LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-08-2010, 06:46 PM   #1
yonnieboy
Member
 
Registered: Apr 2008
Location: sw OR
Distribution: PCLOS, Kubuntu, Lubuntu, Unity
Posts: 143

Rep: Reputation: 15
backdoor hacks


Has anybody read the recent article : http://www.itworld.com/security/9539...uter-equipment

What do we really know about this? And what can be done to protect ourselves?
 
Old 02-08-2010, 07:00 PM   #2
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 475Reputation: 475Reputation: 475Reputation: 475Reputation: 475
Erm, he has taken two reported incidents (Google leaving China and the "broken" USB keys) and from extrapolated the idea that China has hacked the universe. Better question is "how would this work for users runnning either Windows OR Mac OR Linux?" How would these cameras report home? How would any of it report home for that matter? Governments may be inept at any number of things, but their machines generally sit behind a software or hardware firewall.
 
1 members found this post helpful.
Old 02-08-2010, 07:14 PM   #3
jlinkels
LQ Guru
 
Registered: Oct 2003
Location: Bonaire, Leeuwarden
Distribution: Debian /Jessie/Stretch/Sid, Linux Mint DE
Posts: 5,195

Rep: Reputation: 1043Reputation: 1043Reputation: 1043Reputation: 1043Reputation: 1043Reputation: 1043Reputation: 1043Reputation: 1043
Linux is Open Source, so everyone is free to browse thru the source an search for backdoors.

I am less sure about Windows. Although Microsoft is more mighty than the government, how can we be sure that the CIA has not required the installation of a back door, especially in Arabic versions of Windows?

And how can we be sure that Microsoft did not install a secret time bomb or a back door which allows a terrorist to enter all Windows installation and disable the functioning?

Same goes for Cisco. One worm getting thru this backdoor and Internet will be extremely silent. Take into account that the Cisco OS has many common component as to keep operation and software maintenance as efficient as possible?

jlinkels
 
2 members found this post helpful.
Old 02-08-2010, 11:30 PM   #4
carbonfiber
Member
 
Registered: Sep 2009
Location: Sparta
Posts: 237

Rep: Reputation: 46
The truth is out there.
 
0 members found this post helpful.
Old 02-09-2010, 01:37 AM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by yonnieboy View Post
Has anybody read the recent article : http://www.itworld.com/security/9539...uter-equipment
No, I haven't. About everything "published" there is questionable and most of their "authors" lack the braincells to Create Fire using a Flint anyway (trying hard to remain polite here). If that "article" leaves you wanting more information see for instance Foreign Affairs November '09 issue Securing the Information Highway.


Quote:
Originally Posted by carbonfiber View Post
The truth is out there.
Sure your remarks may be modded "funny" elsewhere but in the Linux Security forum please avoid making such drive-by one-liner posts. They don't add anything constructive to the discussion.
 
1 members found this post helpful.
Old 02-09-2010, 01:59 AM   #6
Web31337
Member
 
Registered: Sep 2009
Location: Russia
Distribution: Gentoo, LFS
Posts: 399
Blog Entries: 71

Rep: Reputation: 65
Opensource backdoors are quite a rare thing and I'm happy it is that way by now. Because, if someone adds a backdoor into opensource product he risks with reputation of entire opensource, when that is discovered. Those incidents, I guess, strike harder, rather than same situations with proprietary software which is distributed in the way "you can never be sure".
Thanks to everyone of those who is not abusing opensource for that.
Of course, there are exceptions. Some made by skiddies, somehow got into opensource development(maybe gained access into SCM or releases while cracked into system), some made by evilcrackers, were actually masking themselves as developers for some amount of time. You'll never know.
Browsing entire sources of some big thingy is quite a long process, say, for linux kernel it might take months of you. But I respect those who waste their time for inspecting parts of source code for different projects, they're heroes, not much lesser than ones who create that source Maybe, a greater heroes even, when they report security-related bugs they found.
 
1 members found this post helpful.
Old 02-09-2010, 03:42 AM   #7
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
My impression is that the concern here is the hardware. In that sense, whether you run proprietary or free software isn't directly relevant AFAICT. I remember reading an article by Joanna Rutkowska a while back, in which she talks about this vulnerability and what could be done to mitigate it. As she points out though, even when you get to the point where you're able to use an IOMMU to limit the damage which individual hardware components can do, you're pretty much still blindly trusting the CPU manufacturers, as it's "trivial for [them] to build in an effective backdoor".

Last edited by win32sux; 02-09-2010 at 03:43 AM.
 
2 members found this post helpful.
Old 02-09-2010, 03:46 AM   #8
yonnieboy
Member
 
Registered: Apr 2008
Location: sw OR
Distribution: PCLOS, Kubuntu, Lubuntu, Unity
Posts: 143

Original Poster
Rep: Reputation: 15
The article from itworld talked about backdoors in firmware. As I stated earlier, I'm not a programmer, but I'm pretty sure that software is just a layer of controls/interpretation (the OS) on top of firmware (chips (eproms/programmable logic) on MB) to get hardware (HD, CD, Audio, Video) to do something.

If the function exists in firmware, wouldn't that allow access to hardware even though the OS is unaware of the function?
 
Old 02-09-2010, 04:09 AM   #9
yonnieboy
Member
 
Registered: Apr 2008
Location: sw OR
Distribution: PCLOS, Kubuntu, Lubuntu, Unity
Posts: 143

Original Poster
Rep: Reputation: 15
win32sux...that is a scary article by Joanna, and I think she's spot-on! I had 3 firewalls repeatedly trashed every night till I gave up a few months ago. Now I think I know how they did it. I need to learn more about what she's talking about.
 
Old 02-09-2010, 08:55 AM   #10
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
Quote:
Originally Posted by XavierP View Post
Erm, he has taken two reported incidents (Google leaving China and the "broken" USB keys) and from extrapolated the idea that China has hacked the universe. Better question is "how would this work for users runnning either Windows OR Mac OR Linux?" How would these cameras report home? How would any of it report home for that matter? Governments may be inept at any number of things, but their machines generally sit behind a software or hardware firewall.
I agree, instead of blaming everything on the USSR, or Canada, they now blame everything on China, not that China does not also fuel this by allowing stupid s*** to occur.

I don't like the linked article at all, it makes very little sense to me, just like you mention. What is this about firmware being infected with viruses, what would it do ? The most it could do is prevent the drive from functioning properly, which would decrease their sales. As for USB sticks, I'm sure they would only affect Window$ because of the friendly auto-run on plug-in feature. On Linux you can wipe the drive without ever mounting it if you want to. But, you could probably also mount it and run the virus through wine and nothing would happen ... not that you should do that, of course.

And indeed, the most pertinent question of all: Why ? Why would they sell you something with a virus on it ? On purpose ? So that you never buy from China again ?

I'll tell you why, because it's propaganda, and I bet they are building up towards Cold War 2 or WW III.
 
0 members found this post helpful.
Old 02-09-2010, 03:48 PM   #11
yonnieboy
Member
 
Registered: Apr 2008
Location: sw OR
Distribution: PCLOS, Kubuntu, Lubuntu, Unity
Posts: 143

Original Poster
Rep: Reputation: 15
H_texmex_H: Some of your links are quite interesting but, you totally miss the point of the original article. It's not a virus in firmware. It's a backdoor access built-in. It doesn't care about your politics. Although the article leans towards China as the culprit, those who read a lot, know the USA and other governments use these backdoors for discreet monitoring. It's not warfare or wwIII, or cyberwar, it's spying.

I would prefer a way to stop it, but after my exercise in futility, I see that ain't going to happen easily.
 
Old 02-10-2010, 03:11 AM   #12
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
Quote:
Originally Posted by yonnieboy View Post
H_texmex_H: Some of your links are quite interesting but, you totally miss the point of the original article. It's not a virus in firmware. It's a backdoor access built-in. It doesn't care about your politics. Although the article leans towards China as the culprit, those who read a lot, know the USA and other governments use these backdoors for discreet monitoring. It's not warfare or wwIII, or cyberwar, it's spying.

I would prefer a way to stop it, but after my exercise in futility, I see that ain't going to happen easily.
Please explain what "backdoor access built-in" means, because I read the article and it fails to what it might mean. Sure I know it's supposed to be something that allows full access to the system, like the NSA has for Window$, but they still don't mention how they accomplish this using a USB stick.

I suspect it is some type of rootkit ... in which case you could probably detect in using rkhunter and chkrootkit, and you wouldn't be able to get it on Linux unless you run it as root.

Last edited by H_TeXMeX_H; 02-10-2010 at 03:14 AM.
 
Old 02-10-2010, 05:18 AM   #13
yonnieboy
Member
 
Registered: Apr 2008
Location: sw OR
Distribution: PCLOS, Kubuntu, Lubuntu, Unity
Posts: 143

Original Poster
Rep: Reputation: 15
Quote:
Originally Posted by H_TeXMeX_H View Post
Please explain what "backdoor access built-in" means, because I read the article and it fails to what it might mean. Sure I know it's supposed to be something that allows full access to the system, like the NSA has for Window$, but they still don't mention how they accomplish this using a USB stick.

I suspect it is some type of rootkit ... in which case you could probably detect in using rkhunter and chkrootkit, and you wouldn't be able to get it on Linux unless you run it as root.
afaik, it's undocumented commands, buried into the logic of the hardware including the cpu. These aren't rootkits, they are instructions builtin when the device was made, on purpose to satisfy the laws of various governments and/or corporations who placed the purchase order. This can allow those who know the command, full access to that piece of hardware. I'm not an expert on this topic and was hoping my post could draw out some good useful info. Such as, MS for years used the cpu serial# to check piracy, don't know if they still do. The NIC uses a mac for id. but some units can report cpu serial #'s, a friend at Stanford showed me that 20 years ago. You can spoof the mac, but can't spoof the serial. You can read/write the HD, via these controls so I guess that since a USB is also a programmed device you could access it too if it has a backdoor. The Invisible things article mentions the use of VT-d to basicly scramble the hardware address of where these instructions reside, effectively making it impossible to remote access via these backdoors... all except the ones buried in the cpu and the NIC. Reading the article tells me that the backdoors may not be entirely just a single word but a command to use the contents of a specific memory address. That location containing an instruction possibly to answer back with "hello world" or read contents of file "x".
 
Old 02-10-2010, 05:38 AM   #14
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
I still don't get it. You're saying someone can access your USB drive if it has a "backdoor" ? That makes no sense.

I was thinking more like malware on the USB drive installs a rootkit and then this opens a backdoor that will allow access to the whole system.

I know there exist hardware-based rootkits, like the one mentioned here:
http://www.linuxquestions.org/questi...xploit-712903/
but I don't think this applies here.
 
Old 02-10-2010, 06:08 AM   #15
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Since nobody reads Foreign Affairs the article is about chip-level hardware design deficiencies and malicious tampering. The risks related to this are electronic infiltration, data theft, hardware sabotage. The problem is that with the amount of transistors on a single IC it is not possible to independently check each transistor for anomalies like embedded trojan horses or "kill switches". ICs are checked for spec deviations but one can't test what one doesn't know about. Attack-wise, and in contrast with SW 0-days where one would want to exploit as many systems as fast as one could, a turned chip could remain dormant for years without giving away it's secondary purpose. According to the article part of the problem is also that ICs, even for security-related or military purposes, are made in insecure factories. Also in 2008 counterfeit HW (3600 Cisco network devices) was detected by the FBI inside defense and power systems and it estimates that about five percent of all commercially available chips are not genuine. The article suggest that risk management as in completely removing threats is neither cost-effective or technically feasible: securing the HW supply chain (embedded authentication codes, anti-tamper safeguards) and moving towards a less rigid, less homogeneous IT infrastructure ("diversity fortifies defenses") could help.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Xscreensaver hacks (looking for old hacks) xr82 Linux - Software 2 01-07-2009 01:32 PM
Yet another backdoor for IE.... r_jensen11 General 11 06-29-2004 11:31 AM
/home/backdoor glyn_walters Linux - Security 6 05-15-2003 11:29 AM
backdoor im1crazyassmofo Linux - General 3 01-16-2003 06:54 PM
SSH 2 as a backdoor? help me fenris@bu Linux - Security 3 05-24-2001 12:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:34 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration