Gentoo Archives: gentoo-user

From: Martin DiViaio <martindiv@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Linux USB security holes.
Date: Wed, 08 Nov 2017 15:27:57
Message-Id: 984040145.374855.1510154628117@mail.yahoo.com
In Reply to: Re: [gentoo-user] Linux USB security holes. by R0b0t1
1 There's an old saying: The only secure computer is one that is locked in a room, unplugged. Then again, that computer is only as secure as the lock on the door.
2
3
4 On Wednesday, November 8, 2017, 1:48:43 AM EST, R0b0t1 <r030t1@×××××.com> wrote:
5
6 On Wed, Nov 8, 2017 at 12:10 AM, R0b0t1 <r030t1@×××××.com> wrote:
7 > On Wed, Nov 8, 2017 at 12:02 AM, Dale <rdalek1967@×××××.com> wrote:
8 >> Dale wrote:
9 >>> Howdy,
10 >>>
11 >>> I ran up on this link.  Is there any truth to it and should any of us
12 >>> Gentooers be worried about it?
13 >>>
14 >>> http://www.theregister.co.uk/2017/11/07/linux_usb_security_bugs/
15 >>>
16 >>> Isn't Linux supposed to be more secure than this??
17 >>>
18 >>> Dale
19 >>>
20 >>> :-)  :-)
21 >>>
22 >>
23 >>
24 >> To reply to all that posted so far.  I did see that it requires physical
25 >> access, like a lot of other things.  Once a person has physical access,
26 >> there are a number of things that can go wrong.
27 >>
28 >> It does seem to be one of those things that while possible, has anyone
29 >> been able to do it in the real world and even without physical access?
30 >> Odds are, no.
31 >>
32 >
33 > The most widely publicized example is STUXNET. There are also reports
34 > that malicious USB keys with driver-level exploits are sometimes used
35 > for industrial espionage.
36 >
37 > The key point being that in either case, someone is spending a lot of
38 > money to research and set up a plausible attack.
39 >
40 >> Still, all things considered, Linux is pretty secure.  BSD is more
41 >> secure from what I've read but Linux is better than windoze.
42 >>
43 >> Dale
44 >>
45 >> :-)  :-)
46 >>
47
48 I suppose I should add that once the basic work has been done for an
49 exploit like this it will have great reproducibility. But at that
50 level you are (usually) talking about very well funded actors, and one
51 should also be worried about controller-level exploits that would be
52 much harder to discover from an operating system.
53
54 If you can't surround your computer with trustworthy armed guards,
55 assume you suffer from a serious vulnerability based on the
56 preliminary work the article is talking about.
57
58 Rainbows and Sunshine,
59     R0b0t1