Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Lawnmowing Business - College Alternative (Score 1) 226

if you can even start with out a college degree, you would be at 45k/yr (they would take advantage of your ignorance), and the same person with a degree would start at 80k/yr. 5 years later, the 45k/yr may be up to 60k/yr where they bachelors guy is at 120k/yr (at least)..

Where do you live? I haven't seen those numbers anywhere, not commonly anyways. A few exceptional people hit that 120K, and I doubt most are 5 years into their career, other than a few "stupid" places that are pre IPO and haven't had reality set in yet. For the rest of the workforce, 120K is something the majority will never see, or they work in one of the few places where 120K barely gets you by, and even then see the previous statement. (e.g., SF, NYC, Boston)

Comment Re:how much does that cost to build? (Score 1) 419

If you can drive there faster and cheaper than taking a train, why take a train?

Sure, if you can drive there faster.

During rush hour traffic, that's a big if.

Generally, here, the answer will almost always be "yes". Why? Because the train system only hits a few main routes and my work, as an example, has never been closer than 2 miles from a train station. If work buildings and living quarters were close to where you need to be, then mass transit is awesome.

Comment Re:how much does that cost to build? (Score 1) 419

You missed the point, although I agree just about everything you said. I'd love for cities to have mass transit. It'd be awesome and save me the aggravation of dealing with the hassles of a car. At this time, taking public transit generally greatly increases the time to get from A to B, and often will cost you more, especially if there's more than 1 traveling.

Comment Re:NXP is a huge secure element provider. (Score 1) 122

Except that these aren't shortcomings of the spec and, in fact, are never presented as such by Nohl and Lell...They referred to these as features, not flaws, and very clearly placed the blame on the devices, stating that the fix is to make the devices themselves not reprogrammable.

I agree that they are features, and that the devices being reprogrammable is a problem. That still doesn't alleviate the fact that a bus designed to carry adhoc device traffic has 0 security features associated with it. There's no cryptographic signing, no validation. No notification that a new device hooked up. Etc. Those are the deficiencies in the spec. It's like saying that DOS has no design flaws related to user security. You can argue that there was no intent to provide system security, but that proves my point that the USB spec design has short-comings (in security).

There is a DMA component, a quick search reveals they haven't fixed that either yet. Bah.

That was still in reference to FireWire. Further reading shows that the DMA aspect can be mitigated, if desired, as some performance cost.

And, in any case, the OS providing virtualized DMA for Firewire (and it is an OS feature,

It's an OS feature only AFAIK.

Firewire device from injecting a rootkit into RAM during the boot process. ...the only thing I can't confirm without testing devices directly is whether or not I'd be able to find a Firewire device I could reprogram to do exactly what Nohl and Lell did with USB. If one can be found that can be reprogrammed, one can be found to host something akin to BadUSB; let's call it BadWire.

I get the impression that FireWire DMA access is OS driver based, not inherent in the interface, which makes sense to me. I'd bet that most FireWire devices have updatable firmware, much like every other device.

And, that says nothing of Thunderbolt, which many people use for permanently-connected displays and drives. That also uses DMA (in fact, it exposes one or more PCI-Express lanes, depending on which revision of the spec is implemented).... Of course, that assumes, as Nohl and Lell said, "that [the] devices can be reprogrammed", which, really, is the crux of the attack.

I think for the sake of argument that all classes of devices in question are most likely reprogrammable. USB is just the most susceptible because it's the most likely to have adhoc foreign devices being plugged into your system temporarily. The reason I state so strongly that it is a spec design flaw is because USB's purpose was to allow this type of connectivity.

Comment Re:NXP is a huge secure element provider. (Score 1) 122

Since I managed to find that last quote on my own, but I still cannot find any reference to DMA in relation to BadUSB, I'll ask, instead, for a quote or reference for that. Again, greatly appreciated.

I think we've addressed everything else, so I'll clarify this one: the reference to DMA was to FireWire et al security issues, and the fact that DMA access won't allow you to reprogram your BIOS/EFI, at least not as far as I'm aware of. I meant nothing more by this statement, nor did I mean to imply that USB allowed DMA access.

To sum up, BadUSB is a demonstration program of a collection of USB attacks allowed by a combination of poor spec security and bad controller implementation. If the USB bus is live, it is possible for a device to set itself up as a keyboard. On OS operation, a device can set itself up as any device the OS recognizes, including keyboards and network controllers. If the controllers were not reprogrammable, only the propagation of the attack set would be impacted, as USB devices could still be created, although now Tom the cracker down the hall would have a much harder time implementing any of the attacks.

I don't dispute the technical hurdles you list regarding BIOS/EFI reprogramming nor the on the fly USB controller reprogramming. Both obviously are very special narrow cases restricted by the target hardware/firmware. The point wasn't to say this was a wide open attack that could be exploited by downloading a snippet of code, running it locally and pointing it at something and typing "attack". The point is that this shows the depth of what can be done given the current implementation and spec design short-comings, and some of this is suspected to have been used as long ago as 2010 with Stuxnet.

In all, I learned a few things and it appears you did as well.

