|
|
Subscribe / Log in / New account

Brief items

Security

Security quotes of the week

So, after a long and tedious research, we finally succeeded in this mission. In fact, we found several critical vulnerabilities in all-in-one printers which allowed us to 'faxploit' the all-in-one printer and take complete control over it by sending a maliciously crafted fax.

From that point on, anything was possible. We decided the best way to showcase this control will be to use Eternal Blue in order to exploit any PC connected to the same network, and use that PC in order to exfiltrate data back to the attacker by sending ... a fax.

Eyal Itkin and Yaniv Balmas (Thanks to Paul Wise.)

Most impressively, Caliskan and a team of other researchers showed in a separate paper [PDF] that it's possible to de-anonymize a programmer using only their compiled binary code. After a developer finishes writing a section of code, a program called a compiler turns it into a series of 1s and 0s that can be read by a machine, called binary. To humans, it mostly looks like nonsense.

[Aylin] Caliskan and the other researchers she worked with can decompile the binary back into the C++ programming language, while preserving elements of a developer's unique style. Imagine you wrote a paper and used Google Translate to transform it into another language. While the text might seem completely different, elements of how you write are still embedded in traits like your syntax. The same holds true for code.

Louise Matsakis in Wired

We also find that many honeypots are deployed and forgotten about because part of the fingerprinting has been to determine how many people are not actively patching their systems! We find that 27% of the SSH honeypots have not been updated within the last 31 months and only 39% incorporate improvements from 7 months ago. It turns out that security professionals are as bad as anyone.
Alexander Vetterl

First, these bugs are mostly crashes: internal compiler errors ("ICEs"), assertion failures, and segfaults. Compiler crashes are usually not very high priority bugs -- especially when you are dealing with invalid programs. Most of the crashes would never occur "naturally" (i.e. as the result of a programmer trying to write some program). They represent very specific edge cases that may not be important at all in normal usage. So I am under no delusions about the relative importance of these bugs; a compiler crash is hardly a security risk.

However, I still think there is value in fuzzing compilers. Personally I find it very interesting that the same technique on rustc, the Rust compiler, only found 8 bugs in a couple of weeks of fuzzing, and not a single one of them was an actual segfault. I think it does say something about the nature of the code base, code quality, and the relative dangers of different programming languages, in case it was not clear already. In addition, compilers (and compiler writers) should have these fuzz testing techniques available to them, because it clearly finds bugs. Some of these bugs also point to underlying weaknesses or to general cases where something really could go wrong in a real program. In all, knowing about the bugs, even if they are relatively unimportant, will not hurt us.

Vegard Nossum does some compiler fuzzing

Comments (none posted)

Kernel development

Kernel release status

The 4.18 kernel was released on August 12. Linus said: "It was a very calm week, and arguably I could just have released on schedule last week, but we did have some minor updates."

Some of the significant features in this release include unprivileged filesystem mounts, restartable sequences, a new zero-copy TCP receive API, support for active state management for power domains, the AF_XDP mechanism for high-performance networking, the core bpfilter packet filter implementation, and more. See the KernelNewbies 4.18 page for more details.

Stable updates: 4.17.14, 4.14.62, 4.9.119, 4.4.147, and 3.18.118 were released on August 9. The 4.18.1, 4.17.15, 4.14.63, 4.9.120, and 4.4.148 updates, containing the L1TF fixes, are in the review process; they are due on August 16.

Comments (none posted)

Quote of the week

Everybody's got to have a hobby, mine is pathological posix locking cases.
J. Bruce Fields

Comments (none posted)

Development

bzip.org changes hands

The bzip2 compression algorithm has been slowly falling out of favor, but is still used heavily across the net. A search for "bzip2 source" returns bzip.org as the first three results. But it would seem that the owner of this domain has let it go, and it is now parked and running ads. So we no longer have an official home for bzip2. If a new repository or tarball does turn up at that domain, it should be looked at closely before being trusted. (Thanks to Jason Kushmaul).

Comments (62 posted)

Development quotes of the week

It would be nice to know where the 30-[minute] timeout had been coming from, so I could enable it after, say, 90 or 120 minutes. A timeout sounds like a good thing, if it's something the user can configure. But like so many systemd functions, no one who writes documentation seems to know how it actually works, and those who know aren't telling.
Akkana Peck

TLS 1.2 wears parachute pants and shoulder pads
Nick Sullivan (fortunately TLS 1.3 is out)

And honestly: what’s an interpreter?

The text of the license and the interpretation proposed in the FAQ both suggest that as long as all the information that a program relies on to run is contained in the input stream of an interpreter, the GPL – and if their argument sticks, other open source licenses – simply… doesn’t apply. And I can’t find any other major free or open-source licenses that address this question at all.

It just seems like such a weird place for an oversight. And given the often-adversarial nature of these discussions, given the stakes, there’s no way I’m the only person who’s ever noticed this. You have to suspect that somewhere in the world some jackass with a very expensive briefcase has an untested legal brief warmed up and ready to go arguing that a CPU’s microcode is an “interpreter” and therefore the GPL is functionally meaningless.

Mike Hoye

Comments (20 posted)

Page editor: Jake Edge
Next page: Announcements>>


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds