2014-10-23 01:16 xiangfu has joined #qi-hardware 2014-10-23 01:22 xiangfu has quit [Remote host closed the connection] 2014-10-23 01:32 xiangfu has joined #qi-hardware 2014-10-23 02:11 atommann has joined #qi-hardware 2014-10-23 02:17 xiangfu has quit [Ping timeout: 245 seconds] 2014-10-23 02:19 xiangfu has joined #qi-hardware 2014-10-23 03:29 atommann has quit [Ping timeout: 245 seconds] 2014-10-23 03:37 atommann has joined #qi-hardware 2014-10-23 03:47 zear has quit [Ping timeout: 245 seconds] 2014-10-23 03:51 zear has joined #qi-hardware 2014-10-23 04:43 Luke-Jr has quit [Read error: Connection reset by peer] 2014-10-23 04:51 xiangfu has quit [Ping timeout: 244 seconds] 2014-10-23 04:56 Luke-Jr has joined #qi-hardware 2014-10-23 04:56 xiangfu has joined #qi-hardware 2014-10-23 05:08 [commit] Werner Almesberger: atusb/fw/usb/dfu.c (config_descriptor): correct alt settings off-by-one error (master) http://qi-hw.com/p/ben-wpan/b51d442 2014-10-23 05:33 xiangfu has quit [Ping timeout: 256 seconds] 2014-10-23 06:08 tumdedum has quit [Ping timeout: 260 seconds] 2014-10-23 06:09 roh_ has joined #qi-hardware 2014-10-23 06:09 tumdedum has joined #qi-hardware 2014-10-23 06:09 eintopf_ has joined #qi-hardware 2014-10-23 06:10 roh has quit [Ping timeout: 272 seconds] 2014-10-23 06:10 dandon has joined #qi-hardware 2014-10-23 06:10 eintopf has quit [Ping timeout: 260 seconds] 2014-10-23 06:10 mirko has quit [Ping timeout: 260 seconds] 2014-10-23 06:11 arhuaco_ has joined #qi-hardware 2014-10-23 06:11 dandon_ has quit [Ping timeout: 272 seconds] 2014-10-23 06:11 apelete has quit [Ping timeout: 272 seconds] 2014-10-23 06:11 mirko has joined #qi-hardware 2014-10-23 06:11 arhuaco has quit [Ping timeout: 272 seconds] 2014-10-23 06:25 xiangfu has joined #qi-hardware 2014-10-23 07:00 Ornoterm1s has joined #qi-hardware 2014-10-23 07:05 Ornotermes has quit [*.net *.split] 2014-10-23 07:15 apelete has joined #qi-hardware 2014-10-23 07:42 xiangfu has quit [Remote host closed the connection] 2014-10-23 07:44 roh_ is now known as roh 2014-10-23 07:46 arhuaco_ has quit [Ping timeout: 245 seconds] 2014-10-23 07:59 eintopf_ is now known as eintopf 2014-10-23 07:59 arhuaco_ has joined #qi-hardware 2014-10-23 08:39 ysionneau has quit [Quit: Reconnecting] 2014-10-23 08:39 ysionneau has joined #qi-hardware 2014-10-23 10:23 atommann has quit [Quit: Leaving] 2014-10-23 10:38 viric has quit [Ping timeout: 255 seconds] 2014-10-23 10:43 viric has joined #qi-hardware 2014-10-23 10:45 viric_ has joined #qi-hardware 2014-10-23 10:48 viric has quit [Ping timeout: 245 seconds] 2014-10-23 10:48 viric_ is now known as viric 2014-10-23 10:49 http://forkfedora.org/ is a clear evidence why systemd is crap and doesn't offer finegrained control to sysops 2014-10-23 10:49 (( see, just one line. clearly, my system is superior ;-))) exactly 2014-10-23 10:57 >>The support for ARMĀ® TrustZoneĀ®,<< WAAAAAAHHHH! http://inversepath.com/usbarmory 2014-10-23 10:58 I don't see a problem 2014-10-23 11:05 reflex on reading "TrustZone" 2014-10-23 11:06 TrustZone is siamese twin of trusted computing and aegis 2014-10-23 11:07 [2014-10-23 Thu 13:07:04] aegis 2014-10-23 11:07 [2014-10-23 Thu 13:07:05] http://www.developer.nokia.com/Community/Wiki/Harmattan:Developer_Library/Developing_for_Harmattan/Harmattan_security/Security_guide , or "The purpose of this framework is: ... to make sure that the platform meets the requirements set by third party software that requires a safe execution environment.", or http://en.wikipedia.org/wiki/Trusted_Computing#Criticism, or http://en.qi-hardware.com/w/ 2014-10-23 11:07 images/1/10/ME_382_LockedUpTechnology2.gif 2014-10-23 11:11 TZ is not helping user to install a secure system for themselves. TZ is designed to protect the system from user, so when user also is "owner" of of the trusted environment, the whole TZ is pointless and could get implemented in simpler more established and mature ways 2014-10-23 11:15 or, to re-qiote with emphasis added: >>...The purpose of this framework is: ... to make sure that the platform meets the requirements set BY THIRD PARTY SOFTWARE...