|
|
Subscribe / Log in / New account

Brief items

Security

Intel x86 Root of Trust: loss of trust

The Positive Technologies blog is reporting on an unfixable flaw the company has found in Intel x86 hardware that has the potential to subvert the hardware root of trust for a variety of processors.

The EPID [Enhanced Privacy ID] issue is not too bad for the time being because the Chipset Key is stored inside the platform in the One-Time Programmable (OTP) Memory, and is encrypted. To fully compromise EPID, hackers would need to extract the hardware key used to encrypt the Chipset Key, which resides in Secure Key Storage (SKS). However, this key is not platform-specific. A single key is used for an entire generation of Intel chipsets. And since the ROM vulnerability allows seizing control of code execution before the hardware key generation mechanism in the SKS is locked, and the ROM vulnerability cannot be fixed, we believe that extracting this key is only a matter of time. When this happens, utter chaos will reign. Hardware IDs will be forged, digital content will be extracted, and data from encrypted hard disks will be decrypted.

Intel has said that it is aware of the problem (CVE-2019-0090), but since it cannot be fixed in the ROM, Intel is "trying to block all possible exploitation vectors"; the fix for CVE-2019-0090 only blocks one such vector, according to the blog post.

Comments (43 posted)

Security quotes of the week

To me, the history of the Crypto operation helps to explain how U.S. spy agencies became accustomed to, if not addicted to, global surveillance. This program went on for more than 50 years, monitoring the communications of more than 100 countries. I mean, the United States came to expect that kind of penetration, that kind of global surveillance capability. And as Crypto became less able to deliver it, the United States turned to other ways to replace that. And the Snowden documents tell us a lot about how they did that. Instead of working through this company in Switzerland, they turned their sights to companies like Google and Apple and Microsoft and found ways to exploit their global penetration. And so I think it tells us a lot about the mindset and the personalities of spy agencies as well as the global surveillance apparatus that followed the Crypto operation.
— From an interview of Greg Miller on the CIA-owned Crypto AG company (worth reading in full)

All this raises a question, though: just how bad is the CIA’s security that it wasn’t able to keep [Joshua] Schulte out, even accounting for the fact that he is a hacking and computer specialist? And the answer is: absolutely terrible.

The password for the Confluence virtual machine that held all the hacking tools that were stolen and leaked? That’ll be 123ABCdef. And the root login for the main DevLAN server? mysweetsummer.

It actually gets worse than that. Those passwords were shared by the entire team and posted on the group’s intranet. IRC chats published during the trial even revealed team members talking about how terrible their infosec practices were, and joked that CIA internal security would go nuts if they knew. Their justification? The intranet was restricted to members of the Operational Support Branch (OSB): the elite programming unit that makes the CIA’s hacking tools.

Kieren McCarthy reporting on the trial of alleged CIA leaker Joshua Schulte

Comments (none posted)

Kernel development

Kernel release status

The current development kernel is 5.6-rc5, released on March 8. Linus said: "That said, everything looks mostly fine. I say 'mostly', because while nothing in particular looks worrisome, this rc5 is bigger than I'd have liked. In fact, it's not only bigger than rc4 was, but it's bigger than we historically are at this point."

Stable updates: 5.5.8, 5.4.24, and 4.19.108 were released on March 5.

The 5.5.9, 5.4.25, 4.19.109, 4.14.173, 4.9.216, and 4.4.216 updates are all in the review process; they are due on March 12.

Comments (none posted)

Ekstrand: Plumbing explicit synchronization through the Linux ecosystem

For those who are interested in the details of graphics synchronization: Jason Ekstrand describes in detail the value of explicit synchronization, the reason why we can't have it now, and a proposal for eventually making it possible to go explicit. "Explicit synchronization is the future of graphics and media. At least, that seems to be the consensus among all the graphics people I've talked to. I had a chat with one of the lead Android graphics engineers recently who told me that doing explicit sync from the start was one of the best engineering decisions Android ever made. It's also the direction being taken by more modern APIs such as Vulkan."

Full Story (comments: 8)

Quotes of the week

Networks are not intrinsically more special than any other I/O peripheral, but they have become gilded unicorns mounted on rotating hovercrafts compared to the I/O devices Unix supported before them.
Rob Pike

If we can have technical means to prevent the wreckage, then not using them for handwaving reasons is just violating the only sane engineering principle:
Correctness first
I spent the last 20 years mopping up the violations of this principle.

We have to stop the "features first, performance first" and "good enough" mentality if we want to master the ever increasing complexity of hardware and software in the long run.

From my experience of cleaning up stuff, I can tell you, that correctness first neither hurts performance nor does it prevent features, except those which are wrong to begin with.

Thomas Gleixner

Comments (12 posted)

Distributions

Announcing the start of DNF 5 development

DNF, the Fedora package manager, is going to be significantly rewritten; it seems it is truly "development not finished" for now. "We've managed to drop a lot of redundant code across the whole DNF stack in the past years, but we have reached a point when it's nearly impossible to consolidate the code any further without breaking the API/ABI. Especially with PackageKit being dead, we can't move with the old 'libhif' API in libdnf, because making any bigger changes to PackageKit is clearly out of scope."

Full Story (comments: none)

Development

Firefox 74.0

The latest release of Firefox features some login management improvements, the ability to add custom sites to the Facebook Container, better privacy for web voice and video calls, and better add-on management. See the release notes for more information.

Comments (5 posted)

GNOME 3.36 released

Version 3.36 of the GNOME desktop environment is out. "This release brings a new lock screen and a new app for managing shell extensions, among other things. Once again, the shell has received many performance improvements. Improvements to core GNOME applications include better support for metered networks and parental controls in GNOME Software, a new look for the initial setup assistant, a redesigned GNOME Clocks, and many more." See the release notes for details and screenshots.

Full Story (comments: 79)

Bouzas: PipeWire, the media service transforming the Linux multimedia landscape

Over on the Collabora blog, Julian Bouzas writes about PipeWire, which is a relatively new multimedia server for the Linux desktop and beyond.

PipeWire was originally created to only handle access to video resources and co-exist with PulseAudio. Earlier versions have already been shipping in Fedora for a while, allowing Flatpak applications to access video cameras and to implement screen sharing on Wayland. Eventually, PipeWire has ended up handling any kind of media, to the point of planning to completely replace PulseAudio in the future. The new 0.3 version is marked as a preview for audio support.

But why replace PulseAudio? Although PulseAudio already provides a working intermediate layer to access audio devices, PipeWire has to offer more features that PulseAudio was not designed to deliver, starting with a better security model, which allows isolation between applications and secure access from within containers.

Another interesting feature of PipeWire is that it unifies the two audio systems used on the desktop, JACK for low-latency professional audio and PulseAudio for normal desktop use-cases. PipeWire was designed to be able to accommodate both use cases, delivering very low latency, while at the same time not wasting CPU resources. This design also makes PipeWire a much more efficient solution than PulseAudio in general, making it a perfect fit for embedded use cases too.

Comments (68 posted)

systemd 245 released

Systemd 245 is out. As usual, the list of new features is long; perhaps the one that has gained the most attention is systemd-homed:

A small new service systemd-homed.service has been added, that may be used to securely manage home directories with built-in encryption. The complete user record data is unified with the home directory, thus making home directories naturally migratable.

There is also a new database for holding user and group data and a systemd-repart tool for the management of partitions on storage-devices at boot time.

Full Story (comments: 69)

Development quote of the week

Someone tried using rr to debug gdb and reported an rr issue because it didn't work. With some effort I was able to fix a couple of bugs and get it working for simple cases. Using improved debuggers to improve debuggers feels good!
Robert O'Callahan (Thanks to Paul Wise)

Comments (none posted)

Page editor: Jake Edge
Next page: Announcements>>


Copyright © 2020, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds