Berkeley CSUA MOTD:Entry 49208
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2008/2/21-25 [Computer/HW/Memory, Computer/SW/Security] UID:49208 Activity:nil
2/21    Cold Boot Attacks Against Disk Encryption:
        http://www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
        http://citp.princeton.edu/memory
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2012/12/18-2013/1/24 [Computer/SW/Languages/Perl] UID:54561 Activity:nil
12/18   Happy 25th birthday Perl, and FUCK YOU Larry Wall for fucking up
        the computer science formalism that sets back compilers development
        back for at least a decade:
        http://techcrunch.com/2012/12/18/print-happy-25th-birthday-perl
        \_ I tried to learn Perl but was scared away by it.  Maybe scripting
           lanauages have to be like that in order to work well?
	...
2012/2/5-3/26 [Computer/SW/WWW/Browsers] UID:54300 Activity:nil
2/5     How is Firefox on version 10, while I still have 3.6 installed.
        I wait for the X.1 versions and they never come out.
        \_ I'm also on 3.6.26.  It claims that versions 4 - 10 are all faster
           than 3.6.x, but do they use more memory?  Thx.
           \_ Newer Firefox versions use less memory too:
              http://www.maximumpc.com/article/news/mozillas_memshrink_program_brings_big_memory_savings_firefox_7
	...
2011/6/5-8/27 [Computer/HW/Memory] UID:54127 Activity:nil
6/5     In an effort to stabilize our services, we'll be rebuilding parts of
        the CSUA infrastructure over the course of this summer.  To give us
        some wiggle room, I've temporarily decreased soda's allocated RAM from
        8GB to 2GB.  If you need to run something that requires large amounts
        of memory, please send mail to root@csua.org and we'll try to
        accommodate your request.  --jordan
	...
2011/3/26-4/20 [Computer/HW/Memory] UID:54062 Activity:nil
3/19    When you're explaining the stack to people do you draw it with the
        highest addresses at the top or at the bottom?
        \_ When I explain any memory layout including stacks, I draw with the
           highest addresses at the bottom.  But I've seen people doing the
           other way.  -- yuen
           \_ do you by any chance have seen or have a jpg of the full memory
	...
2010/7/25-8/25 [Computer/SW/Graphics] UID:53897 Activity:nil
7/25    What's up with that moving bit pattern that Win7 displays when it
        boots up?  (It's the one that's like in the Apple II days when you
        use the graphics memory for code or data while it's still in HGR
        mode.)  Is there a way to disable that?  It slows things down a lot
        every time I reboot my Win7 VM on my office machine if I RDP to the
        machine via DSL.  Thanks in advance.
	...
2010/5/26-6/30 [Computer/SW/Unix/WindowManager, Computer/SW/OS/OsX] UID:53844 Activity:nil
5/26    anyone use lxde?  supposedly it is less stupid than xfce and
        less bloated than gnome.  thoughts?
        \_ lol, does anyone still use desktop linux?  Get with the times
           buy a mac.  Now.  DO IT.  Go NOW.
           \_ but we prefer herring to Kool-Aid
              \_ "you have to yell, he's hard of herring"
	...
2010/6/4-30 [Computer/SW/Languages/C_Cplusplus] UID:53849 Activity:nil
6/4     Is this valid C++ code?
        std::string getStr(void) {
            std::string str("foo");
            return str;
        }
        void foo(char *s);
	...
2009/12/7-2010/1/3 [Computer/HW/Memory, Computer/HW] UID:53574 Activity:nil
12/7    How many TCP retransmits are too many? Here is what I get:
            3594143433 segments received
            3760174421 segments send out
            3801829561 segments retransmited
        \_ rephrase. you can never have too much money. or too little.
           what is, is.
	...
2009/10/27-11/3 [Computer/HW/Drives] UID:53474 Activity:nil
10/27   I just read an article that Facebook had moved their database
        to all SSD to speed throughput, but now I can't find it. Has
        anyone else seen this? Any experience with doing this? -ausman
        \_ I hope you're not running mission critical data:
           http://ask.slashdot.org/story/09/10/27/1559248/Reliability-of-PC-Flash-SSDs?from=rss
        \_ Do you have any idea how much storage space is used by Facebook,
	...
2009/7/21-24 [Computer/SW/Languages/Java] UID:53168 Activity:moderate
7/20    For those who care btw, it looks like eclipse is now A Standard Tool
        at UCB ugrad cs, probably replaced emacs.  Furthermore, people get
        angry at seeing Makefiles, (since eclispe takes care of that).  I
        guess it's just a sign of the times.
        \_ The more people at my work use eclipse the less the code is
           managable in emacs.  I'm not sure which application's fault
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
Cache (8192 bytes)
www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
piece of research: We show that disk encryption, the standard approach to protecting sensitive data on laptops, can be defeated by relatively simple methods. We demonstrate our methods by using them to defeat three popular disk encryption products: BitLocker, which comes with Windows Vista; The root of the problem lies in an unexpected property of today's DRAM memories. DRAMs are the main memory chips used to store data while the system is running. Virtually everybody, including experts, will tell you that DRAM contents are lost when you turn off the power. Our research shows that data in DRAM actually fades out gradually over a period of seconds to minutes, enabling an attacker to read the full contents of memory by cutting power and then rebooting into a malicious operating system. Interestingly, if you cool the DRAM chips, for example by spraying inverted cans of "canned air" dusting spray on them, the chips will retain their contents for much longer. At these temperatures (around -50 C) you can remove the chips from the computer and let them sit on the table for ten minutes or more, without appreciable loss of data. Cool the chips in liquid nitrogen (-196 C) and they hold their state for hours at least, without any power. Just put the chips back into a machine and you can read out their contents. This is deadly for disk encryption products because they rely on keeping master decryption keys in DRAM. This was thought to be safe because the operating system would keep any malicious programs from accessing the keys in memory, and there was no way to get rid of the operating system without cutting power to the machine, which "everybody knew" would cause the keys to be erased. Our results show that an attacker can cut power to the computer, then power it back up and boot a malicious operating system (from, say, a thumb drive) that copies the contents of memory. Having done that, the attacker can search through the captured memory contents, find any crypto keys that might be there, and use them to start decrypting hard disk contents. We show very effective methods for finding and extracting keys from memory, even if the contents of memory have faded somewhat (ie, even if some bits of memory were flipped during the power-off interval). If the attacker is worried that memory will fade too quickly, he can chill the DRAM chips before cutting power. Fundamentally, disk encryption programs now have nowhere safe to store their keys. Today's Trusted Computing hardware does not seem to help; for example, we can defeat BitLocker despite its use of a Trusted Platform Module. There is a general security problem illustrated here: it is very difficult to secure data when the attacker has physical control of the machine the data is stored on. February 21, 2008 01:52 PM I thought that this was the reason for having the "memory count" at boot-up -- it "wiped" DRAM before startup. I seem to recall later Macintosh computers appearing with this "new old" behavior (about the same time they started using a "standard" keyboard layout); It would seem that having the BIOS do a DRAM "initialize" as part of the POST process would minimize if not render this method moot. February 21, 2008 01:59 PM Quite a few people will be happy about this: the police, anti-virus researchers, DRM breakers. I especially like the bit where they moved the RAM to another machine before reading it. Maybe if I welded my case shut, set the BIOS to boot only from the HD and password protected the BIOS? February 21, 2008 02:01 PM Bootman has a nice idea, but it's probably not going to work in general, as 512 bytes probably isn't enough space. Laptops have batteries, so you can probably convert the problem into a very tight race: if either the battery or the mains are disconnected, zap the keys. The downside is that you need to prevent crypto-access to the disk until both mains and battery are online. February 21, 2008 02:07 PM The DRAM hold is actually quit old news ands has a fairly simple solution. You build your key dynamicaly into a CPU register imediatly prior to use. The key its self is either never stored in RAM or (due to OS issues) securly over writen imediatly it has been loaded etc. The difficult bit is how do you split the key up or encode it so the parts you build it from cannot be found and used to build the key? It can be done and is done in some secure coms units its neither difficult or obvious. February 21, 2008 02:07 PM Terry Browning: If you read the paper, the memory check/count is a write/read test, so it does actually clear/reset the bits, and systems with ECC have manditory reset on the bits. Part of the problem is that if you can take the machine apart enough while its live, you can freeze the memory with a duster canister, and the memory is good for over 10 minutes at -50C, which is sufficient to put it into a different host which doesn't do the memory clearing on startup. February 21, 2008 02:09 PM The DRAM hold is actually quit old news ands has a fairly simple solution. You build your key dynamicaly into a CPU register imediatly prior to use. The key its self is either never stored in RAM or (due to OS issues) securly over writen imediatly it has been loaded etc. The difficult bit is how do you split the key up or encode it so the parts you build it from cannot be found and used to build the key? It can be done and is done in some secure coms units its neither difficult or obvious. February 21, 2008 02:10 PM Clive, the problem is you need some serious low level OS and CPU VooDoo to get a piece of memory, even just 256b, that doesn't leave the confines of the cache. February 21, 2008 02:21 PM @Anonymous -50 is no big deal. The thin metal or plastic clips you will touching have almost no heat capacity so your fingers will heat them to body temperature almost immediately. Where we live our fingers are exposed to air of similar temperature every winter and air has about the same heat capacity as these tiny clips. February 21, 2008 02:50 PM This effect was discovered in late 1978 at Apple. The Autostart ROM for the Apple checked for a RAM jump-vector at every reset. In order to detect a cold boot, it was necessary to use a checksum byte. February 21, 2008 03:03 PM Seems to me the natural defense against a power-interrupt attack is to rely on induction to wipe the memory. That is, somehow arrange for a coil carrying a DC voltage around the DRAM, with the voltage chosen so that a sudden power interruption will induce enough current in the chips to put some random charge on each little storage capacitor --- but hopefully not enough to damage the chip, or mess up the hard drive. Of course, now you have to protect the coil, and its circuit... Why can't the OS just wipe the sensitive bits when: a) the OS is shutdown, or b) the power supply detects powerfail? The CPU and RAM should still have a few milliseconds between the powerfail signal and the PSU's smoothers actually running out of juice. February 21, 2008 03:36 PM @Clive : "Just think of a snake swallowing its tail in the dark then work out how it could do it forever 8)" Judging from the triple posting I suspect you've been drinking benzene rather than dreaming about it! February 21, 2008 03:39 PM (Sorry, apparently this blog eats html in comments) "The difficult bit is how do you split the key up or encode it so the parts you build it from cannot be found and used to build the key?" People have reverse-engineered far more complex obfuscation techniques than that just to crack their favourite game. February 21, 2008 03:40 PM Andrew2 OS shutdown is no problem - there's lots of time then; The latter problem has a couple of reasons - nobody thought of doing it - which few hundred KB to wipe with your last precious power? You'd have to provide, in hardware, for every possible disk encryption system. Alternately I guess, hardware vendors could provide a standard memory range that will always be wiped regardless of whether shutdown is graceful. OS's would have to provide a method to guarantee that certain data will be kept in such self-destructing RAM, and never leave it. That's where the bios bootloader will put the fir...
Cache (1155 bytes)
citp.princeton.edu/memory -> citp.princeton.edu/memory/
Abstract Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems -- BitLocker, FileVault, dm-crypt, and TrueCrypt -- using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.