A computer components & hardware forum. HardwareBanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » HardwareBanter forum » General Hardware & Peripherals » General
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

BadUSB security flaw (massive undetectible USB reprogramming vulnerability)



 
 
Thread Tools Display Modes
  #1  
Old July 31st 14, 05:30 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
bob mullen
external usenet poster
 
Posts: 1
Default BadUSB security flaw (massive undetectible USB reprogramming vulnerability)

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...f-the-cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it¡¦s your PC,
smartphone, external hard drive, or an audio breakout box, there¡¦s a USB
controller chip in every device that controls the USB connection to other
devices. It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things ¡X
and, perhaps most importantly, this reprogramming is almost impossible to
detect."
  #2  
Old July 31st 14, 08:21 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
VanguardLH[_2_]
external usenet poster
 
Posts: 1,453
Default BadUSB security flaw (massive undetectible USB reprogramming vulnerability)

bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...f-the-cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it’s your PC,
smartphone, external hard drive, or an audio breakout box, there’s a USB
controller chip in every device that controls the USB connection to other
devices.


Every computer hardware interface has a controller. You thought the
wires and foils handled the logic?

It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things —
and, perhaps most importantly, this reprogramming is almost impossible to
detect."


Same for the EEPROM holding your BIOS.
  #3  
Old July 31st 14, 10:43 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
Aleksandar Kuktin
external usenet poster
 
Posts: 4
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

On Thu, 31 Jul 2014 09:30:54 -0700, bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...-indefensible-

security-flaw-found-in-usb-its-time-to-get-your-ps2-keyboard-out-of-the-
cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it’s your
PC,
smartphone, external hard drive, or an audio breakout box, there’s a USB
controller chip in every device that controls the USB connection to
other devices. It turns out, according to SR Labs, that these
controllers have firmware that can be reprogrammed to do a whole host of
malicious things —
and, perhaps most importantly, this reprogramming is almost impossible
to detect."


I would like to raise two issues, one minor one major.

The minor one was that this was known to anyone who thought to look.
Perhaps we didn't know that you could just feed the device a faulty
firmware, but the idea that you could reprogram USB's was well known.

The major one is the alarm that *someone* may be trying to make matters
worse. The fact the feature-turned-flaw got a name with a non-trivial
capitalization is the first red flag. But the real proof of maliciousness
is in the proposal given by SR Labs about the way to "solve" the problem.

Their suggestion is cryptographic signing of the firmware which can only
possibly make the problem worse. As the things are today, you can compile
your own - known to be secure - firmware and upload it to the USB device,
thus solving the problem. If you don't have the know-how, you can pay a
consultant to do that for you. In other words, this is one of those lucky
few hardware problems that are solvable by the populace at large, with
zero effort (and zero money) required on the part of corporations.

Cryptographically signing the firmware, however, makes it impossible for
the people to solve the problem themselves, leaves the problem wide open
because to USB-peripheral-making corporation is going to spend money
fixing this (see addenum) and exposes everyone to NSA & friends which
will ofcouse have access to the secret keys one way or the other.

Addenum: USB peripherals that are important are cheap. Dime-a-dozen
cheap. That means the only way for a multinational to make a
notable profit is by making many of them. Which means any
problem (like this one) will be overwhelming. Additionally,
the only way to turn a profit when making these things is to
have a razor-thin margin. Which means the company has
insufficient reserves to deal with these problems.
Couple an overwhelming problem with barely any reserves for
solving it and you end up with no solution to speak of.

Addenum 2: the issue is actually detectable (with no extra equipment),
you just need to know what you are doing.
  #4  
Old July 31st 14, 11:10 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
William Unruh
external usenet poster
 
Posts: 15
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

["Followup-To:" header set to alt.os.linux.]
On 2014-07-31, VanguardLH wrote:
bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...f-the-cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it???s your PC,
smartphone, external hard drive, or an audio breakout box, there???s a USB
controller chip in every device that controls the USB connection to other
devices.


Every computer hardware interface has a controller. You thought the
wires and foils handled the logic?


Yes, And?

It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things ???
and, perhaps most importantly, this reprogramming is almost impossible to
detect."


Same for the EEPROM holding your BIOS.


Yes, but someone can lend you a usb stick to stick into your computer,
subverting it. They cannot stick their eeprom into your machine, nor can
they install junk on your eeprom without you perhaps noticing that they
have your computer.
  #5  
Old July 31st 14, 11:44 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
Paul
external usenet poster
 
Posts: 13,364
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

Aleksandar Kuktin wrote:
On Thu, 31 Jul 2014 09:30:54 -0700, bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...-indefensible-

security-flaw-found-in-usb-its-time-to-get-your-ps2-keyboard-out-of-the-
cupboard
"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it’s your
PC,
smartphone, external hard drive, or an audio breakout box, there’s a USB
controller chip in every device that controls the USB connection to
other devices. It turns out, according to SR Labs, that these
controllers have firmware that can be reprogrammed to do a whole host of
malicious things —
and, perhaps most importantly, this reprogramming is almost impossible
to detect."


I would like to raise two issues, one minor one major.

The minor one was that this was known to anyone who thought to look.
Perhaps we didn't know that you could just feed the device a faulty
firmware, but the idea that you could reprogram USB's was well known.

The major one is the alarm that *someone* may be trying to make matters
worse. The fact the feature-turned-flaw got a name with a non-trivial
capitalization is the first red flag. But the real proof of maliciousness
is in the proposal given by SR Labs about the way to "solve" the problem.

Their suggestion is cryptographic signing of the firmware which can only
possibly make the problem worse. As the things are today, you can compile
your own - known to be secure - firmware and upload it to the USB device,
thus solving the problem. If you don't have the know-how, you can pay a
consultant to do that for you. In other words, this is one of those lucky
few hardware problems that are solvable by the populace at large, with
zero effort (and zero money) required on the part of corporations.

Cryptographically signing the firmware, however, makes it impossible for
the people to solve the problem themselves, leaves the problem wide open
because to USB-peripheral-making corporation is going to spend money
fixing this (see addenum) and exposes everyone to NSA & friends which
will ofcouse have access to the secret keys one way or the other.

Addenum: USB peripherals that are important are cheap. Dime-a-dozen
cheap. That means the only way for a multinational to make a
notable profit is by making many of them. Which means any
problem (like this one) will be overwhelming. Additionally,
the only way to turn a profit when making these things is to
have a razor-thin margin. Which means the company has
insufficient reserves to deal with these problems.
Couple an overwhelming problem with barely any reserves for
solving it and you end up with no solution to speak of.

Addenum 2: the issue is actually detectable (with no extra equipment),
you just need to know what you are doing.


The quickest solution, is to add a prompt to the "new hardware"
dialog.

"I think you have added a USB Mass Storage device"

"This device appears to be a web cam. It claims a composite
device block at the top level, with one UVC video device and
one audio device underneath that top level."

"Do you want to accept connection via these classes only ? Y/N"

That would not prevent a bugged HID from recording key presses.
So a HID faking a HID, you can't protect against that. But
if a webcam has a "network" or a "HID", the OS could restrict
the classes eventually discovered.

Say I present myself as a webcam, then five minutes later inside
the webcam, I add a third "HID" device under the composite device
at the top level. If the user had been queried about whether
this actually was a webcam, the OS could reject the HID that
pops up out of no-where, five minutes later.

Paul
  #6  
Old August 1st 14, 07:52 AM posted to alt.comp.hardware
ben
external usenet poster
 
Posts: 1
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

On Thu, 31 Jul 2014 09:30:54 -0700, bob mullen wrote:
Snipped...

Not to over simplify things, but we can manually mount and unmount usb
stick, cd roms, etc. We decided to be lazy and have them auto mount in
modern systems. I really doubt any serious Linux installation such as an
important server has accessible auto-mounting peripherals. If they do,
they have a major security breach.

This is a case of smoke with no fire. People who will be effected by this
problem, are effected by virus problems already. Who in their right frame
of mind is going to plug anything into their computer from one of these
people?

Most large corporations do not let you insert a usb into a computer. No
issue there.

I am only a home user. As for infected usb's, I can not remember the last
time someone gave me a usb stick to use, or I gave someone else one to
use. Who cares about this really?

  #7  
Old August 1st 14, 10:41 AM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
VanguardLH[_2_]
external usenet poster
 
Posts: 1,453
Default BadUSB security flaw (massive undetectible USB reprogramming vulnerability)

William Unruh wrote:

["Followup-To:" header set to alt.os.linux.]
On 2014-07-31, VanguardLH wrote:
bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...f-the-cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it???s your PC,
smartphone, external hard drive, or an audio breakout box, there???s a USB
controller chip in every device that controls the USB connection to other
devices.


Every computer hardware interface has a controller. You thought the
wires and foils handled the logic?


Yes, And?

It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things ???
and, perhaps most importantly, this reprogramming is almost impossible to
detect."


Same for the EEPROM holding your BIOS.


Yes, but someone can lend you a usb stick to stick into your computer,
subverting it. They cannot stick their eeprom into your machine, nor can
they install junk on your eeprom without you perhaps noticing that they
have your computer.


Reprogrammers have to run. That would be for EEPROM writing as well as
USB controller firmware updating. USB drives have been a sore point
regarding security. Smart users disable auto-run on removable media
devices. Thereafter the user would have to be conned into running a
program so it could reprogram the BIOS or the USB firmware, or a NIC
with firmware, or anything else with reprogrammable firmware.
  #8  
Old August 1st 14, 12:18 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
J.O. Aho
external usenet poster
 
Posts: 4
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

On 07/31/2014 06:30 PM, bob mullen wrote:
Massive, undetectable security flaw found in USB

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it¡¦s your PC,
smartphone, external hard drive, or an audio breakout box, there¡¦s a USB
controller chip in every device that controls the USB connection to other
devices. It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things ¡X
and, perhaps most importantly, this reprogramming is almost impossible to
detect."


There was SD Card flaw which allowed to execute binary in the firmware,
there was a java issue in SIM Cards which allowed you to execute java
binaries. You will see all these kinds of issues, they tend to be
firmware and/or manufacturer specific. Even if there hadn't been any
hardware with software issues, it had been simple enough to make a
custom unit which could be used in a similar fashion.

The impact of the flaw will be small, as to get out the right number of
modified USB/SD/SIM to get any sort of "revenue" is costly and will get
few persons to actually use the hacked item. Compare this to sending out
some fake mail with an attachment to click which will install a small
boot virus which will fool UEFI by providing the microsoft windows keys
and gives the virus full control of the OS as it's run as a virtual
environment (don't worry, this kind of boot viruses are already
developed and most likely out there earning money or stealing
information for one or another organization).

--

//Aho
  #9  
Old August 1st 14, 12:22 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
crankypuss
external usenet poster
 
Posts: 2
Default BadUSB security flaw (massive undetectible USB reprogrammingvulnerability)

On 08/01/2014 03:41 AM, VanguardLH wrote:
William Unruh wrote:

["Followup-To:" header set to alt.os.linux.]
On 2014-07-31, VanguardLH wrote:
bob mullen wrote:

Massive, undetectable security flaw found in USB
http://www.extremetech.com/computing...f-the-cupboard

"This flaw, dubbed BadUSB by Security Research Labs in Berlin, leverages
the fact that every USB device has a controller chip. Whether it???s your PC,
smartphone, external hard drive, or an audio breakout box, there???s a USB
controller chip in every device that controls the USB connection to other
devices.

Every computer hardware interface has a controller. You thought the
wires and foils handled the logic?


Yes, And?

It turns out, according to SR Labs, that these controllers have
firmware that can be reprogrammed to do a whole host of malicious things ???
and, perhaps most importantly, this reprogramming is almost impossible to
detect."

