT devices wont haveKernel security: beyond bug fixing
> (or if they have they will be assumed to be backdoored)
Kernel security: beyond bug fixing
Kernel security: beyond bug fixing
von Neumann extractor is not useful
von Neumann extractor is not useful
von Neumann extractor is not useful
(You cannot use the same bit for two decisions; that would break the output, too.)