<< 2014-10-23 11:16 Textmode has quit [Quit: "It was one dev, naked in a room with a carton of cigarettes, a thermos full of coffee and bourbon, and all his summoned angels."] 2014-10-23 11:16 IOW make sure that the 3rd party software doesn't face a system that got "tampered" by user 2014-10-23 11:20 to put it straight: your 3rd party MP3-player is running in secure environment so the content provider can be sure you have no means to redirect the decoded audio stream to any other destination than the DAC and 3.5mm headset output 2014-10-23 11:21 since *all* processes running on your system got approved and signed by 3rd party. So you got no tool to do such redirect of audio data. When you're the owner of the "3rd party" signature key then what's the purpose of whole trustzone? 2014-10-23 11:23 you cannot protect the system from yourself 2014-10-23 11:27 https://lkml.org/lkml/2014/10/23/129 ;) 2014-10-23 11:30 wtf is this? 2014-10-23 11:32 DocScrutinizer05: bullshit 2014-10-23 11:32 TZ is a tool. if the user has a key, it works in favor of user. 2014-10-23 11:32 it is no different than having root on device. 2014-10-23 11:32 patch to augment kernel driver with a self destruction function for counterfeit FTDI chips? 2014-10-23 11:33 whitequark: EXACTLY 2014-10-23 11:33 thus it's completely useless cruft 2014-10-23 11:33 DocScrutinizer05: nope 2014-10-23 11:34 it has the same function as separating root and nonroot 2014-10-23 11:34 yes, exactly. And since we already have such separation in all decent OS, why do we need TZ? 2014-10-23 11:34 because if you have regular user on linux, getting root is *trivial* 2014-10-23 11:34 aha 2014-10-23 11:34 local privilege escalation bugs on linux count in hundreds 2014-10-23 11:35 bugs in TZ count in the zillions 2014-10-23 11:35 link? 2014-10-23 11:35 I don't disagree, just haven't seen them so far 2014-10-23 11:35 google for Nokia harmattan aegis 2014-10-23 11:36 TZ by no means is any intrinsically more safe than calssical root/user separation and privilege management. Just way more complex, and with added benefit that you could deprive user from becoming root *ever* on own device 2014-10-23 11:37 you already have that issue 2014-10-23 11:37 I mean, on modern smartphones *without* TZ you can commonly only become root via bugs 2014-10-23 11:38 and you know what? if a "jailbreak" app can become root, it means that any malware whatsoever can become root too 2014-10-23 11:38 they have other implementations of same concept 2014-10-23 11:38 this is why iPhone security works, and Android is a shithole 2014-10-23 11:38 one of reasons, at least 2014-10-23 11:39 DocScrutinizer05: no, I mean, even if you only implement this in software, you have the same situation 2014-10-23 11:39 toldya 2014-10-23 11:39 TZ is cruft 2014-10-23 11:39 still not convinced 2014-10-23 11:39 TZ is basically cut down virtualization 2014-10-23 11:40 whatever runs in TZ is a "hypervisor", the rest is a "guest" 2014-10-23 11:40 yes 2014-10-23 11:40 virtualization-based sandboxes have a much better track record than OS-based 2014-10-23 11:40 Xen has had around fifty advisories through its entire life, only maybe five of them can give you root 2014-10-23 11:40 and unlike usual virtualization you can run TZ without ever sharing the secret key needed to sign stuff 2014-10-23 11:41 this is not a problem of TZ. this is a problem of shitty vendors. 2014-10-23 11:41 and that'S the ONLY difference between TZ and a usual system 2014-10-23 11:42 between TZ and system with virtualization? yes 2014-10-23 11:42 between TZ and system without virtualization? no 2014-10-23 11:42 as soon as you hand out the TZ root secret key, there's no difference to any other supervisor slution of which there are 5 dozen out there 2014-10-23 11:43 that I agree 2014-10-23 11:43 just that TZ is incredibly complex and cumbversome to maintain 2014-10-23 11:44 hm, I've talked with someone developing for TZ and they were ok with it 2014-10-23 11:44 but I don't know for sure 2014-10-23 11:46 sure, it's ok for you when you're the "3rd party" that actually owns the key, or you are simply not bothering about who's administrating the target platform and you just