From: Joanna Rutkowska <joanna@invisiblethingslab.com>
To: Tim Deegan <tim@xen.org>
Cc: Jan Beulich <JBeulich@suse.com>,
Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
George Dunlap <George.Dunlap@eu.citrix.com>,
"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
Lars Kurth <lars.kurth@xen.org>, Matt Wilson <msw@amazon.com>
Subject: Re: Security discussion: Summary of proposals and criteria (was Re: Security vulnerability process, and CVE-2012-0217)
Date: Mon, 09 Jul 2012 16:08:04 +0200 [thread overview]
Message-ID: <4FFAE5C4.8010600@invisiblethingslab.com> (raw)
In-Reply-To: <20120709135101.GA83420@ocelot.phlegethon.org>
[-- Attachment #1.1: Type: text/plain, Size: 2243 bytes --]
On 07/09/12 15:51, Tim Deegan wrote:
> At 13:31 +0200 on 09 Jul (1341840671), Joanna Rutkowska wrote:
>> > If you're into security industry (going to conferences, etc) you
>> > certainly know the right people who would be delight to buy exploits
>> > from you, believe me ;) Probably most Xen developers don't fit into this
>> > crowd, true, but then again, do you think it would be so hard for an
>> > interested organization to approach one of the Xen developers on the
>> > pre-disclousure list? How many would resist if they had a chance to cash
>> > in some 7-figure number for this (I read in the press that hot
>> > bugs/exploits sell for this amount actually)?
> I think the argument is that an exploit that's going to be public (and
> patched) in the next couple of weeks would not fetch the same kind of
> price as a unknown attack that can be kept for later.
Depending on the type of an exploit. For client-side exploits, perhaps
you're right. But for infrastructure attacks it's a different story --
having an exploit such the Rafal's one, I could have *silently* exploit
lots of AWS machines and install backdoors in their hypervisors/dom0.
The fact that they will patch the bug two weeks later might be
irrelevant then.
After all, how are you going to check whether your physical server has
been compromised? Most people don't use any form of trusted boot, but
even if they did, it's not a silver bullet as we have demonstrated a few
times in a row. And if you don't have trusted boot, as most people, you
have very little chances to detect a custom-made backdoor. Even if you
are allowed to reboot the machine and boot "good known binaries", which
often you cannot do, are you going to manually audit all the firmware,
ACPI tables, etc? Not to mention about the integrity of the actual VMs,
that might have also got compromised (and checking for integrity of a
running OS, such as Linux or Windows, is just undoable).
Having that said, 2 weeks might be a bit short to prepare such an
advanced attack. In this respect, it would be probably beneficial to
keep the embargo period as short as possible (that still allows
important players to patch before others). 1 week perhaps?
joanna.
[-- Attachment #1.2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 455 bytes --]
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2012-07-09 14:08 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-07-06 16:46 Security discussion: Summary of proposals and criteria (was Re: Security vulnerability process, and CVE-2012-0217) George Dunlap
2012-07-08 7:30 ` Joanna Rutkowska
2012-07-09 9:23 ` George Dunlap
2012-07-09 11:31 ` Joanna Rutkowska
2012-07-09 13:25 ` Joanna Rutkowska
2012-07-09 13:35 ` Keir Fraser
2012-07-09 13:40 ` Joanna Rutkowska
2012-07-09 13:51 ` Tim Deegan
2012-07-09 14:08 ` Joanna Rutkowska [this message]
2012-07-12 16:34 ` Stefano Stabellini
2012-07-12 16:47 ` Joanna Rutkowska
2012-07-12 17:00 ` Stefano Stabellini
2012-07-12 17:22 ` Joanna Rutkowska
2012-07-13 18:15 ` Stefano Stabellini
2012-07-14 0:18 ` Security discussion: Summary of proposals and criteria Matt Wilson
2012-07-16 17:56 ` George Dunlap
2012-08-03 17:31 ` Security discussion: Summary of proposals and criteria (was Re: Security vulnerability process, and CVE-2012-0217) George Dunlap
2012-08-06 6:55 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4FFAE5C4.8010600@invisiblethingslab.com \
--to=joanna@invisiblethingslab.com \
--cc=George.Dunlap@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=lars.kurth@xen.org \
--cc=msw@amazon.com \
--cc=stefano.stabellini@eu.citrix.com \
--cc=tim@xen.org \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).