A security researcher has released an easy-to-use tool that accesses locked Windows computers in seconds without entering a password. The tool, which was released Tuesday by Adam Boileau, works by connecting a Linux machine to the Firewire port of the target PC and modifying the password protection that's stored in local memory …
Disable firewire when machine is locked?
"After all, how hard could it be disable Firewire connections while a PC is locked?"
Microsoft cannot win this one. If lock my workstation while I am capturing video via 1394 or copying files to a firewire drive, I would be quite unhappy to find that locking my workstation disabled the 1394 ports.
On the other hand, they cannot leave this unpatched. Too many people rely on hardware locks and the ability to lock the workstation.
Why not fix the direct memory problem? Why should a 1394 device (or any device plugged into an external port) have absolute access to anything as vital as memory, hard drives or such just by the merit of being plugged in?
(Yes, before you ask, I do disable autorun and autoplay on all of my machines. Keeps those pesky iPod virii off my Windows machines.)
It is nice to see that the 1394 spec is an equal opportunity offender, hitting Linux (what about BSD?) and OS X, too.
Disable new firewire connections while machine is locked
You don't need to disable existing firewire connections while the machine is locked, just prevent new connections from being made. I know nothing about how firewire works, but I assume a new connection raises some kind of 'event' which can be ignored.
"Tool makes mincemeat of Windows passwords:
If Tool can hack my passwords, I'd hate to see what Korn could accomplish with a backdoor.
@ Joey Y
Pssssssssst the article said OSX is a target too
that this firewire exploit is a hardware problem not a software one. i.e it can't be fixed with code but it can with epox.
Since when have we required Firewire?
OK, it's a NEW exploit for cracking a Windows password, but far from the first.
All you need is a CD or USB disk and BartPE + Sala Password Renew, or pnordahl's Linux-based password resetter to crack any NT-based Windows machine (including Vista). And with physical access to a DC, no problem with resetting the Domain Admin pword either.
RE: I heard
So it works even if there's no firewire device driver on the target? Interesting.
RE:Tool makes mincemeat of Windows passwords:
A man after my own heart. Though to add another to that the damn Anthrax virus just gave me the finger and then my components started to bleed.
@ kain preacher
Re-read what Joey Y wrote
It is nice to see that the 1394 spec is an equal opportunity offender, hitting Linux (what about BSD?) and OS X, too.
See those brackets.. They are important to the meaning of the post.
Reduce attack surface!
This is a yet another symptom of functionality creep.
Most laptops have connections that we never use... but we keep them enabled just in case...
So time ago I bios-disabled all connectors I never use: COMs LPTS, Modems... etc.... and not only this increases security (by simply applying the "reduce the attack surface" principle) but it actually it can increase performance by precluding drivers from loading...
what about bsd
Well, since OSX is based on BSD for its kernal I'd have thought that this would work for BSD too.
I wonder how many fanboys of all camps will be chanting away to the song "no it doesn't", with a few additional renditions of "osx doesn't do virus and security holes" in the chorus.
Partly by design
The problem arises in hardware - basically, firewire is designed such that DMA is permitted without the intervention (or even consent) of the OS. One of the advantages is that you can obtain a core-dump of a crashed paniced kernel via firewire.
What isn't clear is how to really mitigate the threat.
Incidentally, I disagree with the "if you have physical access to the machine, all bets are off" argument, because this usually requires a reboot to a liveCD, removing the disk, or attaching a probe to the PCI bus. Most such attacks (except extremely sophisticated forensics) will cause the PC to be rebooted, thereby losing encryption keys.
So reading the article I've come to the same conclusion that this is nothing to do with the OS as such. Sure Windows or any other OS could disable Firewire DMA but then no devices would work. The suggestion of not allowing new connections is a bit of a red herring because this is not at the OS level it's harware. If the owner of a machine has enabled (or rather not disabled) Firewire then they are at risk.
This means that the best you could hope for is that Microsoft release a patch that disables Firewire by default and the user has to actively enable Firewire when they need it. If the device is removed then the OS must disable Firewire DMA and the user must enable it again when connecting the next device.
How long before people post complaints of Microsoft has for some reason made using Firewire difficult.
DMA or Direct Memory Access
For many years periferal chips have had a high speed mode where they dump data stright into RAM bypassing the CPU. This usually occures during CPU wait states where they can control the address and data buses. However I would have thought that it would only have access to a limited area of RAM devoted to the DMA process but I don't know.
I expect the technique of accessing an internal area of a 'computer' that has been unencrypted will work on everything including Chip 'n' Pin machines. I would say this needs a hardware solution. Perhaps we need an encrypted CPU, one who's instructions are actually carried out encrypted so it's impossible to tell what it's doing until it's done. This may be logically impossible, I can't get my head round it.
If the 1394 is disabled in BIOS surely the attack must fail?
This is down to best practice of disabling services you don't need and I wonder how many of those at the greatest risk from this attack, perhaps in large buildings with lots of offices where physically security could be tricky, know that 1394 exists let alone actually using it?
It's not fair
to single out MS on this one.
I'm a Linux advocate and I can't believe I'm saying this, but if Apple and the Linux kernel team haven't sorted this out either, then why pick on MS?
Maybe this could be an opportunity for MS to prove to the world it has changed (as they are so keen on telling us) by solving the problem first and share the solution with everyone else ;) Oh, is that a pig I see going past my 2nd floor window....?
Wouldn't this work on those nice handy SATA plugs that newer PCs are starting to sprout?
Wayland makes an interesting point......
The underlying vulnerability is nothing to do with windows. The hack that is exploiting it is, however, targetted at windows.
There's no reason why you couldn't put a hardware encrypt/decrypt between the CPU & the memory (although it would obviously slow the system down quite considerably) - and it would be possible to flag "sections" of memory as either encrypted or unencrypted. This would allow you to (for example) still use DMA to unencrypted memory, and then either continue to use it unencrypted or take the hit of encrypting it. The problem (in making this secure rather than just LOOKING secure) would be getting the chipset to use the encrypt/decrypt for CPU access, and not non-CPU DMA. I don't think it's insoluble, but it's beyond my knowledge thank god - I've got enough problems dealing with OS level encryption to stop people losing sensitive data the old fashioned way.
is a bit vague in this context... the various flavours of BSD all have slightly different kernels. I do expect all to be equally vulnerable though, except for openbsd which has no firewire support (due to concerns about DMA security, IIRC)
Cue lots of dummy firewire plugs with locking keys...
damned if ou do and damned if you don't
"Microsoft is sure to point out that it's made possible by features built into the IEEE 1394 specification. That's true, but we're not sure that's enough to get Microsoft off the hook for failing to fix a weakness that's been in the public domain for at least two years."
Well the sure are to point out that it's the spec.
just like the guys coding Linux are sure to point out it's in the spec...
the question is who breaks the spec first?
do MS break the spec, fix the hole and then get critisism for not following a standard spec, or will the Linux guys do it first, leaving microsoft getting critisised for leaving the hole open...
after reading the article, I was somewhat surprised the author didn't refer to MS as M$, micro$ucks, micro$haft or any of the other innane I just don't like microsoft nicknames applied by his ilk
long and the short, it's not a nice bug, but it's also not microsofts fault. -if anything that researcher finding it affected all systems should have taken his beef up with the engineering council who wrote the specs.
The real issue
Is not firewire, the firewire protocol or any 'bug' in firewire.
The real issue is that windows uses well publicised <i>physical</i> memory addresses for various parts of the OS and this is bad.
Having direct access to physical memory is not as useful as it first seems, since all modern operating systems use virtual memory, and any virtual memory block could be read/written into just about any physical memory locations, which makes it very difficult to predict what is where in physical memory at any time, except of course for Windows', linux's and Max OS X's placing of some sensitive parts of the OS into known and publicised physical memory locations.
The real solution is for the OSes, if really necesary to have these things at a fixed physical location, to dynamically allocate that location at boot time and prebind executable as they are loaded. Rather than hard coding it into the libraries.
Busmastering DMA controllers the problem?
I must admit that I am years behind the times, but when I studied DMA controllers in detail, the OS programmed the memory mapping registers on most architectures to limit the DMA controllers access to just the memory that it needed. This was before the advent of busmastering controllers, but I cannot see that not limiting the memory region, or allowing the controller to access the memory management registers can ever have been a good idea.
In the normal scheme of things, the DMA write operations needs the controller to know where it is safe to write the information, even if it is taking control of the bus in a non-solicited manner. Of course, read operations are not as critical, but again, for a DMA controller to do anything useful, it is necessary for it to be told where to look.
As a result, allowing the controller carte-blanche to the memory map of the system should never really be necessary. Surely this means that the DMA access for firewire must be a mis-feature at the very least, even if it is not a flaw in the design. Or is it really a problem with the northbridge memory controller in a PC?
Maybe someone can enlighten me about why you would want to be able to allow a DMA controller full access to the memory, except to allow a box to be owned in this manner.
BTW, this is also an old story. Apparantly the technique was presented at Ruxcon in 2006.
its nothing to do with the operating system
as the article says, it is a fault of the firewire specification, if an OS maker tried to work around the flaw theyed only be hammered by the users for not sticking to the specification
as most of us have no need what so ever for firewire there is a nice physical security device for dealing with unneeded ports - its called 2 part epoxy resin - theres no way any kind of software attack id getting thru that!
as firirewire on laptops, i believe sony started the craze when the called it i-link and used it on their cybershot cameras in the days before usb2, now theres very little point to it (tho in those early days it was dubious as to exactly what your average celeron 500 / 128mb ram / win98 laptop could make of a high speed firewire connection...)
Useful comment, but not completly valid. The OS always has to be able to find this information, so has pointers that can themselves be found (paging tables with known base addresses etc.) All you have done is added an extra level of abstraction, which may deter some people, but not those with serious knowledge, or access to clever tools. Of course, this may make OS's with their source code visible more vulnerable.
Passware has been able to do this for years.
Firewire? Who needs FireWire when all you need is a CD???
This has been possible on Windows Vista and XP for quite some time using a simple CD. You insert the CD in the drive at boot time and select the windows account you want to erase the password to, it just erases the password so after a reboot you can login with the account and no password.
I have verified this on both a Vista Home and XP Pro installation and both worked flawlessly.
It's all Apple's fault
If the problem is in the spec then...
Firewire originated with Apple, so it's their fault.
@AC "now theres very little point to it"
Firewire is a great interconnect, my Maxstor external disk ran quite a bit fast connected to Firewire than it did with USB2, even though the peak theoretical bandwidth was only 400Mbs against USB2's 480Mbps. But the best thing about Firewire is that it doesn't need a computer at all. I can plug my video camera straight into my PVR and copy stuff over, or write it straight to DVD without having to faf about loading all sorts of shit on my PC. Adobe Premier is a fantastic bit of software, but if all I want to do is stick a short bit of video onto a DVD for friends it's not exactly the most socialable way to get it there.
But I can not for the life of me see why an external peripheral should be able to set up it's own DMAs. The normal scheme of things is that a peripheral interrupts the CPU and the CPU then sets up the DMA and is notified on completion.
@Peter G (@ Kenny M)
Peter G wrote:
"The OS always has to be able to find this information, so has pointers that can themselves be found (paging tables with known base addresses etc.) "
I think what Kenny M was noting is that the pointers point to:
whereas, is it not feasible to write kernel code for these pointers to point to:
This - IMHO - is not "an extra level of abstraction", rather it is a measure of obfuscation that is applied per instance, per session.
The kernel code could still be published, open source being lovely and all that, and the combinatorial limitation of the chosen implementation of "(pseudorandomly)" could even be explicitly stated in comments for those to busy or lazy to independently derive it. The <bold> point </bold> being that the range of possibilities generated (pseudorandomly) being just sufficiently high enough to deter the determined yet time-limited exploiter ("you've got three minutes left before the user returns to his desk, Ethan Hawke") from attempting this escapade.
However, for the majority of people with Firewire connectors on their machines, I recommend a small does of two part epoxy adhesive (e.g. "Araldite") as opposed to "super glue", such a cyanoacrylate adhesive may not set
I was thinking the same thing, what's Maynard and crew been up to now!
Great news, at least I have another excuse to the Missus about justifying that expense on buying my EEE PC and taking everywhere I go. "Sorry my dear! You just never know when some poor soul may need saving from a locked Windows PC!".
Try that in my PC and you'll get no effect at all.
Anyone that is remotely security conscious will not have CD or USB devices in the default boot path. The problem with the firewire hack seems to be that it bypasses all such precautions.
"you only need a cd"
This has been possible on Windows Vista and XP for quite some time using a simple CD. You insert the CD ....
yeah but this exploit will get you into somebody elses logon, without having to reset anything, so they wont know. quickly.
I thought firewire was dead now anyway? , and why not clear things like passwords out of the ram when the machine is locked?
Easy to spot someone running around...........
Easy to spot someone running around with a laptop running linux and a firewire cable in their hand. I would have thought that might have given it away.
That really sucks
So basically, it seems in this case that installing a Firewire port is equivalent to installing an externally readable (writable?) memory probe. And then somehow blaming MS/Apple for it... Hmm, yes Apple...
Software clearly isn't the culprit here, neither are drivers. This is a hardware glitch (aka feature).
No, the fault lies with the designers of Firewire. There is no justification for allowing a Firewire device to probe memory beyond the range given to it by the OS (possibly for debugging, but then it should default to off). All other DMA devices must be told by the OS where to transfer data to.
This is such poor design that I wouldn't be surprised if some fraction of Firewire ports already do not adhere to the spec (and are not vulnerable).
Re: Boot CD Crew
The point is, once you're in with a login without a password, what do you look at? If you go into a locked PC you've got everything open that's being worked on, etc.
This is completely unworkable. Even if you did abstract the base addresses of important OS stuff, you would still have to store the addresses of the base address lookup table (or however you did it) somewhere. For systems programming, and low level work it would make coding a nightmare.
It's NOT completely a hardware-based problem...
[quote]The reason Maximillian’s attack doesn’t seem to work against Windows XP is that OHCI specifies “Asynchronous Filter” and “Physical Filter” CSRs (a CSR is a hardware ioctl, by the way); if these CSRs are set to zero, the FireWire chipset will reject requests to access host physical memory. According to the spec, they default to zero. Windows doesn’t set them. So, by default, Windows disallows FireWire DMA.[/quote]
DMA on a hot-pluggable interface is a problem.
Hmm, what about audio and video streams?
Is there some scope here for writing a Firewire probe capable of grabbing unencrypted audio and video streams out of memory, or are there hardware measures in place too nowadays?
More access than password resetters
Booting a tool from a CD/USB key only gives you access to reset local accounts. Using this tool if a user is logged onto a domain or other network resources and you unlock their session you have their access to that as well as the local machine.
why should external hardware have unfettered access to my system's internals? bigger machines have had things called IOMMUs for a while that stop, a bit like the MMU on your CPU, hardware from looking at memory they shouldn't. crypto is another way to do this, it's much less efficient though.
Hardware/specification/dma/busmastering fault? Rubbish!
I very much hope that all those condemning firewire for its fundamental design will also slag off the existence of the PCI bus and all those other completely standard features of PC architecture, because it's exactly the same.
Yes, Lou Gosselin, it is exactly like "installing an externally readable memory probe". So is plugging in a PCI card. So is plugging in a PCMCIA card. So is plugging in a CPU, or a RAM chip. No, Wayland Sothcott, it's been many many years now since DMA was limited to accessing the areas of memory that the CPU maps for it. Since the invention of the PCI bus, basically.
It's one of those things that is implicit but perhaps never made quite as clear as it should be: the firewire port is exactly like having a PCI expansion slot on your front panel or a PCMCIA slot in the side of your laptop; anything you could do by one you could do by the other. It's no more a "design fault" that it provides full access to the system busses than any of those other interfaces. The rule is still exactly the same in all cases: if you let someone plug hardware into your PC, they can control it. Doesn't matter whether it's USB (did I mention it's trivial to own a machine through the usb port?), Firewire, PCMCIA, PCI, or even the serial port; it's all the same. About the only thing that's not vulnerable to an attacker with physical control is the power connecter.
....to the list...
...Trix... Many ways are there to skin the cat that is windows....
Power Connector Vulnerable as well.
"About the only thing that's not vulnerable to an attacker with physical control is the power connecter."
Don't see why that's not vulnerable, at least to a DOS attack...
re: Hardware/specification/dma/busmastering fault? Rubbish!
Yes, Lou Gosselin, it is exactly like "installing an externally readable memory probe". So is plugging in a PCI card.
Obviously PCI cards have access to the bus, this should not surprise or disappoint anyone. DMA is not intrinsically faulty. Sound cards use dma, so do network cards. Nobody expects these to be vulnerable. These devices are given memory addresses by the CPU and NOT the external cable. The problem is that apparently the Firewire architecture is designed to allowing Firewire nodes to make memory requests directly by exposing DMA to the outside. This design has significant ramifications to security beyond PCI bus sniffers.
So the comparison between Firewire (an external bus) to PCI (an internal bus) is not really fair. As for USB, it doesn't work like Firewire does. Devices do not instruct the USB host controller as to where to read/write memory. DMA is used as intended and the range is determined by the OS, not the device. You may have a valid point with PCMCIA on Laptops, although that's a different story.
Even if it is possible to disable the flaw in software, some Firewire devices will cease to function any longer because this is how they work by design. The article itself said that certain device profiles will open up the hole.
That being said, it is very likely that many USB (and Firewire) drivers have buffer overflow bugs which could be exploited without this design flaw. Unlike the flaw, these would have to be OS specific and could be fixed once discovered.
and who's to blame for this ?
APPLE ! they invented the bloody thing in the first place..
Now that the flaming is over
I am a heavy user of firewire (in windows) . It beats the snot out of usb anytime.
I have external harddisks on firewire , my High Def (1080i) camcorder uses firewire, i even have 2 DVD burners on firwire. No drivers needed. Plug it in and it works.
For a time (when gigabit lan didn't exist or was outrageously expensive ; 5 years ago ... ) i even had 4 (windows) computers interconnected with firewire ( you can run tcp/ip over firewire you know ? 400 Mb / s instead of 100 Mb /s ...
Big improvement !
And with ieee1394b you can go 3 Gb/s and beyond !
The answer is dead old.
We should have listened to Von Neumann.
Von Neumann wanted to partition system memory, but we adopted a model of general purpose shared memory as a matter of efficiency and flexibility.
The Von Neumann machine, as proposed, would have been immune to code insertion exploits: buffer overruns would only have affected data memory, not code memory.
Had we been using a Von Neumann architecture, I am pretty confident that as networking and peripheral use grew, we would have expanded the model and developed memory sandboxes for things like DMA and this exploit would never have existed.
We could still do it today!
You don't use FireWire?
You don't have a camcorder?
I didn't know people like you existed.
Pah! HARVARD partitioned data side from program side.
"Harvard architecture is a computer architecture with physically separate storage and signal pathways for instructions and data. The term originated from the Harvard Mark I relay-based computer, which stored instructions on punched tape (24 bits wide) and data in electro-mechanical counters (23 digits wide). These early machines had limited data storage, entirely contained within the data processing unit, and provided no access to the instruction storage as data, making loading and modifying programs an entirely offline process."
"The von Neumann architecture is a computer design model that uses a processing unit and a single separate storage structure to hold both instructions and data."
Harvard architecture processors are available, e.g. SHARC - they are somewhat optimised for hard-real-time numerical calculations (e.g. SONAR and RADAR signal processing) rather than general purpose computing. There is no port of Vista to a Harvard processor in the offing AFAIK.
Method and Device for Securing Fireware (IEEE 1394) Ports
Actually, it would take several devices; one for each different size port connector. But all it really consists of is a plug which locks into the port and cannot be removed without a physical key, or obvious physical damage to the computer.
This won't help if someone routinely walks away with firewire devices plugged in, but an unused port could be secured.
Title chosen to make it obvious that this is a patentable concept, and I claim first publication rights. No other patent filers need apply.
You know what is the really bad thing ? ALL intel processors are HARVARD machines by design !. it's that concoction that IBM called 'PC' that did a lot of kludging to get around the 'harvard' architecture.
The annoying part with harvard is you have to split your memory up front. this much for code, that much for data. and dynamically loading a program becomes difficult... especially with modern systems that can remap ...
I too like harvard machines , especially for embedded applications that are mission criticla. There is NO possibility for a runaway progrma to corrupt its own code. Also the I/O space is separate on a good harvard machine.
That , and it makes debugging code easier. if you look at a hexdump you know what you are looking at this is code , that is data , that is i/o.
- Apple's spamtastic iBeacon retail alerts launch with Frisco FAIL
- Submerged Navy submarine successfully launches drone from missile tubes
- Cache in the Attic El Reg's contraptions confessional no.2: Tablet PC, CRT screen and more
- Pix Astroboffins spot HOT, YOUNG GIANT where she doesn't belong
- Developer unleashes bowel-shaking KILLER APP for Google Glass