| Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
| World Community Grid Forums
|
| No member browsing this thread |
|
Thread Status: Active Total posts in this thread: 9
|
|
| Author |
|
|
Dennis Charles
Cruncher Joined: Dec 9, 2010 Post Count: 4 Status: Offline Project Badges:
|
Hi,
I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining? As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site. I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not. With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified). Any thoughts? |
||
|
|
KerSamson
Master Cruncher Switzerland Joined: Jan 29, 2007 Post Count: 1684 Status: Offline Project Badges:
|
I am not willing to de-emphasize the criticality of Spectre (1 & 2) and Meltdown. However, these CPU bugs with the subsequent security issues are not very easy to use.
----------------------------------------In theory, it is possible to use manipulated software - e.g. boinc or science application - for taking advantage of these weaknesses. In practice, the effort to use these bugs on desktop level is probably very high regarding the possible wins. On server level - especially in virtualisation farms - the situation could / should be considered differently. In all cases, there are easier-to-use security weaknesses in today computer platforms than Spectre and Meltdown. Nevertheless, if efficient tool kits would become available for using the Spectre and Meltdown bugs, the situation could change rapidly. Today, within the scope of a well applied risk management, I would not immediately deploy the currently available patches but I will take time for an accurate impact assessment. Today, cloud services represent already significantly higher security risks than these CPU bugs. Cheers, Yves |
||
|
|
mmonnin
Advanced Cruncher Joined: Jul 20, 2016 Post Count: 148 Status: Offline Project Badges:
|
I believe the new bugs mentioned only allow access to data and are not means to take control of a PC. If you have a BOINC task that is mining instead of crunching I'd say it was more likely that the BOINC project was hacked and a new app version was replaced with a miner and automatically sent out to many people at once. Heck some project admins rarely visit the forums/project to even notice.
----------------------------------------![]() |
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not. I was hoping that someone with rather more technical knowledge than me would address this point but, as I understand it, the IBM security team worked on the BOINC agent to harden it, and any of the WCG sanctioned releases of BOINC are quite secure enough for banks and other security conscious organisations (not to mention IBM itself) to allow their staff to run it on in-house machines. I think that says enough. |
||
|
|
KLiK
Master Cruncher Croatia Joined: Nov 13, 2006 Post Count: 3108 Status: Offline Project Badges:
|
Hi, I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining? As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site. I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not. With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified). Any thoughts? 1. Spectre & Meltdown can give you access to some computer, but so does any other vulnerability out there! 2. If there's BOINC on PC, it's easy job to "hijack" the BOINC by changing credentials in BOINC itself. 3. For running BOINC, you don't even need an install. To heck, you don't even need to be admin or power user on Win PC. So just need to copy the BOINC into dir & run it. 3.a) That also goes for BOINC apps. So yes, it's possible. But is it OK to do? Not so much. Many of us would not condone such an act. ![]() |
||
|
|
seippel
Former World Community Grid Tech Joined: Apr 16, 2009 Post Count: 392 Status: Offline Project Badges:
|
Dennis Charles,
I can only speak for World Community Grid, but we use https to transfer workunits (which your client must initiate the request for) and your client verifies the md5sum of workunit files received before starting work. Additionally all of our science application executables are digitally signed offline. Seippel Hi, I'm just wondering if it's possible to hijack the client by sending in a malicious task (disguising as a legitimate research task), and run for bitcoin mining? As cryptomining gets more popular than ever, exploits like these are popping up everywhere, even some websites can run a script that will mine using your cpu even by just going to their site. I'm just not sure if BOINC uses end to end encryption and if spoofing a task is easy or not. With SPECTRE and Meltdown vulnerabilities in our silicon processors today, it is possible to obtain login credentials by exploiting these loopholes, especially if I could send a script to BOINC, and BOINC will run a code that will trigger Intel's predictive algorithm and a different algorithm can indirectly pick up the encryption key and BOINC can send it back to me as a finished task(extremely simplified). Any thoughts? |
||
|
|
hchc
Veteran Cruncher USA Joined: Aug 15, 2006 Post Count: 865 Status: Offline Project Badges:
|
That's great news seippel that science apps are digitally signed. It'd be extra hardcore if the app supported key pinning, but that's a pain.
----------------------------------------Dennis Charles, I bet there are easier exploits than Spectre and Meltdown when attacking BOINC, honestly. We just don't know about them. Not sure if there has been a concerted effort to pen test BOINC client/server infrastructure or thoroughly audit the source code. Best practice suggest running the BOINC client under an unprivileged account. This is done automatically during Windows installation only if it's installed as a service. Otherwise BOINC will run as the current user, and hopefully the current user is at least *not* a local admin on that machine but just a standard user. Linux installs of BOINC using a package manager will create a "boinc" user for the purpose of running the BOINC client and locks down quite a bit of the processes, making it harder to attack BOINC for the purpose of privilege escalation. Now that you mention cryptocurrency mining Dennis Charles, maybe the best way to "attack" BOINC is through "soft" hacking such as social engineering. All we would have to do is pose as a humanitarian research organization or university. We would then pitch our project to WCG (or start our own project and submit directly to BOINC and bypass WCG altogether), and we could say we are... fighting cancer or searching for prime numbers or ET but instead be mining Monero, Dogecoin, Ethereum, etc. Send me an e-mail if you wish to partner up. This is a great idea! (joke)
|
||
|
|
Dan L
Cruncher Joined: Jan 2, 2014 Post Count: 1 Status: Offline Project Badges:
|
Will the Spectre fixes by Microsoft and other companies affect the performance of the computer when crunching?
|
||
|
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Hi Dan L, and welcome to the forum.
This issue is discussed elsewhere, in this thread. But it looks like the effect on crunching is generally very small indeed as there are few system calls in the science apps and hence almost no context switching. |
||
|
|
|