Installation security : Usb optical vs sata optical vs usb drive

36 views
Skip to first unread message

mmm...@gmail.com

unread,
Jan 2, 2018, 12:20:46 AM1/2/18
to qubes-users
So from the installation security guide I read the following:
"Use a USB optical drive.
Attach a SATA optical drive to a secondary SATA controller, then assign this secondary SATA controller to an AppVM."

And for USB Drive:
"Untrustworthy firmware. (Firmware can be malicious even if the drive is new. Plugging a drive with rewritable firmware into a compromised machine can also compromise the drive. Installing from a compromised drive could compromise even a brand new Qubes installation.)"

Do usb optical drives not also have the same problem firmware wise?

What about sata?

Tom Zander

unread,
Jan 2, 2018, 7:00:33 AM1/2/18
to qubes...@googlegroups.com, mmm...@gmail.com
On Tuesday, 2 January 2018 06:20:46 CET mmm...@gmail.com wrote:
> So from the installation security guide I read the following:

> And for USB Drive:
> "Untrustworthy firmware. (Firmware can be malicious even if the drive is
> new. Plugging a drive with rewritable firmware into a compromised machine
> can also compromise the drive. Installing from a compromised drive could
> compromise even a brand new Qubes installation.)"
>
> Do usb optical drives not also have the same problem firmware wise?

The problem with USB is that its universal. An attacker can make his device
look like its anything USB based. For intance a rarely used web-camera.
The problem with that is that each brand has its own driver in the Linux
Kernel and most of those drivers are hardly checked for exploits.

As such, an innocent looking thing that connects on USB could root your
kernel with unknown exploits in any usb driver shipped by the kernel.
Just using a different firmware.
This is why there is the suggestion to have a sys-usb qube to isolate those
drivers, should you fear your hardware in future falling in the hands of bad
people.


> What about sata?

I hope someone else can answer this.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel

Unman

unread,
Jan 2, 2018, 6:20:51 PM1/2/18
to mmm...@gmail.com, qubes-users
I remember some years back playing with WD hard drives, and reflashing
the firmware: it was possible to effectively engineer an exploit that
could spread across disks, and infect hosts.
We spent a little time working on the controllers, before we realised
the obvious - that by that stage the game was already lost. If you were
inside the box you had control anyway.

The principal risk in USB is exactly it's versatility and
accessibility. (I don't include eSATA and eSATAp here.)

So Yes, USB optical drives carry the same risks identified under the
USB drive heading.And it Is possible to attack SATA controllers, but far
less likely than for USB.
And frankly, you have to trust *something*. When you come to install
Qubes, you are trusting that your hardware isn't already backdoored, as
made clear in the first para.

unman
Reply all
Reply to author
Forward
0 new messages