Index  | Recent Threads  | Unanswered Threads  | Who's Active  | Guidelines  | Search
 

Quick Go »
No member browsing this thread
Thread Status: Active
Total posts in this thread: 9
[ Jump to Last Post ]
Post new Thread
Author
Previous Thread This topic has been viewed 2219 times and has 8 replies Next Thread
Dennis Charles
Cruncher
Joined: Dec 9, 2010
Post Count: 4
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
confused Hijacking BOINC client

Hi,

I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining?

As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site.

I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not.

With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified).

Any thoughts?
[Jan 24, 2018 7:48:52 PM]   Link   Report threatening or abusive post: please login first  Go to top 
KerSamson
Master Cruncher
Switzerland
Joined: Jan 29, 2007
Post Count: 1684
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

I am not willing to de-emphasize the criticality of Spectre (1 & 2) and Meltdown. However, these CPU bugs with the subsequent security issues are not very easy to use.
In theory, it is possible to use manipulated software - e.g. boinc or science application - for taking advantage of these weaknesses.
In practice, the effort to use these bugs on desktop level is probably very high regarding the possible wins.
On server level - especially in virtualisation farms - the situation could / should be considered differently.
In all cases, there are easier-to-use security weaknesses in today computer platforms than Spectre and Meltdown.
Nevertheless, if efficient tool kits would become available for using the Spectre and Meltdown bugs, the situation could change rapidly.
Today, within the scope of a well applied risk management, I would not immediately deploy the currently available patches but I will take time for an accurate impact assessment.
Today, cloud services represent already significantly higher security risks than these CPU bugs.
Cheers,
Yves
----------------------------------------
[Jan 25, 2018 11:19:40 AM]   Link   Report threatening or abusive post: please login first  Go to top 
mmonnin
Advanced Cruncher
Joined: Jul 20, 2016
Post Count: 148
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

I believe the new bugs mentioned only allow access to data and are not means to take control of a PC. If you have a BOINC task that is mining instead of crunching I'd say it was more likely that the BOINC project was hacked and a new app version was replaced with a miner and automatically sent out to many people at once. Heck some project admins rarely visit the forums/project to even notice.
----------------------------------------

[Jan 25, 2018 2:35:43 PM]   Link   Report threatening or abusive post: please login first  Go to top 
Former Member
Cruncher
Joined: May 22, 2018
Post Count: 0
Status: Offline
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not.


I was hoping that someone with rather more technical knowledge than me would address this point but, as I understand it, the IBM security team worked on the BOINC agent to harden it, and any of the WCG sanctioned releases of BOINC are quite secure enough for banks and other security conscious organisations (not to mention IBM itself) to allow their staff to run it on in-house machines.

I think that says enough.
[Jan 25, 2018 3:59:40 PM]   Link   Report threatening or abusive post: please login first  Go to top 
KLiK
Master Cruncher
Croatia
Joined: Nov 13, 2006
Post Count: 3108
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

Hi,

I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining?

As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site.

I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not.

With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified).

Any thoughts?

1. Spectre & Meltdown can give you access to some computer, but so does any other vulnerability out there!
2. If there's BOINC on PC, it's easy job to "hijack" the BOINC by changing credentials in BOINC itself.
3. For running BOINC, you don't even need an install. To heck, you don't even need to be admin or power user on Win PC. So just need to copy the BOINC into dir & run it.
3.a) That also goes for BOINC apps.

So yes, it's possible. But is it OK to do?
Not so much. Many of us would not condone such an act. cool
----------------------------------------
oldies:UDgrid.org & PS3 Life@home


non-profit org. Play4Life in Zagreb, Croatia
[Jan 25, 2018 5:32:30 PM]   Link   Report threatening or abusive post: please login first  Go to top 
seippel
Former World Community Grid Tech
Joined: Apr 16, 2009
Post Count: 392
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

Dennis Charles,

I can only speak for World Community Grid, but we use https to transfer workunits (which your client must initiate the request for) and your client verifies the md5sum of workunit files received before starting work. Additionally all of our science application executables are digitally signed offline.

Seippel


Hi,

I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining?

As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site.

I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not.

With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified).

Any thoughts?

[Jan 26, 2018 5:53:17 PM]   Link   Report threatening or abusive post: please login first  Go to top 
hchc
Veteran Cruncher
USA
Joined: Aug 15, 2006
Post Count: 865
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

That's great news seippel that science apps are digitally signed. It'd be extra hardcore if the app supported key pinning, but that's a pain.

Dennis Charles, I bet there are easier exploits than Spectre and Meltdown when attacking BOINC, honestly. We just don't know about them. Not sure if there has been a concerted effort to pen test BOINC client/server infrastructure or thoroughly audit the source code.

Best practice suggest running the BOINC client under an unprivileged account. This is done automatically during Windows installation only if it's installed as a service. Otherwise BOINC will run as the current user, and hopefully the current user is at least *not* a local admin on that machine but just a standard user.

Linux installs of BOINC using a package manager will create a "boinc" user for the purpose of running the BOINC client and locks down quite a bit of the processes, making it harder to attack BOINC for the purpose of privilege escalation.

Now that you mention cryptocurrency mining Dennis Charles, maybe the best way to "attack" BOINC is through "soft" hacking such as social engineering. All we would have to do is pose as a humanitarian research organization or university. We would then pitch our project to WCG (or start our own project and submit directly to BOINC and bypass WCG altogether), and we could say we are... fighting cancer or searching for prime numbers or ET but instead be mining Monero, Dogecoin, Ethereum, etc.

Send me an e-mail if you wish to partner up. This is a great idea!

(joke)
----------------------------------------
  • i5-7500 (Kaby Lake, 4C/4T) @ 3.4 GHz
  • i5-4590 (Haswell, 4C/4T) @ 3.3 GHz
  • i5-3570 (Broadwell, 4C/4T) @ 3.4 GHz

[Jan 27, 2018 11:25:37 AM]   Link   Report threatening or abusive post: please login first  Go to top 
Dan L
Cruncher
Joined: Jan 2, 2014
Post Count: 1
Status: Offline
Project Badges:
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

Will the Spectre fixes by Microsoft and other companies affect the performance of the computer when crunching?
[Jan 31, 2018 3:22:31 PM]   Link   Report threatening or abusive post: please login first  Go to top 
Former Member
Cruncher
Joined: May 22, 2018
Post Count: 0
Status: Offline
Reply to this Post  Reply with Quote 
Re: Hijacking BOINC client

Hi Dan L, and welcome to the forum.

This issue is discussed elsewhere, in this thread. But it looks like the effect on crunching is generally very small indeed as there are few system calls in the science apps and hence almost no context switching.
[Jan 31, 2018 5:44:53 PM]   Link   Report threatening or abusive post: please login first  Go to top 
[ Jump to Last Post ]
Post new Thread