Author Topic: is a dual boot secure?  (Read 13169 times)

0 Members and 1 Guest are viewing this topic.

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
is a dual boot secure?
« on: February 19, 2015, 09:05:04 pm »
If I wanted to dual boot windows and linux on the same hard drive, is it possible to somehow modify the linux files from within windows to compromise the linux installations security?
 

Online AndyC_772

  • Super Contributor
  • ***
  • Posts: 4235
  • Country: gb
  • Professional design engineer
    • Cawte Engineering | Reliable Electronics
Re: is a dual boot secure?
« Reply #1 on: February 19, 2015, 09:07:20 pm »
If you mean 'is there such a thing as an ext3/4 file system for windows', then yes, there is.

Offline Phaedrus

  • Frequent Contributor
  • **
  • Posts: 714
  • Country: us
Re: is a dual boot secure?
« Reply #2 on: February 19, 2015, 09:16:05 pm »
If I wanted to dual boot windows and linux on the same hard drive, is it possible to somehow modify the linux files from within windows to compromise the linux installations security?

Yes. And vice versa. I've used a Linux LiveCD to remove Windows malware infections. Only way to prevent another OS from tampering with your files is to encrypt the drive.
"More quotes have been misattributed to Albert Einstein than to any other famous person."
- Albert Einstein
 

Offline German_EE

  • Super Contributor
  • ***
  • Posts: 2399
  • Country: de
Re: is a dual boot secure?
« Reply #3 on: February 19, 2015, 09:51:19 pm »
I would say yes. I run Windows 7 / Linux Mint on my notebook and MS Windows does not even see the Linux partitions, it reports them as empty or unformatted drives.
Should you find yourself in a chronically leaking boat, energy devoted to changing vessels is likely to be more productive than energy devoted to patching leaks.

Warren Buffett
 

Offline jwm_

  • Frequent Contributor
  • **
  • Posts: 319
  • Country: us
    • Not A Number
Re: is a dual boot secure?
« Reply #4 on: February 19, 2015, 10:00:42 pm »
You can improve things by encrypting the linux partition with LUKS,  at most the windows could just erase the data, but not maliciuously read or modify it. You would need to enter a password on startup though, if you only care about casual mischief and not maliciousness you can hardcode a password, it would be possible to read/modify it from windows but someone would have to put a bit of work into it.

Offline Mechanical Menace

  • Super Contributor
  • ***
  • Posts: 1288
  • Country: gb
Re: is a dual boot secure?
« Reply #5 on: February 19, 2015, 10:16:52 pm »
If someone else can sit at your computer and boot it up it's not secure.

If your computer is connected to a network it's not secure.

Especially given time.

At best no one's worked it out yet, at worst they have and it's not public knowledge.

EDIT:

Just realised how negative that sounds lol. One thing you can do is manage risk. Luckily almost all information is only really worth keeping secret so long and most isn't worth the effort anyhows.
« Last Edit: February 19, 2015, 10:25:00 pm by Mechanical Menace »
Second sexiest ugly bloke on the forum.
"Don't believe every quote you read on the internet, because I totally didn't say that."
~Albert Einstein
 

Offline linux-works

  • Super Contributor
  • ***
  • Posts: 1999
  • Country: us
    • netstuff
Re: is a dual boot secure?
« Reply #6 on: February 19, 2015, 10:53:58 pm »
if windows has admin privs, it can write random stuff to any disk partition.  so its not safe, if you really get technical.

I dual boot and don't worry about it, though.  I limit what my win7 system does, avoid almost all web browsing and never install weird stuff to it.  if I need to browse the web, I do that under linux where its 1000% safer, overall.


Offline cosmos

  • Regular Contributor
  • *
  • Posts: 110
  • Country: 00
Re: is a dual boot secure?
« Reply #7 on: February 20, 2015, 07:46:26 am »
If you have serious security issues you might also want to have a look at the HW platform itself as an entry point. There are back doors into most PCs that does not even require the PC to be running (needs power to start though).
When someone with the right certificate can start your PC from remote and "restore" the disk to running order then that someone can do what he wants to all your disks.
How paranoid this should make you I guess depends on your aversion for three letter acronyms and your conspiracy alert level.
this sums it up nicely http://hardware.slashdot.org/comments.pl?sid=4608409&cid=45813563
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #8 on: February 20, 2015, 08:43:57 am »


ah, but can you be sure there is no backdoor that scans for some code that resets all your bios settings?

or like, is it measurable, perhaps a LDO powering the network interface is actually turned off?
« Last Edit: February 20, 2015, 09:40:54 am by SArepairman »
 

Offline tautech

  • Super Contributor
  • ***
  • Posts: 28474
  • Country: nz
  • Taupaki Technologies Ltd. Siglent Distributor NZ.
    • Taupaki Technologies Ltd.
Re: is a dual boot secure?
« Reply #9 on: February 20, 2015, 09:37:05 am »
I always in Bios disable Wake on Lan, USB and everything else I can.
In Win also disable remote assistance.
No good making things too easy for the A holes.

Gee thanks SArepairman.....removed 3/4 of your post after I replied.
« Last Edit: February 20, 2015, 09:45:54 am by tautech »
Avid Rabid Hobbyist
Siglent Youtube channel: https://www.youtube.com/@SiglentVideo/videos
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #10 on: February 20, 2015, 09:47:10 am »
oh dude it was a mistake, i thought I was posting a new post but I hit edit  |O

for clarity, basically I asked if the computer must be turned off for a remote "reprogramming" to happen, and leaving the lan unplugged before the OS is booted and unplugging the lan before the OS is turned off is a reasonable countermeasure.

I also wondered if there could be a "turn off" packet that can be sent which turns your computer off if you left it on running a operating system while you are away from the computer in order to allow to be reprogrammed if it is turned on (I imagine this could be useful if you wanna do a global change to a entire office building and you don't wanna hunt down someones workstation that was not turned off.)
« Last Edit: February 20, 2015, 09:53:51 am by SArepairman »
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #11 on: February 20, 2015, 10:48:00 am »
how do you think something like that propagates?

the NIC writes a little barebones alphabet boy OS onto some free hard drive space ?

I CANT BELIEVE THERE IS NO PHYSICAL INTERLOCK! :wtf: :wtf:
 

Offline Mechanical Menace

  • Super Contributor
  • ***
  • Posts: 1288
  • Country: gb
Re: is a dual boot secure?
« Reply #12 on: February 20, 2015, 11:34:25 am »
"
ah, but can you be sure there is no backdoor that scans for some code that resets all your bios settings?

Nope, you also can't be sure your firmware doesn't have backdoors and doesn't patch any kernel loaded to include it...

for clarity, basically I asked if the computer must be turned off for a remote "reprogramming" to happen, and leaving the lan unplugged before the OS is booted and unplugging the lan before the OS is turned off is a reasonable countermeasure.

Doing something remotely would be easier when an OS is running, and EVERY OS that supports networking is vulnerable to this sort of attack.

Quote
I also wondered if there could be a "turn off" packet that can be sent which turns your computer off if you left it on running a operating system while you are away from the computer

init 6" on a lot of *nix's ;)

That really is dependent on the OS...

how do you think something like that propagates?

the NIC writes a little barebones alphabet boy OS onto some free hard drive space ?

I wouldn't try to take advantage of netboot to implement any sort of takeover of a desktop computer, it's too visible. The easiest way to propagate any sort of attack is to convince people to run it themselves. This is how the vast majority of malware gets on PCs, and no OS or security setup can protect you from that without making the computer useless.

Quote
I CANT BELIEVE THERE IS NO PHYSICAL INTERLOCK! :wtf: :wtf:

Why would you need one? Just follow standard practice. Don't run servers you don't need, don't open ports on your networks firewall you aren't using. Keep your BIOS/EFI/all firmwares, OS's and apps updated regularly, at least every time there's a security patch. And never, ever, install anything you don't trust.

The only thing that will keep you setup more secure than following those steps is putting it in a room with no doors, power supply, and network access.
Second sexiest ugly bloke on the forum.
"Don't believe every quote you read on the internet, because I totally didn't say that."
~Albert Einstein
 

Offline janoc

  • Super Contributor
  • ***
  • Posts: 3787
  • Country: de
Re: is a dual boot secure?
« Reply #13 on: February 20, 2015, 01:56:47 pm »
If I wanted to dual boot windows and linux on the same hard drive, is it possible to somehow modify the linux files from within windows to compromise the linux installations security?

Depends on your definition of "secure".

If secure as in information security, not getting your data stolen, etc. then no - as others have explained.

If secure as in a common Windows malware not infecting your Linux files, then you are likely safe, because malware that understands a Linux filesystem and executables is very rare. Not impossible to find, but probably not worth worrying about. Of course, if you get a virus that scrambles/deletes the content of your harddrive blindly, it could mess your Linux files up as well.

I am dual-booting Windows and Linux for many years having both on the same and on separate drives and never had a problem with some Windows malware trampling over my Linux files. However, I didn't really have Windows malware in ages neither.

Dual boot is not a security feature - don't rely on it for that. If you practice a good computer "hygiene", such as having an up to date antivirus, have a firewall configured, use up-to-date, patched system and applications, have up to date backups, you will be OK, dual boot or no dual boot.

« Last Edit: February 20, 2015, 01:59:19 pm by janoc »
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #14 on: February 20, 2015, 09:35:10 pm »
well the idea of this netboot attack is very interesting regardless, even if they are rare state level things, they are the most interesting concept in this thread by far.
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #15 on: February 21, 2015, 12:31:51 am »
"
ah, but can you be sure there is no backdoor that scans for some code that resets all your bios settings?

Nope, you also can't be sure your firmware doesn't have backdoors and doesn't patch any kernel loaded to include it...

for clarity, basically I asked if the computer must be turned off for a remote "reprogramming" to happen, and leaving the lan unplugged before the OS is booted and unplugging the lan before the OS is turned off is a reasonable countermeasure.

Doing something remotely would be easier when an OS is running, and EVERY OS that supports networking is vulnerable to this sort of attack.

Can you give me a more technical explanation of how this works?

Won't the OS interfere with remote access by the BIOS?

Like, I thought the OS running will have control of where to access the hard drive and memory. If something else tries to control this while its running wont the OS crash?????

how is it easier???
« Last Edit: February 21, 2015, 12:37:22 am by SArepairman »
 

Offline NiHaoMike

  • Super Contributor
  • ***
  • Posts: 9050
  • Country: us
  • "Don't turn it on - Take it apart!"
    • Facebook Page
Re: is a dual boot secure?
« Reply #16 on: February 21, 2015, 07:49:39 am »
Dual boot is so 1998... Nowadays, virtualization is usually the better choice.
Cryptocurrency has taught me to love math and at the same time be baffled by it.

Cryptocurrency lesson 0: Altcoins and Bitcoin are not the same thing.
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #17 on: February 21, 2015, 09:47:13 am »
i like video games with good graphics
 

Offline Mechanical Menace

  • Super Contributor
  • ***
  • Posts: 1288
  • Country: gb
Re: is a dual boot secure?
« Reply #18 on: February 21, 2015, 03:20:09 pm »
Can you give me a more technical explanation of how this works?

Won't the OS interfere with remote access by the BIOS?

Like, I thought the OS running will have control of where to access the hard drive and memory. If something else tries to control this while its running wont the OS crash?????

how is it easier???

Ok, so say I have an exploit that gives me root or admin rights on a machine, or I've persuade a user to grant my programme them, the OS will let that programme access anything. I can access all your hardware directly*, and if needs be even ignoring the drivers for the hardware. But the OS is still controlling what gets access to what hardware when. My code isn't running in kernel mode/ring 0, the kernel (by necessity) just gives root/admin processes as much access as they want.


*and with a little work (amount depends on the OS) even bypass all memory protection and start patching the kernel, though that would be more likely to cause problems than patching it when it's loaded.
« Last Edit: February 21, 2015, 03:30:13 pm by Mechanical Menace »
Second sexiest ugly bloke on the forum.
"Don't believe every quote you read on the internet, because I totally didn't say that."
~Albert Einstein
 

Offline alank2

  • Super Contributor
  • ***
  • Posts: 2185
Re: is a dual boot secure?
« Reply #19 on: February 21, 2015, 03:28:04 pm »
Dual boot is so 1998... Nowadays, virtualization is usually the better choice.

This is so true.

I wrote a piece of software that would allow you to boot up to 256 OS's on a single hard drive.  It does it by maintaining its own partition table that it will put into place and then boot the OS.  So you have a choice of which partitions you want present when you boot a particular OS.  You can use this to keep OS's separate from each other - it will wrap areas that are not used in a "protection partition" and remove their boot sector so OS's do not try to mount them.  It feels like it was a million years ago when I wrote this, but if you are interested:

http://www.sadevelopment.com/more_pbm.htm

Good luck,

Alan
 

Offline linux-works

  • Super Contributor
  • ***
  • Posts: 1999
  • Country: us
    • netstuff
Re: is a dual boot secure?
« Reply #20 on: February 21, 2015, 05:21:32 pm »
Dual boot is so 1998... Nowadays, virtualization is usually the better choice.

VMs can also be a huge hassle to network properly.  they tend to want to run internal vswitches, they tend to want to run NAT and they tend to want to make it harder to allow incoming connections, like servers and baremetal machines do.

some GUIs for vm tech makes it less hard, but others make it a huge PITA to setup networking the way you want.

and if you have an existing windows install, its damned near impossible to move it over to your vm.  linux allows this easily but windows has always been 'node locked' and unless you can hack windows pretty well, transferring your apps and data and config to a new machine is far from trivial.

for quickie things, I'll launch a vm that I did a full separate install to (sigh) but I still prefer to stay inside a real o/s if I'm going to be doing anything more than doing a short edit on a word doc.

Offline janoc

  • Super Contributor
  • ***
  • Posts: 3787
  • Country: de
Re: is a dual boot secure?
« Reply #21 on: February 21, 2015, 10:20:53 pm »
Dual boot is so 1998... Nowadays, virtualization is usually the better choice.

Except dual booting and virtualization serve different purposes.

Virtualized OS is never going to function equally well as when it is running native on the HW. If you need only one odd application from the other os, by all means, virtualize. But you will suffer a lot if you need full performance from your peripherals, graphics, etc.

 

Offline janoc

  • Super Contributor
  • ***
  • Posts: 3787
  • Country: de
Re: is a dual boot secure?
« Reply #22 on: February 21, 2015, 10:22:57 pm »
Dual boot is so 1998... Nowadays, virtualization is usually the better choice.

This is so true.

I wrote a piece of software that would allow you to boot up to 256 OS's on a single hard drive.  It does it by maintaining its own partition table that it will put into place and then boot the OS.  So you have a choice of which partitions you want present when you boot a particular OS.  You can use this to keep OS's separate from each other - it will wrap areas that are not used in a "protection partition" and remove their boot sector so OS's do not try to mount them.  It feels like it was a million years ago when I wrote this, but if you are interested:

http://www.sadevelopment.com/more_pbm.htm

Good luck,

Alan

Alan, but that is not virtualization, but a hack to dual/multiboot your machine  :palm:

Similar programs have been around for ages, e.g. System Commander.

 

Offline Galenbo

  • Super Contributor
  • ***
  • Posts: 1469
  • Country: be
Re: is a dual boot secure?
« Reply #23 on: February 21, 2015, 10:27:34 pm »
... is it possible to somehow modify the linux files from within windows to compromise the linux installations security?

Yes, Format is possible. Pretty unsecure.
If you try and take a cat apart to see how it works, the first thing you have on your hands is a nonworking cat.
 

Offline SArepairmanTopic starter

  • Frequent Contributor
  • **
  • Posts: 885
  • Country: 00
  • wannabee bit hunter
Re: is a dual boot secure?
« Reply #24 on: February 22, 2015, 01:04:49 am »
Can you give me a more technical explanation of how this works?

Won't the OS interfere with remote access by the BIOS?

Like, I thought the OS running will have control of where to access the hard drive and memory. If something else tries to control this while its running wont the OS crash?????

how is it easier???

Ok, so say I have an exploit that gives me root or admin rights on a machine, or I've persuade a user to grant my programme them, the OS will let that programme access anything. I can access all your hardware directly*, and if needs be even ignoring the drivers for the hardware. But the OS is still controlling what gets access to what hardware when. My code isn't running in kernel mode/ring 0, the kernel (by necessity) just gives root/admin processes as much access as they want.


*and with a little work (amount depends on the OS) even bypass all memory protection and start patching the kernel, though that would be more likely to cause problems than patching it when it's loaded.

OK, Can you clarify?

Can you explain to me how a netboot attack works when the computer is off vs how it does when it is on?

Like, a chain of events...

I'm guessing its starting here (for a powered off net boot attack):
1) Computer power supply is providing standby power to BIOS
2) Computer is chilling, ignoring everything that comes in on the LAN connection (except for a few unique "triggers")
3) unique trigger comes along the LAN cable, causes computer to power on and...

can you be specific though, like describing what happens in various hardware sub systems during this chain of events?

is it just the bios? or does it start from NIC firmware? is there a diff using a plugin NIC card (pci, etc)
« Last Edit: February 22, 2015, 01:10:18 am by SArepairman »
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf