|
|
Subscribe / Log in / New account

The Thunderclap vulnerabilities

The Thunderclap vulnerabilities

Posted Mar 7, 2019 2:15 UTC (Thu) by arekkusu (guest, #54092)
In reply to: The Thunderclap vulnerabilities by flussence
Parent article: The Thunderclap vulnerabilities

Nothing new with DMA being dangerous (and also useful of debugging). However we're in 2019 and I think providing unrestricted DMA to external device should not be acceptable.

What constitute an external or internal interface might not be obvious for some attack. For example the SATA port on my ThinkPad UltraBay is quite accessible. Disabling FireWire and other unused port in the BIOS is something I've been doing for a long time.

But a USB Type-C connector is something everyone will be using. Considering Thunderbolt 3 will become USB4, it is a real concern. And just telling user to not plug in "untrusted device" is not good enough.

And my understanding is that this can not be fully fixed at the OS level:

"Kernel DMA Protection only protects against drive-by DMA attacks after the OS is loaded. It is the responsibility of the system firmware/BIOS to protect against attacks via the Thunderboltâ„¢ 3 ports during boot."
Ref: https://docs.microsoft.com/en-us/windows/security/informa...


to post comments

The Thunderclap vulnerabilities

Posted Mar 7, 2019 8:35 UTC (Thu) by mangix (guest, #126006) [Link] (1 responses)

Actually there will be a USB 3.2 which brings the same speed as thunderbolt 3 but for USB (so no DMA).

The Thunderclap vulnerabilities

Posted Mar 7, 2019 17:39 UTC (Thu) by mebrown (subscriber, #7960) [Link]

Thunderbolt 3 - 40Gbps top speed
USB 3.2 2x2 superspeed - 20Gbps top speed

We don't get equivalent top speeds until USB4 is released.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds