211
submitted 1 month ago by misk@sopuli.xyz to c/technology@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] HC4L@lemmy.world 9 points 1 month ago

Depends. If you need updates on the software used in the air gapped network you won't have lot of options. Burning cd's doesn't sound so crazy all of a sudden though...

[-] KamikazeRusher@lemm.ee 14 points 1 month ago

Having worked in classified areas, both as an admin and an unprivileged user, CDs were normally the method of transferring data up the network. (Transferring down rarely occurred, and even then you’d be limited to plaintext files or printouts.)

I’ve seen more places use data diodes to perform one- or two-way transfers so that requests can be streamlined and there’s no loose media to worry about tracking. It’s not super fast and higher speeds mean more expensive equipment, but it covers 98% of software update needs, and most non-admin file transfers were under 20MB anyways.

Anything that did require a USB drive, like special test equipment (STE) or BIOS updates, had to use a FIPS-140-1 approved drive that offered a ready-only mode via PIN. This drive could only be written to from a specific workstation that was isolated from the rest of the machines (where data was transferred via CDs of course) and required two persons to perform the job to ensure accountability.

Not the most time-efficient way of doing things, and not completely bulletproof, but it works well enough to keep things moving forward.

[-] stealth_cookies@lemmy.ca 3 points 1 month ago

You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.

[-] BearOfaTime@lemm.ee 1 points 1 month ago

Wouldn't you validate that update on a test machine in an isolated environment....like we've done since forever?

[-] HC4L@lemmy.world 2 points 1 month ago

That still won't say anything about the reliability of the medium. The update itself isn't the problem.

[-] quixotic120@lemmy.world 1 points 1 month ago

I mean therein lies the problem. If you remove mass storage devices but allow cds then that’s just a different attack vector to exploit. You could potentially make it so there is no way to interface with any kind of storage but then when someone finds a way to break things open with a hid device you now have no practical way to fix the issue (plus working with the machine will be a nightmare)

[-] chaospatterns@lemmy.world 3 points 1 month ago* (last edited 1 month ago)

CDs have an advantage over USB drives in that they can't actually secretly be USB HID devices like a fake keyboard or mouse that runs a bunch of commands when it plugs in. It's only a storage device.

A super secure environment might then lock down all USB devices to ones known by them and then epoxy all ports and devices.

[-] catloaf@lemm.ee 2 points 1 month ago

No. This exploit worked because the medium is read-write. Once a disc is finalized, it cannot be written to. You can't exfiltrate data via the CD.

I'm sure there's some modified CD burner out there that can write to a finalized disc, but this would only work where the air-gapped machine supports it, and also even has a drive that can write.

[-] quixotic120@lemmy.world 1 points 1 month ago

Unless it’s a rewritable cd, or the cd is the first step in a chain of exploits that allows write access on the usb ports used for peripherals so that an inside person could get away with a usb key or modified keyboard, or something else we can’t conceptualize but some group of well funded state actors can

this post was submitted on 09 Oct 2024
211 points (97.3% liked)

Technology

59648 readers
1414 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS