Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Passwords in Mac OS X Can Be Pilfered With New Tool(Whoopsies!)
PCWorld ^ | Jul 27, 2011 8:40 am | By Jeremy Kirk, IDG News

Posted on 07/27/2011 10:03:15 AM PDT by ImJustAnotherOkie

A company that makes password recovery tools has released one that can snatch passwords from a locked or sleeping Macintosh running Mac OS X Lion by plugging another computer into the Mac's FireWire port. The attack technique is several years old and the only way to defend against it is to turn the Mac off.

(Excerpt) Read more at pcworld.com ...


TOPICS: Chit/Chat
KEYWORDS: apple; macosx; scaremongering; security
Navigation: use the links below to view more comments.
first 1-2021-4041-56 next last
Mac security is a now officially a joke.
1 posted on 07/27/2011 10:03:17 AM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | View Replies]

To: ImJustAnotherOkie

that doesnt sound like much of a risk. plugging another computer into my computer. i mean, really, i would see that.


2 posted on 07/27/2011 10:08:40 AM PDT by beebuster2000
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

Let me know how you could plug something into my FireWire port over the interwebs and I’ll start worrying.


3 posted on 07/27/2011 10:08:52 AM PDT by null and void (Day 917. When your only tools are a Hammer & Sickle, everything looks like a Capitalist...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

PC users have always been a joke as far as security goes.......


4 posted on 07/27/2011 10:10:57 AM PDT by basil (It's time to rid the country of "gun free zones" aka "Killing Fields")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

If you’ve lost physical control of the machine, it’s already game over. The method of attack is largely irrelevant.

That said, this sounds like something that should be patched — no need to make it any easier than it has to be. Still, anyone with access to the machine and a boot disk will be able to do just about anything they want to.


5 posted on 07/27/2011 10:11:16 AM PDT by kevkrom (This space for rent.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

one word: rachel madow. now you can worry.


6 posted on 07/27/2011 10:11:45 AM PDT by beebuster2000
[ Post Reply | Private Reply | To 3 | View Replies]

To: ImJustAnotherOkie

>>>>Mac security is a now officially a joke.

Parity with Windows....


7 posted on 07/27/2011 10:12:52 AM PDT by Keith in Iowa (Hope & Change - I'm out of hope, and change is all I have left every week | FR Class of 1998 |)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

8 posted on 07/27/2011 10:15:31 AM PDT by SengirV
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie
Mac security is a now officially a joke.

FUD !

9 posted on 07/27/2011 10:18:25 AM PDT by Uri’el-2012 (Psalm 119:174 I long for Your salvation, YHvH, Your law is my delight.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie
The only way to protect against that sort of attack is full-disk encryption combined with a fail-safe way to clear RAM if the case is breached. Otherwise, if they steal your machine, they can browse its disk at their leisure. No need to recover or guess your password.

And why don't they just disable the Firewire port if the user is not logged in or if a password-protected screen saver is running?

10 posted on 07/27/2011 10:26:15 AM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

Can’t wait to SHARE this with the arrogant Mac fanatics in my office.


11 posted on 07/27/2011 10:32:37 AM PDT by samtheman
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie
Mac security is a now officially a joke.

Well, you've got me laughing. I'll give you that much. :D

12 posted on 07/27/2011 10:38:01 AM PDT by papertyger
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

FireWire is a memory-to-memory or DMA bus. That is, a connected device can access the memory from any computers to which it is connected.

This is fundamental to how FireWire (IEEE1394) works, so it is requires some kind of restriction on the areas of memory that it is allowed to access (different from that of the CPU itself). It also means that if you plug a FireWire card into a Windows computer, it is just as vulnerable.

In fact, it shares this vulnerability with the laptop card interfaces ExpressCard and PCCard, commonly used on Windows laptops.

If it were the same as the CPU, controlling access would be easy, the Memory Management Unit (MMU) which is part of the CPU could handle it.

Since it is not, either the MMU has to be augmented to have a set of tables to determine what external devices are allowed to have access to particular memory (just like it does for different users) or a separate MMU for IO devices needs to be added to the system.

Either approach is expensive (and not really subject to a quick software fix). If it were only FireWire, which is still restricted largely to Apple devices, neither approach would be feasible.

Fortunately, Intel’s new pretty, LightPeak (ThunderBolt in Apple parlance), has the same interface-advantage/security-issue since it is also a external memory-to-memory or DMA bus.

Since Intel is also making the CPUs and their MMUs, and the board interface chips with ThunderBolt, you won’t be surprised to learn that the most recent Nehalem CPUs (Core i5 and i7) are the first recent consumer CPUs to contain an IOMMU as described above (with memory control for IO devices including FireWire and ThunderBolt).

Thus, for computers with FireWire and those CPUs or later ones, there is now a workable fix for the problem.

When that fix will see the light of day is another matter, but with ThunderBolt allowing the transfer of all the memory in a 16GB machine in less that 20 seconds (more than 10 times faster than FireWire 800), I think we will see it sooner rather than later.


13 posted on 07/27/2011 10:48:59 AM PDT by Wonka
[ Post Reply | Private Reply | To 1 | View Replies]

To: ImJustAnotherOkie

“Another precautionary measure is to try and ensure no one gets access to your computer.”

OMG!!!! OMG!!! OMG!!! I simply MUST burn this thing and get me one of those secure and dependable PC’s. I must not wait! I must get me a PC before the sky falls any farther or I will surely die! OMG!! Will they rape me too?!

If someone can get past my firewall, my fence, my guard geese, my ducks, chickens, my German Shepherd dog that believes everything on the property is his and that I am actually God, my house alarm, and my 30 years of defense - personal protection training and experience, HECK, they can have anything around here that they may desire.

Thank you so much. I remember those sweet old days when I had a PC. When it was down and down and down again, the dead time gave me a much needed and stress free rest.

As we all know, stress kills, so having a PC can actually help you live longer . Wow, those PC folks sure go out of their way to help us out.


14 posted on 07/27/2011 10:58:36 AM PDT by Gator113 (Palin 2012, period.....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wonka

Fortunately the Mac pro boots up quickly.

What bothers me most is encrypting the hard drive won’t help either(obviously).

Since the technology you mentioned isn’t in place it’s not limited to Lion.

Probably Bush’s fault.


15 posted on 07/27/2011 11:03:09 AM PDT by ImJustAnotherOkie (zerogottago)
[ Post Reply | Private Reply | To 13 | View Replies]

To: ImJustAnotherOkie

Gee if somebody gets a hold of your computer, they could break into it...shocking!!! /s


16 posted on 07/27/2011 11:05:31 AM PDT by dfwgator
[ Post Reply | Private Reply | To 1 | View Replies]

To: samtheman

“Can’t wait to SHARE this with the arrogant Mac fanatics in my office.”

Will you also SHARE this with the “arrogant” PC fanatics in your office..... or are you the only “arrogant” PC user in your office?


17 posted on 07/27/2011 11:10:48 AM PDT by Gator113 (Palin 2012, period.....)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dfwgator
Gee if somebody gets a hold of your computer, they could break into it...shocking!!! /s

Next thing you know, they'll be telling you that letting people know your password will allow them to bypass system security, too!

18 posted on 07/27/2011 11:13:21 AM PDT by kevkrom (This space for rent.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: kevkrom

OMG... I can’t believe they didn’t put that warning on the box!!


19 posted on 07/27/2011 11:15:07 AM PDT by Gator113 (Palin 2012, period.....)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Gator113

found some interesting followup.

Mitigation: Mac OS X

On Mac OS you might also be able to completely remove Firewire support from the kernel (but I don’t know if/how that can be done, not sure if you can easily recompile Mac OS kernels, and/or if you even have buildable source code and toolchains for that). However, you can at least remove the Firewire support in the default Mac OS installation by unloading AppleFWOHCI.kext:

$ sudo kextunload /System/Library/Extensions/IOFireWireFamily.kext/Contents/PlugIns/AppleFWOHCI.kext

Thanks to a Daniel Reutter for letting me abuse his MacBook via Firewire and for finding the above kextunload command line. We have successfully tested that after unloading AppleFWOHCI.kext the current tools won’t work anymore.

The tests were done on a Mac OS X 10.5 (Leopard) with all recent security updates applied. Please leave a comment if you can test other versions of Mac OS X...

Mitigation: Windows

As for Windows, well, I guess you’re screwed. While Windows XP does implement sort of “protection” in that it only allows physical DMA access via Firewire to devices which “deserve it”, e.g. iPods (or any other Firewire mass storage device, I guess) this can be easily defeated by having your attack PC/laptop pretend to be an iPod (see the romtool Python script by Adam Boileau).

The only remaining option I know of (short of removing/destroying Firewire ports or preventing physical access alltogether) is to disable the Firewire ports/drivers in the device manager (untested by me so far). If you do that, remember to also disable all PCMCIA/Cardbus/ExpressCard controllers, of course (see above).

So far I’ve tested Windows XP SP2 successfully with Adam Boileau’s winlockpwn. Windows XP SP3 doesn’t seem to work, though (winlockpwn likely needs tweaking). I haven’t yet been able to test Windows 95/98/Vista, if you can verify one of them, please leave a comment.


20 posted on 07/27/2011 11:16:26 AM PDT by ImJustAnotherOkie (zerogottago)
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-56 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson