Linux security...mindboggling flaw

Couperin47

Member
SoSH Member
Not meant as an attack, this just proves that even after years of open-source scrutiny, huge flaws can hide in plain sight:

http://www.zdnet.com/article/how-to-hack-any-linux-machine-just-using-backspace/?tag=nl.e539&s_cid=e539&ttag=e539&ftag=TRE17cfd61

essentially, you can bypass the password required to boot most Linux distros: when asked for a username...hit backspace 28 times you get the Grub rescue shell which gives you full admin priviledges to load custom kernels, download or erase data, install rootkits...do all sorts of mischief.
 

jercra

No longer respects DeChambeau
SoSH Member
Jul 31, 2006
3,152
Arvada, Co
Not meant as an attack, this just proves that even after years of open-source scrutiny, huge flaws can hide in plain sight:

http://www.zdnet.com/article/how-to-hack-any-linux-machine-just-using-backspace/?tag=nl.e539&s_cid=e539&ttag=e539&ftag=TRE17cfd61

essentially, you can bypass the password required to boot most Linux distros: when asked for a username...hit backspace 28 times you get the Grub rescue shell which gives you full admin priviledges to load custom kernels, download or erase data, install rootkits...do all sorts of mischief.
Ok, but you have to be in front of the machine or at least have serial access. It's not a particularly big exposure.
 

crystalline

Member
SoSH Member
Oct 12, 2009
5,771
JP
Heartbleed is a better example of a serious bug in open source software that was not caught for quite a while
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
Oh, so another way that, if you have physical access to a machine, that you can compromise it? Well, color me shocked. (Shocked is, I think, aubergine.)

I suppose I shouldn't tell our local might-be-a-Markov-chain that I can pull a disk and read it, too. Unless the local disks are encrypted, of course, which--wait for it--renders this bug harmless.

Not meant as an attack
Sure it wasn't, fanboy.
 

Couperin47

Member
SoSH Member
Oh, so another way that, if you have physical access to a machine, that you can compromise it? Well, color me shocked. (Shocked is, I think, aubergine.)

I suppose I shouldn't tell our local might-be-a-Markov-chain that I can pull a disk and read it, too. Unless the local disks are encrypted, of course, which--wait for it--renders this bug harmless.



Sure it wasn't, fanboy.
Oh, so another way that, if you have physical access to a machine, that you can compromise it? Well, color me shocked. (Shocked is, I think, aubergine.)

I suppose I shouldn't tell our local might-be-a-Markov-chain that I can pull a disk and read it, too. Unless the local disks are encrypted, of course, which--wait for it--renders this bug harmless.



Sure it wasn't, fanboy.
You're so predictable....
 

teddykgb

Member
SoSH Member
Jul 16, 2005
11,124
Chelmsford, MA
The power of open source is less in the increased scrutiny and more in which the speed of patches for things like this can be developed. The distros all patched this same day and a separate patch anyone could run was also released. Microsoft or Apple would have taken much longer to fix.
 

Myt1

educated, civility-loving ass
Lifetime Member
SoSH Member
Mar 13, 2006
41,967
South Boston
Wait, does this sort of shit talking happen in this subforum all the time? How do I subscribe to updates?
 

crystalline

Member
SoSH Member
Oct 12, 2009
5,771
JP
Wait, does this sort of shit talking happen in this subforum all the time? How do I subscribe to updates?
Fewer big words here though.

Re trash talking and security and the big desktop OS-- no matter what security problems other OS's have, at least they didn't create an antivirus industry through terrible security practices, then choose to keep that industry alive instead of implementing real security.

I think of all the time Windows people have wasted on dealing with antivirus software over the past 15 years and weep. Especially when I need to set up a Windows machine... Blergh
 
Last edited:

Couperin47

Member
SoSH Member
He's also right. If you have physical access to the machine and it isn't using encrypted drives, you have no security. With any OS. That's been known for decades.
From the point of view of a user, there's rather a qualitative difference in security breach if:
A. A computer is hacked and unencrypted files are quickly copied with no obvious evidence that the data has been compromised.
B. A computer is disassembled and drives are stolen or copied, which requires an order of magnitude more time and may or may not be evident or
C. The computer or it's drives are simply stolen and the breach is completely obvious
 

Time to Mo Vaughn

RIP Dernell
SoSH Member
Mar 24, 2008
7,295
From the point of view of a user, there's rather a qualitative difference in security breach if:
A. A computer is hacked and unencrypted files are quickly copied with no obvious evidence that the data has been compromised.
B. A computer is disassembled and drives are stolen or copied, which requires an order of magnitude more time and may or may not be evident or
C. The computer or it's drives are simply stolen and the breach is completely obvious
Booting off of a LiveCD or Thumb Drive really takes an order of magnitude more time than scenario A?
 

SumnerH

Malt Liquor Picker
Dope
SoSH Member
Jul 18, 2005
32,059
Alexandria, VA
From the point of view of a user, there's rather a qualitative difference in security breach if:
A. A computer is hacked and unencrypted files are quickly copied with no obvious evidence that the data has been compromised.
B. A computer is disassembled and drives are stolen or copied, which requires an order of magnitude more time and may or may not be evident or
C. The computer or it's drives are simply stolen and the breach is completely obvious
Physical access doesn't mean you need to pull the drive. There are a zillion ways to compromise the system without cracking it open.

Most boot loaders let you go into single user mode (e.g. in LILO you'd hold down the shift key during boot, and type "linux single" at the prompt--or whatever the image name was in place of "linux"; in GRUB on almost all systems you just hit "e" to edit the command line and add "single" at the end of it). If the boot loader is password protected, you boot from a rescue disk or USB stick.

The principles are the same on the Mac and Windows, though the details vary obviously.

This bug affects passwords in the GRUB password-protection system. Which is a feature I've never actually seen anyone in the real world enable, because it's largely pointless--disk encryption is necessary for actual security, anyway (it's not used out of the box on Ubuntu, Debian, Red Hat, Fedora, SUSE, etc).
 

Blacken

Robespierre in a Cape
SoSH Member
Jul 24, 2007
12,152
And this is why Sumner will not be the first against the wall when the revolution comes.

Booting off of a LiveCD or Thumb Drive really takes an order of magnitude more time than scenario A?
And you won't, either.

I can be at a root console, chrooted into your local file system, faster than I can boot up your actual install of RedHat or Ubuntu or whatever, through the use of a thumb drive. But, see, GRUB being able to let J. Random Attacker pick which of your installed kernels to launch is srs bsns.