[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

LINUS TORVALDS FUCKED UP

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 60
Thread images: 14

File: linus_torvalds.jpg (56KB, 1200x794px) Image search: [Google]
linus_torvalds.jpg
56KB, 1200x794px
Linux vulnerability leaves top sites wide open to attackers

https://www.rt.com/usa/355558-linux-vulnerability-websites-attacks/

A flaw in the Linux operating system lets hackers inject malware into downloads and expose the identities of people using anonymizing software such as Tor – even for those who aren’t using Linux directly.

In a Wednesday presentation at the USENIX Security Symposium in Austin, Texas, researchers with the University of

The networking blunder is present in the Linux kernel, the core of its operating system, and can be exploited by malicious actors to determine whether two systems are communicating with each other, and even inject malicious data into or break their connection.

“Through extensive experimentation, we demonstrate that the attack is extremely effective and reliable. Given any two arbitrary hosts, it takes only 10 seconds to successfully infer whether they are communicating,” the team wrote in a white paper. “If there is a connection, subsequently, it takes also only tens of seconds to infer the TCP sequence numbers used on the connection. To demonstrate the impact, we perform case studies on a wide range of applications.”
>>
>>56028869
thank god I use Satya Nadella™ © 's Microsoft™ © Windows™©® 10™ Pro!
>>
>>56028893
>le lesser of two evils meme
>>
>>56028869
Trolling is a art
>>
File: sl.jpg (80KB, 1200x794px) Image search: [Google]
sl.jpg
80KB, 1200x794px
shit! I hope they'll have a patch out soon
>>
>>56028933
Like three weeks ago actually.
>>
File: 1470897181311.png (119KB, 250x280px) Image search: [Google]
1470897181311.png
119KB, 250x280px
this can't be happening
>>
>>56028869
>in the Linux operating system
>in the Linux operating system
>in the Linux operating system
>in the Linux operating system
>in the Linux operating system
>>
>>56028915
>a art

It's an art, not 'a art.'
>>
File: ethth.jpg (89KB, 2148x650px) Image search: [Google]
ethth.jpg
89KB, 2148x650px
>>56028942
sweet!
>>
>>56028869
>doesn't mention what the attack is
boring
>>
>>56028983
>he doesn't know how to read
>>
File: you must be HD here.jpg (134KB, 1920x1080px) Image search: [Google]
you must be HD here.jpg
134KB, 1920x1080px
>>56028975
Is this b8?
>>
>>56028983
>>56028999
https://www.youtube.com/watch?v=S4Ns5wla9DY
>>
>>56029018
Sorry, wrong link
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf
>>
>>56029018
oh shit
>>
I digged into it, and it seems like this is a legitimate bug with the TCP protocol itself. Since Linux is the only OS in existence that implements this part of the RFC correctly, it's the only one that's affected.

(All other operating systems “get it wrong”, and therefore aren't affected because the exploit relies on specifics of the TCP challenge ACK feature)
>>
File: 1463340278259.gif (1MB, 330x312px) Image search: [Google]
1463340278259.gif
1MB, 330x312px
>>56028893
Only one side of the connection needs to be running a vulnerable kernel, and your connected to a linux server.....
>>
>>56029154
Correct: this is actually a bug in the RFC.

We're probably going to have to do an errata.
>>
>>56028869
The University of the Networking Blunder.
>breaks into UNB fight song.
>>
This attack right here is a perfect example of why you need authenticated encryption.

HTTPS defeats it
>>
>>56029259
It defeats code injection, but I believe this attack will still work for denial of service, even with HTTPS.
>>
And so it will be patched. Guess what, there isn't a legion of people exposing windows loopholes to the public, they just keep the exploits to themselves for profit.
>>
>>56029018
needs a WASTED-treatment.
>>
File: 1457376761060.gif (61KB, 600x450px) Image search: [Google]
1457376761060.gif
61KB, 600x450px
>>56028869
I told you my Windooze is superior.
You didn't listen /g/
>>
>>56028869
from http://forums.theregister.co.uk/forum/containing/2941930
>In effect, this isn't a new attack, it's just a way of disabling the mitigation for a very old attack - which as far as I can tell is a CVE from 2004. While I can see that a determined and well informed attacker could use the old attack against some types of traffic, in the general case I can't see it being that much use. You need to know that two IP addresses are communicating, and what ports they are using, and the sequence numbers they are using - AND exactly when they are doing it. Armed with all that knowledge, you can then inject packets - but if the traffic being passed is in any way checked (either explicitly or as a side effect of encryption such as SSL) then there's not much you can do other than terminate the connection.
>So I think you can forget about attacks such as "changing the contents of an email or web page" simply because the requirements in terms of knowing exactly who is talking to who, using what ports, and when, are such as to make it impractical without the sort of access to information that would in reality make other ways of doing the same thing far more useful !
>SSH sessions ? Tend to be quite long lived - but all you could do is terminate the session.
>Torrent downloads ? Don't the clients checksum all the pieces anyway ?
tl;dr practically irrelevant
>>
>>56029183
>Correct: this is actually a bug in the RFC.

I swear the IETF is so fucking incompetent at protocol design.
It's an embarrassment that every single thing they come out with has fundamental design flaws in security and/or performance.

> IPv6 routing extension header, I'm looking right at you
>>
Can someone please explain like I'm 5, how upping the ack_challenge_limit from 100 to 99999 mititgate the attack? It sounds cpounterintuitive.
>>
>>56029911
The global ACK rate limiting is what leaks information about your connections.

Remove the rate limit and you can no longer leak information.
>>
File: somebodyMadeThis.png (463KB, 1200x975px) Image search: [Google]
somebodyMadeThis.png
463KB, 1200x975px
>not having https everywhere enabled
You pathetic cucks deserve it tbqh.
>>
>>56028869
I'd just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU/Linux, or as I’ve recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.
Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux”, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use.
Linux is the kernel: the program in the system that allocates the machine’s resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.
>>
>>56029183
> an errata
> an
> errata
> an
>
> singular
>
>
> errata
>
>
>
>
> plural

jesus fucking shitnigger do you even latin
>>
downloading windows as we speak
>>
File: terry.jpg (2MB, 1971x1971px) Image search: [Google]
terry.jpg
2MB, 1971x1971px
CIA NIGGERS ON SUICIDE WATCH
>>
>>56029911
it's an information leak based off a 3rd party attempting to trip limits with forged packet injection.

if it's a non-encrypted (SSL/TLS/etc) connection, it ultimately allows a man-in-the-middle from basically anywhere without needing to suborn routers in the path.
>>
>>56030052
you're right Terry, CIA niggers should've stuck to sabotaging implementations and not protocol designs.
>>
>>56030052
Terry is right though. We wouldn't have to worry about updating our computers if we stop connecting them to the internet.
>>
>>56029945
A million internets to you based anon.
>>
>>56030052
>terry.jpg
What did he mean by this?
>>
In case anyone else is still lurking, those kernels that don't have the sysctl.conf option for ipv4.tcp_challenge_limit, are they vulnerable?
>>
>>56028975
woosh
>>
>>56030906
No. It's only linux 3.6 and newer, which implements this feature.
>>
>>56031317
OK thx.
>>
File: 1461459147091.png (341KB, 784x549px) Image search: [Google]
1461459147091.png
341KB, 784x549px
>>56028869
At least linux does not handle scrollbars in the kernel :^)
>>
>>56028869
This is a bug caused by the standard itself, not the implementation of it.
>>
>>56028869
>>RT

fuck off
>>
does linus even write linux code anymore?
>>
>>56031506
What's so bad about that? UI elements should be part of the operating system API, otherwise you're going to needlessly duplicate those features in every executable that uses them.
>>
>>56031809
http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/
>>
File: linus.jpg (126KB, 1200x794px) Image search: [Google]
linus.jpg
126KB, 1200x794px
I made a art
>>
This isn't a Linux problem; it's a problem with a defined standard. Linux just implements this standard (no other operating systems do as of now).
>>
>>56029001

it is now
>>
>>56031809
UI APIs can be kept in a DLL rather than embedded in kernel, no?
>>
File: M808.06.0404.jpg (79KB, 926x960px) Image search: [Google]
M808.06.0404.jpg
79KB, 926x960px
>>56032029
>>
>>56032074
isn't this literally the function of win32.dll? to contain UI code in shared memory?
>>
>>56032092
>win32.dll
user32.dll i mean
>>
File: vincent.jpg (9KB, 200x200px) Image search: [Google]
vincent.jpg
9KB, 200x200px
>>56031906
*tips fedora*
Good work! Would you like to get a alcohol?
>>
>>56031809
>What's a library? The post.
>>
File: enough.png (134KB, 456x320px) Image search: [Google]
enough.png
134KB, 456x320px
>>56031906
>>
>>56028869
ITS SAFE GUYS NSA CAN POSSIBLY TRACK WELL CONFIGURED GANOOOOOO
Thread posts: 60
Thread images: 14


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.