back to article Gone in 70 seconds: Holding Enter key can smash through defense

Attackers with a little more than a minute to spare can get their foot in the door on Linux boxes by holding down the Enter key for 70 seconds – an act that gifts them a root initramfs shell. The simple exploit, which requires physical access to the system, exists due to a bug in the Linux Unified Key Setup (LUKS) used in …

Page:

  1. From the States

    Missing item in the series?

    "Debian, Fedora and are confirmed as suffering from this problem." We breathlessly await the Linux distribution that should be following "and".

    1. Michael Hoffmann Silver badge
      Joke

      Re: Missing item in the series?

      Reverse Polish Notation with only those two affected?

      1. Anonymous Coward
        Anonymous Coward

        Re: Missing item in the series?

        Reverse Polish? How dare you insult dyslexic Poles!

        *Cough*

        I'll get my coat... =-Jp

        1. Spudley

          Re: Missing item in the series?

          Reverse Polish Notation... I always thought they should have just called it Hsilop Notation.

          1. Andy Miller

            Re: Missing item in the series?

            is a specialist Linux distro that uses the whitespace language as it's default shell

          2. GrapeBunch

            Re: Missing item in the series?

            Hsilop Notation - How dare you inslut dylsexic Hislop's?

            1. ben kendim

              Re: Missing item in the series?

              And how dare *you* make fun of people with lysdexia?

          3. Martin
            Happy

            Re: Missing item in the series?

            I always thought they should have just called it Hsilop Notation.

            When I were a young whippersnapper programmer, we called it shilop - easier to pronounce.

          4. W.S.Gosset
            Happy

            Re: Missing item in the series?

            isn't that the chap on "Have I Got News For You"?

    2. Oh Homer
      Facepalm

      Re: Missing item in the series?

      The the most notable missing item is a link to the actual report, which states:

      Obviously, the system partition is encrypted and it is not possible to decrypt it (AFAWK). But other partitions may be not (sic) encrypted, and so accessible.

      Right, so ... just like booting from a thumbdrive, and you still have no access to the encrypted filesystem.

      Sorry, I must have missed the part where this is a "vulnerability", somehow.

      Same goes for planting malware on the boot partition, you could do that by booting from a thumbdrive, then mount any unencrypted partition from there.

      The "vulnerability" here, if there is one, is anything that isn't encrypted, not the fact that you can get shell access.

      Oh and yes, it certainly is possible to encrypt the boot partition.

      1. Ian Michael Gumby

        @Homer ... Re: Missing item in the series?

        If you have root and while you don't have access to the encrypted partitions... there's still some dangerous stuff you can do. ... (And no, I won't even hint at it...) [Even with a machine that has an encrypted boot partition...]

        But to your point... its not *that* dangerous.

        First it requires physical access to the machine. Most linux servers are in a rack in a secured machine room. Second, you'd have to bring your own monitor and keyboard. So the odds are that if you already have physical access to the machine, you would already have root privileges.

        1. Robert Carnegie Silver badge

          Re: @Homer ... Missing item in the series?

          Shurely you only need access to the keyboard. And maybe the power off and on.

          So this could crack a kiosk, a computer in a library, maybe an ATM...

        2. This post has been deleted by its author

        3. itzman
          Facepalm

          Re: @Homer ... Missing item in the series?

          if you have physical access you can boot a live DVD, remove the hard drive...cone the hard drive...

          Its a bit like saying that in addition to jemmying the doors, you could also smash a window to get into your house...

          1. LewisRage

            Re: @Homer ... Missing item in the series?

            It's like you people are willfully missing the point.

            At a kiosk machine/library machine etc you can't pull the disk out because it's completely fucking obvious to anyone nearby that you've just unscrewed the top of the box and are in the process of stealing some hardware.

            You can't boot from a disk as they've (hopefully) locked that down/removed the dvd drive.

            With this vulnerability you can hold down the enter key and get a root shell, to any casual observer you are just using the machine as normal, whilst the reality is your up to nefarious shenanigans that you shouldn't be.

            "Clone the harddrive"... yes, by using the unexpected root shell that you've got to from this vulnerability.

            1. Destroy All Monsters Silver badge
              Paris Hilton

              Re: @Homer ... Missing item in the series?

              "Clone the harddrive"... yes, by using the unexpected root shell that you've got to from this vulnerability.

              Yeah, but, keeping with the "kiosk machine/library machine while not wearing a blue nylon jacket with 'FBI maintenance' printed on the back"...