Comment Re: Obama screwed us intentionally or intentionall (Score 2) 308

He killed it when he appointed Wheeler to head the FCC. He was unanimously approved, meaning very deep non-partisan pockets were behind him becoming the FCC chairman. That should scare everyone considering how grid-locked and partisan congress has been over the past couple of terms.

Comment Re:NXP is a huge secure element provider. (Score 1) 122

you, sir, are wrong. That's what BadUSB is, reprogramming a device to behave as another device. Nothing more. Does it enable a variety of attack vectors that were previously impractical? Yes. But it doesn't do so entirely silently. I suggest you familiarize yourself with the USB spec to further your understanding on this matter.

I see where the problem is, BadUSB isn't at all what you think it is. Your hubris is poking you in the eye again. From the Wired story:

That’s the takeaway from findings security researchers Karsten Nohl and Jakob Lell plan to present next week, demonstrating a collection of proof-of-concept malicious software that highlights how the security of USB devices has long been fundamentally broken. The malware they created, called BadUSB, can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic.

It is a demonstration "malware" created by Nohl and Lell to demonstrate the entire collection of attacks I've been discussing, in the original quote way back

Then there's the USB security issues. I love the fact that you can take over a computer by plugging in a storage device, or is it?

which sparked this whole conversation on security. A valid side issue you brought up, DMA, has its admitted security issues. It could be argued that they are quite less severe than these since the DMA memory has been virtualized in recent hardware/OS systems and there is no persistence nor propagation of the threat once the bad hardware has been removed, unlike with the USB issue nor does DMA allow for BIOS/EFI corruption. So the USB issues are worse than I thought while DMA has had additional risk mitigation with recent systems.

Comment Re:Or just practicing for an actual job (Score 1) 320

+1 on this. That is exactly what I was going to write. Merely copying code from the internet is not reuse, it's a maintenance nightmare waiting to happen. You need to be able to evaluate the code, modify it for what you need, definitely morph it into your own coding conventions, complete with tests, because this is a rather complicated algorithm, right? Otherwise, why bother copying it?

Comment Re:NXP is a huge secure element provider. (Score 1) 122

I reviewed them more carefully. I get the following: if the USB bus is active and in use, at least some of the attack vectors work. Perhaps part of the miscommunication is that BadUSB isn't just 1 attack, but many different potential ones. I wrap them all up (perhaps incorrectly for this discussion) as a single attack vector. While being a supported device certainly expands the range of attack possibilities, being unsupported by no means eliminates the threat. The controller on the host can still be reprogrammed, for instance, and the bus communications can be sniffed, depending upon the connected device's capabilities. Nothing anywhere states that these are only done once the OS finally recognizes the device, in fact, several attack vectors occur before the OS is even in play. Finally, most systems will enable the keyboard USB device, so any claims of the original device not being supported are moot, since it can spoof itself as anything at any time, including the keyboard. (This is directly from several of the previous links, including the spec itself)

So I say that your claim,

A USB device without a driver does nothing. Period.

is wholly incorrect in context of BadUSB. I suggest you shed some of that hubris you're carrying around, apparently it is interfering with your reading comprehension.

Comment Re:NXP is a huge secure element provider. (Score 1) 122

there were performance issues with the USB bus

Were. Moving on.

running multiple connections on a single bus drop performance way way down

Not nearly to the levels you claimed. I have not disputed that there is a performance impact; in fact, I discussed that in one of my posts.

Still are, per your own admission. But moving on.

USB can be compromised with merely plugging in an infected USB device.

It cannot. You need to actually read up on BadUSB. I've pointed you to a few references, and you've pointed out a few, yourself, that you've clearly not read, or at least not understood.

I trust certain people when they say "it is 'x' bad". Bruce is one of those. I briefly reviewed this again, and what I get out of it is if the bus is alive, this works. Obviously, if the bus is disabled, it's not going to be infected. So, is Bruce wrong?

BTW, I did learn that Macs since 2012 are no longer subject to the DMA attacks.

Yes, by way of disabling DMA for the Firewire bus.

Interesting, thought it was to create a virtually mapped 4GB space, thus preventing random reading of the lower 4GB of potentially OS memory which shouldn't have that significant an impact on performance. That's more like daisy-chaining a few drives effect.

Notice how I'm now only pointing out flaws in your arguments, and no longer arguing the points. That is because I have said what I needed to say and provided references where applicable, and you have shown that you are not capable of following the conversation, as you think I've gone off topic when I most certainly have not.

I have noticed how you just assert and occasionally throw a link in as "proof" of your argument. Note how I took out quotes of my references? I also note you didn't dispute a single one of those.

Comment Re:NXP is a huge secure element provider. (Score 1) 122

You're still side-stepping. I stated:

  • there were performance issues with the USB bus.
  • running multiple connections on a single bus drop performance way way down.
  • USB can be compromised with merely plugging in an infected USB device.

These are all true statements backed by references. I note that you mislead frequently by bringing in unrelated items (Tbolt, DMA, intentional confusion about hubs, etc). Because I keep moving back to these points mean I'm staying on topic, instead of going down whatever rabit hole you want to go. BTW, I did learn that Macs since 2012 are no longer subject to the DMA attacks. Thanks for that.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...