tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: How trustworthy is that I/O device?



On Nov 6, 2013, at 2:24 PM, Warner Losh <imp%bsdimp.com@localhost> wrote:

> 
> On Nov 6, 2013, at 2:21 PM, Matt Thomas wrote:
> 
>> 
>> On Nov 4, 2013, at 2:34 PM, Erik Fair <fair%netbsd.org@localhost> wrote:
>> 
>>> All OSes have a problem with USB and potentially all other hot-plug I/O 
>>> busses: can you trust the device that was just plugged into the bus? How 
>>> much I/O do you permit to it before explicit authorization of some kind?
>> 
>> I've always wondered why we "trust" file systems and panic they aren't
>> what we expect.  We don't do that for networking.  If seems if we encounter
>> an inconsistency, we mark the f/s as read-only and either return an error
>> or complete the action if possible.
> 
> Panic now to prevent crazy later. If the structures are inconsistent, then 
> relying on underlying assumptions in the code is so unsafe we simply can't do 
> it at all.  How do we know that going to read-only doesn't create some kind 
> of excess data disclosure path?

What I am saying is that you shouldn't trust it.  We shouldn't have underlying
assumptions in the code.  We don't in the networking code.  Treat it as if it's
probably trying to cause a denial of service.  I'm saying don't panic, either
forcibly unmount or treat it as uncacheable and read-only.



Home | Main Index | Thread Index | Old Index