              1) Where do you plug in that additional drive?

              2) Why would you want to clone the fricking harddrive in the first place?

              Ok, so there should be screen that demands root password after you have not managed to type in the LUKS password correctly etc. etc.

              But really.

              I have a bigger issue with the screen lock on KDE Fedora 24 which shows the actual screen for about 1/10 of a second after a series of bad password entries...

        4. Mark 65

          Re: @Homer ... Missing item in the series?

          If you have root and while you don't have access to the encrypted partitions... there's still some dangerous stuff you can do

          Given the breach requires physical access I could:

          1. Steal the drives and/or machine

          2. Use a lump hammer on it

          ...

          you get the idea.

        5. Halfmad

          Re: @Homer ... Missing item in the series?

          Hold on now, isn't 2016 the year of the Linux desktop? Let's not go making perfectly sensible arguments that this isn't as bad as it appears as most of them are behind locked doors.

        6. Oh Homer
          Headmaster

          Re: "there's still some dangerous stuff you can do"

          Is there something more dangerous you can do from a busybox shell on the boot partition, than a full Linux system on a thumbdrive?

          My point is that this "vulnerability" is not new, it has absolutely nothing to do with escaping the init script, and it certainly doesn't warrant a CVE report, unless the reporter is claiming to have only just discovered that unencrypted filesystems are (shock!) vulnerable to direct access, where the init shell is only one point of access, and not even the most useful, from a hacker's perspective.

          1. jake Silver badge

            Re: "there's still some dangerous stuff you can do"

            "and it certainly doesn't warrant a CVE report"

            And it hasn't got one.

            http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484

            Does anyone commenting on this thread actually do security admin for a living?

      2. LawLessLessLaw

        Re: Missing item in the series?

        because if you have password protected the BIOS and turned off USB booting you wouldn't expect this to be possible

      3. AdamWill

        Re: Missing item in the series?

        Yeah, I'm not sure I'd describe this as a 'vulnerability' at all. Storage device encryption is not supposed to prevent people accessing a rescue shell on the system the encrypted storage device happens to be sitting in at that point in time. It's intended to prevent people accessing the *data on the encrypted device*. This 'attack' does nothing particularly significant to help you with that, except perhaps make it a bit easier to try a brute force attack.

        Even if you do consider this a 'vulnerability', the authors of the article are *massively* overplaying it.

    3. Robert Moore
      Coat

      Re: Missing item in the series?

      "Debian, Fedora and are confirmed as suffering from this problem."

      You have never heard of And Linux?

      Best distro ever. And is the new Ubuntu.

  2. Andrew Jones 2

    So the obvious question here then.......

    How long exactly has this "bug" been present?!

    1. Khaptain Silver badge

      You are not supposed to ask "that" question.....

      Mines the one with the red-faced penguin on the back.

      1. Destroy All Monsters Silver badge
        Black Helicopters

        After vigorous "research" I have been able to trace this bug back to Thompson & Richie Unix.

        WERE THEY SECRETLY WORKING FOR THE NSA ALL ALONG? WHAT DID RUBY ACTUALLY KNOW AND WHY IS OSWALD EVEN BEING MENTIONED IN THIS POST?

        Shocking deathbed testimony from a hacker dying of a mysterious cancer he obtained from a fishy sushi in an unnamed London restaurant rips the veil off the long-running UNIX conspiracy!!

        (After this message)

        1. TAJW

          Working for NSA? .... don't you realize NSA developed Linix in the first place and put all the backdoors in there from the beginning? Sheeple, sheeple I say!

          :)

  3. Criminny Rickets

    Bad user!!! BAD

    I tried this on my Linux Mint system earlier tonight. All I got for my troubles was a lot of loud beeps from my computer telling me how bad I was for trying this, before giving me the screen to enter my Cryptsetup password.

  4. seven of five

    Not the whole story:

    This is not a "find a linux box, press enter and access everything" kind of exploit.

    Said root shell is the emergency shell launched after 93 failed attempts to decrypt the filesystems and continue booting.

    It requires a linux system with encrypted boot filesystems you have terminal (not ssh) access to after a forced reboot of said system (powerfail, usually).

    As we specifically talk about systems which will never restart on their own due to the password neccessary finding one of your systems crashed for whatever reasons now requires extra-extra caution as you may well find a keylogger or trojan present.

    quick fix: adding panic=5 to your grub config.

    good fix: as per CVE-2016-4484 (effectively stop offering the rescue shell and enter a boot loop).

    hth

    1. DanDanDan

      Re: Not the whole story:

      Quite. This article is severely lacking in several key details.

