> On Apr 1, 2018, at 5:16 PM, CuriousCustomer <
samburg...@gmail.com> wrote:
>
> Hi there,
> I'm considering getting a Chromebook for its world-class safety and security mechanisms.
>
> I have some remaining concerns and curiosities, though. It is often said that a persistent compromise of the Chromebook is impossible, aside from malicious browser plugins and extensions.
>
> Sandboxing and verified boot seem to be the keys to the enhanced security of CrOs. In light of the demonstrated persistent RCE compromises achieved twice by bounty-winning researcher Gzob Qq (please see
https://nakedsecurity.sophos.com/2017/11/22/chromebook-exploit-earns-researcher-second-100k-bounty/ and
https://bugs.chromium.org/p/chromium/issues/detail?id=648971), I'd like to ask if anyone can explain, in layman's terms, how this researcher was able to achieve persistence.
>
> 1) I understand sandboxing vulnerabilities and sandbox escape are a rare fact of life and new exploits will be discovered from time to time. But why was verified boot unable to catch the persistent modification to the OS?
>
Verified boot protects two portions of system data through a
digital signature:
* The kernel.
* The root file system.
However, the system also contains writable data, which isn't
(and can't be) protected by the verification process. The
specific exploit cited took advantage of some of that
unverified data.
> 2) Did the exploit it write something into the OS partition or the user partition that is loaded when the OS boots up in order to achieve persistence?
>
The exploit compromised stateful partition data stored under
/var. By necessity, this data:
* Is writable.
* Is persistent across boots.
* Can't be protected by verification.
The particular data that was compromised is read during boot,
so the net effect was that at boot time, the compromised data
would trick the boot process into re-enabling the malicious
code.
> 3) How could one mitigate and regain control after a theoretical compromise? I understand the chances of this happening to anyone are low (and this specific route in the linked article is impossible since version 62). I am curious about "if/how it is possible to disinfect?" in this unlikely event. Would a powerwash do? Why or why not?
>
Powerwash wipes out and reformats the stateful partition. That
means that, for this exploit, powerwash would remove all of the
compromised files, thus removing the malicious code. More broadly,
one of the uses of powerwash is that can clean up this particular
class of persistent exploit.
> Thank you so much.
>
> --
> --
> Chromium OS discuss mailing list:
chromium-...@chromium.org
> View archives, change email options, or unsubscribe:
>
http://groups.google.com/a/chromium.org/group/chromium-os-discuss?hl=en
>