Same for the EEPROM holding your BIOS.


Yes, but someone can lend you a usb stick to stick into your computer,
subverting it. They cannot stick their eeprom into your machine, nor can
they install junk on your eeprom without you perhaps noticing that they
have your computer.


Reprogrammers have to run. That would be for EEPROM writing as well as
USB controller firmware updating.


The big exposure that I see is some manufacturer of USB-sticks putting
funky code into the controller before it ever goes out the door... as a
"favor" to maybe the NSA, in exchange for some under-the-table funds...
or as an unofficial "contribution" by some employee who has a nefarious
agenda.

USB drives have been a sore point
regarding security.


I see this thread is now crossposted. Certainly there's the MS-Windows
issue of Windows being set up on the assumption that all users are not
only dumb but compliant.

Smart users disable auto-run on removable media
devices.


That should never, ever, be a default setting distributed with the
opsys. The user should *always* have to choose to opt-in to auto-run,
there's nothing dramatically difficult about a first-time prompt to see
what the user wants.

Thereafter the user would have to be conned into running a
program so it could reprogram the BIOS or the USB firmware, or a NIC
with firmware, or anything else with reprogrammable firmware.


It isn't clear to me how the user can know that he is not being conned.
Both Windows (last time I used it) and linux lack any "master console
mode" so the user can tell whether a prompt is legitimately from the
opsys or a spoof-dialog. It could certainly be done via a driver that
gloms the last line of the display device for system status, thus making
that line unavailable to any application.
  #10  
Old August 1st 14, 12:52 PM posted to alt.os.linux,alt.windows7.general,alt.comp.hardware
Aragorn[_3_]
external usenet poster
 
Posts: 2
Default BadUSB security flaw (massive undetectible USB reprogramming vulnerability)

On Friday 01 August 2014 13:22, crankypuss conveyed the following to
alt.os.linux...

The big exposure that I see is some manufacturer of USB-sticks putting
funky code into the controller before it ever goes out the door... as
a "favor" to maybe the NSA, in exchange for some under-the-table
funds... or as an unofficial "contribution" by some employee who has a
nefarious agenda.


As shown in the documents publicized by Edward Snowden, the NSA does
actively employ non-USA'n companies to intercept all kinds of ITC-
related devices when they ship from their respective manufacturers, put
backdoors in them, and then put them back on their path to the
distributors and retailers.

I see this thread is now crossposted.


It was already crossposted from the beginning, Cranky. There appears to
be a sufficiently high number of people eager for flamewars, as we've
already been seeing on alt.os.linux recently. If it ain't between the
GNU/Linux people and the Mac/iDevices people, then it's between the
GNU/Linux people and the Windows people.

I smell a rat.

Both Windows (last time I used it) and linux lack any "master
console mode" so the user can tell whether a prompt is legitimately
from the opsys or a spoof-dialog.


Experienced GNU/Linux users - we're not talking of the Ubuntu/Mint crowd
here - know that vc/12 shows the output of the syslog daemon, and this
includes kernel messages.

One switches to vc/12 ("virtual console #12") by pressing
(Ctrl+)Alt+F12. It's a read-only console, so one cannot interact with
the operating system from there.

Another option is to check the kernel ring buffer directly via dmesg in
a terminal emulator window.


--
= Aragorn =

http://www.linuxcounter.net - registrant #223157
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
WMF Vulnerability Arthur Entlich Printers 16 January 7th 06 04:16 PM
Symantec Norton Antivirus Security Flaw (Personal and Corporate editions) Christopher Muto Dell Computers 3 December 24th 05 01:29 AM
security flaw in hyper threading Ed Zeppelin Intel 4 May 27th 05 03:47 AM
Reprogramming an Epson printer Sion Morris Printers 5 January 14th 05 04:39 PM
Reprogramming chip on epson T29 & T28 brane_ded Printers 1 July 3rd 03 10:11 PM


All times are GMT +1. The time now is 02:59 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 HardwareBanter.
The comments are property of their posters.