      "With access to the shell, an attacker could then decrypt Linux machines". The implications are that this decryption would be easy. The reality is that you'd have access to a root shell, with an encrypted hard disk. How useful this is depends on the specific environment, but at least for me personally: as long as the "hackers" can't access any of my personal info on my hard drive, this is no worse than them bringing their own laptop and plugging it into the right sockets (with the MAC address of the network card spoofed). If the network is hardened correctly, then it's No Big Deal.

      Gaining access to an environment where you can't actually see or do anything is arguably not really useful at all.

      1. Random Q Hacker

        Re: Not the whole story:

        No big deal if I insert some firmware or modify the initramfs to contain a kernel module? Particularly if done to a vm or over remote console where I already have some connectivity?

    2. diodesign (Written by Reg staff) Silver badge

      Re: Not the whole story:

      Thanks for all the feedback - we've updated the article with more info and links to technical details of the bug and Red Hat's take on it for context.

      C.

  5. Anonymous Coward
    Anonymous Coward

    Oh I imagine the exponential increase in El Reg reader wailing and condemnations if this were a Microsoft product.

    PS Vote thumbs down if you have a pony tail!

    1. seven of five

      > Vote thumbs down if you have a pony tail!

      Well, it is not a "tail" as such. And I also have long hair...

      1. jason 7

        ...and a neck beard!

        1. Teiwaz

          Neck beard?

          This isn't the 80's anymore, get out from behind you LCD. Most 20-something young guys are all sporting a beard these days.

          Most neck beard wearers I see out and about are not also dressed in 'tech chiq' but something eastern...

    2. frank ly

      "Vote thumbs down if you have a pony tail!"

      You're getting them confused with Apple users. Linux users have bushy beards and baggy clothes. Microsoft users have no style at all.

    3. Alistair
      Coat

      I have a pony, but my name is not tail.

      1. I am the liquor

        When I was a little girl in Poland, we all had ponies.

        1. hplasm
          Happy

          When I was a little girl in Poland, we all had ponies.

          Did they have a Reverse gear?

          1. JimmyPage Silver badge
            Coat

            Re: Did they have a Reverse gear?

            That would be Italian stallions ?

          2. Speltier

            Re: When I was a little girl in Poland, we all had ponies.

            I'll make a notation to check if our pony has a reverse gear... avoiding core dumps whilst doing the checking naturally.

    4. Olius

      I've got the whole pony if you like.

    5. Sierpinski
      Trollface

      Windows Equivalent

      This appears to be very similar to the exploit where an unauthorized user can press the F8 key to gain access to the entire system.

      1. tfewster
        Facepalm

        Re: Windows Equivalent

        s/Windows/Just about any commercial enterprise-class OS too/

        AIX, Solaris, HP-UX - If you have physical access (or access via the management interface), you can compromise the system.

        Various attempts have been made to close or narrow this (tiny) loophole*, e.g.

        - HP-UX Secure Boot wouldn't let you interrupt the boot; Unless you disconnected the boot disk and reset that option in the "BIOS" equivalent.

        - Solaris wouldn't let you enter single-user mode without a password. Unless you booted from media.

        *My knowledge may be out of date - disk encryption offers some interesting possibilities - but I'd bet that every boot security measure put in place has a backdoor. Writing off a production system just because someone lost the root password isn't an option for most organisations.

    6. David 132 Silver badge

      I can talk about Linux till I'm a little hoarse, does that count?

    7. Destroy All Monsters Silver badge
      Windows

      PS Vote thumbs down if you have a pony tail!

      Dude! How are you bell bottom trousers? Got a boombox to go with it?

      The last ponytail I saw was attached to a very aged guy re-entering computer science at uni and desperately trying to navigate the Macintosh 1. That was in 1990.

      Obviously my category of "very aged" has changed since.

      1. W.S.Gosset
        Headmaster

        1990? In that case, it was Macintosh 6!

  6. Anonymous Coward
    Anonymous Coward

    Now what if you don't use initramfs…

    Sounds like this is a LUKS bug than a general Linux one. I don't use initramfs, so seems incredible that it'd launch one that doesn't exist.

    1. Destroy All Monsters Silver badge

      Re: Now what if you don't use initramfs…

      LUKS has nothing to do with it. It's only responsible for the layout/conventions of the crypto stuff on the drive.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like