Re: FireWire Security issues

看板FB_security作者時間21年前 (2004/11/17 09:48), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/5 (看更多)
--1LKvkjL3sHcu1TtY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Nov 16, 2004 at 09:30:09PM +0100, Maximillian Dornseif wrote: > looking into the issue described in the advisory below I wonder how to=20 > tackle this issues. Primarily > I ask myself >=20 > * is there any reason not to filter all physical memory access by default > * what would be the appropriate way to change the filter set? a sysctl? This is totally not news, this has been discussed in various circles for the past 5 years, though it's nice to see someone presenting an old attack in a new way. You can only filter the accesses by implementing filter logic in the PCI bridge to main memory to deny the accesses, or the PCI bus arbiter, or failing that, the FireWire to PCI host controller itself. The CPU and operating system are not able to intervene here in any way. Regards, BMS --1LKvkjL3sHcu1TtY Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Comment: '' iD8DBQFBmqwUueUpAYYNtTsRApZrAJ9DJzC1b6kBlojXohCfLQOxULm5xgCfUvfI eSN+nOup7hadrXtW0h/oe7c= =mdS6 -----END PGP SIGNATURE----- --1LKvkjL3sHcu1TtY--
文章代碼(AID): #11cgtu00 (FB_security)
文章代碼(AID): #11cgtu00 (FB_security)