get your app you developed to owner of TZ root key for signing it 2014-10-23 11:47 the point is that *all* your system, from bootloader to last cheesy app, needs to get signed by TZ root key 2014-10-23 11:47 and you need a list of privileges allowed for every app, that gets part of such signature 2014-10-23 11:48 huh? I don't think so, you don't need to sign untrusted code 2014-10-23 11:48 it's basically the point 2014-10-23 11:48 this is how nokia decides what you may or may not run on your N9 2014-10-23 11:48 sure, you could use TZ in such fashion if you really want, but nothing in TZ inherently requires it 2014-10-23 11:48 but that's the *only* purpose of TZ 2014-10-23 11:50 every app developer needs his app to get signed at Nokia, or it won't run on any N9 2014-10-23 11:52 if you hand the key out to everybody, you could as well stop using TZ at all, to start with 2014-10-23 11:53 handing an individual key to every single N9 owner would not differ from simply giving them the root password and not using TZ at all 2014-10-23 11:53 having one common publicly known key is absolute nonsense 2014-10-23 11:55 whole trustzone is only for *one* purpose: to allow vendor to have total control over the devices they sell 2014-10-23 11:55 it really has no other purpose or benefit 2014-10-23 11:58 jluis has quit [Remote host closed the connection] 2014-10-23 11:58 as far as I see TZ is merely a hardware-assisted virtualization feature 2014-10-23 12:27 larsc: it is not targeted against ze user. all i do is make sure ze rockets go up. where ze come down is not my problem ;-) 2014-10-23 12:44 13:38 < whitequark> this is why iPhone security works, and Android is a shithole < why is iPhone any better? 2014-10-23 12:45 ysionneau: it's generally pretty hard to jailbreak an iPhone 2014-10-23 12:45 (it doesn't matter to this discussion whether this is achieved via good coding practices, virtualization, TZ, whatever.) 2014-10-23 12:45 isn't it the same principle? you get root through security bug 2014-10-23 12:45 if you can't do it, then malware can't do it as well 2014-10-23 12:45 sure. but jailbreaking android devices is trivial 2014-10-23 12:46 I honestly don't know iPhone world 2014-10-23 12:46 this means you can't rely on its sandboxing at all. 2014-10-23 12:46 haven't all iPhones been rooted? 2014-10-23 12:46 most jailbreaks require explicit physical user action, like tethering it to a PC and uploading something 2014-10-23 12:46 maybe with a few months lag at each new iOS release 2014-10-23 12:46 oh ok 2014-10-23 12:46 I didn't know that 2014-10-23 12:46 since I think iOS 4 or something? 2014-10-23 12:46 so no kernel exploit or something 2014-10-23 12:47 well, not exploitable from app 2014-10-23 12:47 actually, not quite, you usually need multiple exploits 2014-10-23 12:47 but the days of jailbreaks from inside the device are gone 2014-10-23 12:47 and this is good 2014-10-23 12:47 indeed Android has and had tons of vuln accessible from low privilege app 2014-10-23 12:47 how do they achieve that? 2014-10-23 12:47 very low system call attack surface, 2014-10-23 12:47 ? 2014-10-23 12:48 well, for example, you can't mark data pages as executable 2014-10-23 12:48 so no JITs, but also less exploits 2014-10-23 12:48 then they have ASLR 2014-10-23 12:48 kernel ASLR, too 2014-10-23 12:49 modern Android have ASLR pretty much everywhere I think 2014-10-23 12:49 yes, and then 80% of vendors put some shitty library with ASLR disabled 2014-10-23 12:49 also likely vulnerable 2014-10-23 12:49 which defeats the purpose. 2014-10-23 12:49 :p 2014-10-23 12:50 also not sure about kernel ASLR 2014-10-23 12:50 not sure about that either 2014-10-23 12:59 larsc: seems that FTDI also go one step further and actively sabotage such chips: (in german) http://www.heise.de/newsticker/meldung/FTDI-Proaktive-Fake-Chip-Abwehr-2430780.html 2014-10-23 13:02 well, maybe that will make people realize they don't need FTDI chips. they've been a bad choice for a long while already and it seems it just got a little worse 2014-10-23 13:03 overpriced 2014-10-23 13:05 and very badly documented 2014-10-23 13:06 i once tried to use one of their chip to make an in-circuit programmer. failed miserably because i couldn't toggle pins reliably. never found out whether it was just a documentation issue or a silicon limitation. lesson learned: use an USB MCU and accept that you need something already existing to bootstrap it. 2014-10-23 13:07 so with ftid you're basically screwed if you leave the well-traveled path. and they also did a number of stunts like undocumented EEPROM content that took forever to reverse-engineer. 2014-10-23 13:08 wpwrak: that kernel patch was a reply to the FTDI diver changes 2014-10-23 13:08 so it's quite ironic that their chips are so popular in the free and open hardware development scene. these are not our friends. 2014-10-23 13:11 larsc: ah, so it was meant to be a joke. and indeed, it does seem to actively alter the Vendor ID. 2014-10-23 13:13 now this is nice ;-) http://marc.info/?l=linux-usb&m=141403510729881&w=2 2014-10-23 13:15 yea, although it took me a while to realize that it was a joke 2014-10-23 13:15 valhalla has quit [Ping timeout: 240 seconds] 2014-10-23 13:16 yeah, the description doesn't make it clear that it actively breaks things 2014-10-23 13:16 valhalla has joined #qi-hardware 2014-10-23 13:17 greg got it, though. the checks and balances are working ;-) 2014-10-23 13:24 yea, he's a bit smarter than me 2014-10-23 13:29 or he had some early warning :) 2014-10-23 13:29 huh? 2014-10-23 13:30 please update me what i missed 2014-10-23 13:30 looked to me like I said: patch to augment kernel driver with a self destruction function for counterfeit FTDI chips 2014-10-23 13:30 it was a parody 2014-10-23 13:31 the patch author works for TI, not FTDI 2014-10-23 13:31 well, that's the question 2014-10-23 13:31 helping the competition to sink their own product. nice ;-) 2014-10-23 13:32 it's a parody when the author could be sure it won't get committed to linux kernel. Otherwise it's hilarious but not a joke 2014-10-23 13:32 if it would be committed to linux kernel, the linux kernel maintainers would be idiots 2014-10-23 13:32 of course unless the code kills original FTDI chips and not the counterfeit ones 2014-10-23 13:32 and anyone could commit more malicious stuff in the blink of an eye 2014-10-23 13:33 like "goto fail" 2014-10-23 13:38 LOL http://marc.info/?l=linux-usb&m=141405129201389&w=2 2014-10-23 13:38 who says that this isn't possible already ;) 2014-10-23 13:41 ((linux kernel maintainers would be idiots)) well, I wouldn't bet on NONE of them actually is ;-) 2014-10-23 13:42 then it is an excellent litmus check 2014-10-23 13:42 if a maintainer commits a patch like that, they stop being a maintainer 2014-10-23 13:42 hehe indeed 2014-10-23 13:43 actually GKH got a point in "better had saved that for April 1." anyway 2014-10-23 13:43 mjg actually did that recently (Accept a stupid patch, than quit being a maintainer) 2014-10-23 13:44 on IRC you could earn permaban for stuff like that (rm ;- r f ) 2014-10-23 13:44 larsc: mjg? 2014-10-23 13:44 I mean, what patch? 2014-10-23 13:44 I know who mjg is 2014-10-23 13:44 me not 2014-10-23 13:45 https://en.wikipedia.org/wiki/Matthew_Garrett 2014-10-23 13:49 viric has quit [Ping timeout: 246 seconds] 2014-10-23 13:50 whitequark: https://lkml.org/lkml/2014/8/20/574 2014-10-23 13:51 ah 2014-10-23 13:54 viric has joined #qi-hardware 2014-10-23 13:55 hmm, what was the problem ? the (ret) -> (ret != 0) ? 2014-10-23 13:55 referring to this: https://lkml.org/lkml/2014/6/13/570 2014-10-23 13:55 commit name indicates it wasn't ready for mainline 2014-10-23 13:57 google Nick Krause 2014-10-23 13:57 Nick Krause is an American film and television actor 2014-10-23 13:57 google Nick Krause Linux 2014-10-23 14:01 lovely 2014-10-23 14:02 so mjg is handing him a success ? miss a patch and the maintainer self-destructs ? 2014-10-23 15:16 qwebirc85257 has joined #qi-hardware 2014-10-23 15:17 qwebirc85257 is now known as rjeffries 2014-10-23 15:18 wpwrak may or may not appreciate this gadget: https://www.cnx-software.com/2014/10/22/usb-armory-is-an-open-source-hardware-freescale-i-mx53-dongle-for-security-applications/ 2014-10-23 15:22 DocScrutinizer05 for sure does not appreciate it ;) 2014-10-23 15:27 rjeffries: yes, i've seen it. looks like a nice platform for certain functionality. e.g., crypto containers and such. 2014-10-23 16:08 sb0 has quit [Ping timeout: 245 seconds] 2014-10-23 16:09 sb0 has joined #qi-hardware 2014-10-23 16:13 rjeffries has quit [Ping timeout: 246 seconds] 2014-10-23 16:35 eintopf has quit [Quit: leaving] 2014-10-23 16:36 eintopf has joined #qi-hardware 2014-10-23 17:11 arhuaco_ has quit [Ping timeout: 265 seconds] 2014-10-23 17:24 arhuaco_ has joined #qi-hardware 2014-10-23 17:39 lilvinz has joined #qi-hardware 2014-10-23 17:52 lilvinz has left #qi-hardware ["Leaving"] 2014-10-23 19:43 http://www.itworld.com/article/2837889/german-publishers-capitulate-and-let-google-post-news-snippets-for-now.html 2014-10-23 19:43 qwebirc48478 has joined #qi-hardware 2014-10-23 19:44 qwebirc48478 is now known as rjeffries 2014-10-23 19:49 wpwrak I did not take time to look at price of that dongle, but assume it is low cost. I am a poor judge of open-ness but it seems they are trying to have an open hardware platform. 2014-10-23 20:02 a mumble about security and the password morass: anelok seems to be promising as best I can tell. I wonder if the following use case is supported: using anelok strictly as a secure password vault. That's how I use the (open) Android program Universal Password Manager (UPM). Yes, I then type in a password manually, and yes that fact influences my password construction a bit. 2014-10-23 20:04 So the question I have is if a user wants a small relatively secure password vault and accepts they will look up passwords and type them in, how well will anelok support that workflow? It assumes a simple easy fast seach to find teh desired entry. 2014-10-23 20:04 thx 2014-10-23 20:07 tumdedum has quit [Ping timeout: 250 seconds] 2014-10-23 20:08 tumdedum has joined #qi-hardware 2014-10-23 20:13 larsc: nobody needs to use TZ cruft. And actually TZ comes with a side effect of usually no access to the secured conzent via booting a rescueOS or by flashing a new kernel. Usually those HS devices (TZ-enabled) only allow flashing new stuff after _complete_ erasute, which is absolutely fine for stuff like crypto containers 2014-10-23 20:14 erasure* 2014-10-23 20:14 not like a 89c1051 couldn't do same ;-) 2014-10-23 20:16 freespace has quit [Ping timeout: 258 seconds] 2014-10-23 20:19 freespace has joined #qi-hardware 2014-10-23 20:29 * DocScrutinizer05 idly wonders who's "inverse path" and what they actually do 2014-10-23 20:51 freespace has quit [Ping timeout: 265 seconds] 2014-10-23 20:52 freespace has joined #qi-hardware 2014-10-23 21:02 jow_laptop has quit [Ping timeout: 258 seconds] 2014-10-23 21:17 jow_laptop has joined #qi-hardware 2014-10-23 21:39 rjeffries has quit [Ping timeout: 246 seconds] 2014-10-23 22:10 wpwrak: you must be happy now http://dangerousprototypes.com/?p=83950 2014-10-23 22:24 viric has quit [Ping timeout: 265 seconds] 2014-10-23 22:29 viric has joined #qi-hardware 2014-10-23 23:01 nicksydney: cern are doing good work. what i don't like so much is that kicad is breaking the old "user experience". also, the newer versions are much slower than the older ones 2014-10-23 23:02 wpwrak: is it because they are relying too much on GPU processing ? 2014-10-23 23:02 to make the rendering faster ? 2014-10-23 23:03 GPU is certainly the way to go 2014-10-23 23:03 yes, and the GPU-based part doesn't seem to be very usable for manual routing. so for that one has to use the old interface, which is now very slow 2014-10-23 23:07 whitequark: dunno. it's not as if the drawing operations would be complex. and doing the same work used to be much faster in the past. on the same hardware. 2014-10-23 23:07 i think it's mainly C++ bloat 2014-10-23 23:11 wpwrak: sure it's not your graphic drivers? 2014-10-23 23:11 (integrated intel should be perfect for this kind of stuff, not sure what you use though) 2014-10-23 23:12 my pc from an earlier generation. has radeon and nvidia. 2014-10-23 23:12 ah, so nv. 2014-10-23 23:23 wpwrak: that's the same issue i had previously when using the master branch 2014-10-23 23:24 i'm using AMD