- Thread Starter
- #26
Oh well, we shall have to see if re-writing everyting in Rust is the solution. I wonder how that's coming along? 
A possible "dreaming scenario": important parts of FreeBSD like Jails and Capsicum will be checked and declared secure (more feasible than in Linux); then all the rest of services and applications will be built/adapted composing these parts. This will reduce a lot the escalation of security problems in non-safe code. A bad video will break ffmpeg output but not the system, and it will be self-sabotage...Oh well, we shall have to see if re-writing everyting in Rust is the solution. I wonder how that's coming along?![]()
"A flaw in OpenBSD's TCP SACK implementation dating back to 1999. A signed integer overflow allowing remote denial-of-service. The kind of bug that survived hundreds of reviews, dozens of major releases, thousands of pairs of eyes. Still there.
A defect in FFmpeg's H.264 decoder, 16 years old. A sentinel collision causing an out-of-bounds write. Automated tools never caught it. Not for lack of trying: 5 million fuzz tests. Zero results. Mythos found it by analyzing the code directly."
Although it doesn't say so, what would have impressed me would be if it only found ONE bug in openbsd... we don't know the full number, of course.
"The model chained multiple Linux kernel vulnerabilities to build a full privilege escalation path, defeating hardened protections: stack canaries, KASLR, W^X. Not an isolated flaw. A working attack chain.
On FreeBSD, Mythos autonomously identified and exploited a 17-year-old remote code execution vulnerability in the NFS service. Unauthenticated root access. Fully autonomous. No human steering.
And then there's this: against Firefox 147, the model successfully developed JavaScript shell exploits 181 times. Claude Opus 4.6, the previous best model? Twice."
I'm thinking a bit of both, maybe biased towards hype.Hmm, so the jury is out. Either they do have something real... or this is all hype and an attempt at a kind of 'protection racket' to try to get a funding stream from corporates. Or perhaps a bit of both.
Yes, iSCSI is a better example, if they had found an exploit in that, that would have been more significant.
I'm thinking a bit of both, maybe biased towards hype.
Honestly, look at NFS. Does anyone run NFS over the public internet or do you use it on your home network (isolated) or work network (again isolated)? If an exploit is not a "remote" exploit, then you start needing more physical access, so there are other concerns that need breaking before the exploit can happen.
Well, I guess you're right, I expect there's lots of it out there..NFS is in much more common use than iSCSI, though.
NFS with Kerberos (as I understand the exploit is only against NFS with Kerberos) might be a different matter.
LAN is a relative term. There are a lot of devices such as video streamers, cameras and wifi hubs that are easily taken over and could attack an NFS server on the LAN.
They should all be isolated. Anything that runs proprietary or unchecked firmware should be isolated.
Obviously in certain usage scenario you cannot replace NFS with iSCSI. NFS is a network file system, while iSCSI simulates a local drive, hence you cannot share an iSCSI device between many clients.I don't trust NFS. It's not performant , it's not safe.
iSCSI is preferable , it's a block device , not a "file device".
Nfs on top of iSCSI? Never used it but nfs doesn't really care about the physical medium of local files. It suits for quick access to a network directory with only a few commands and it needs no reboot to activate it.Obviously in certain usage scenario you cannot replace NFS with iSCSI. NFS is a network file system, while iSCSI simulates a local drive, hence you cannot share an iSCSI device between many clients.
I never used network file systems, apart some sshfs connection, and minimal Samba setup, but they intrigue me a lot. CephFS, Garage, Seaweed, etc.. Or distribuited filesystems like IPFS and hyperdrive.
I never meant this. It was a NFS vs iSCSI because they were mentioned together in this thread.Nfs on top of iSCSI?
If iSCSI is safe enough, everything that relies on it is safe too, right? You can share things with other clients while using iSCSI anyway.I never meant this. It was a NFS vs iSCSI because they were mentioned together in this thread.
If there is security hole in NFS + Kerberos, the security hole does not depend from where NFS store the data: it can be a local device or a iSCSI device.If iSCSI is safe enough, everything that relies on it is safe too, right? You can share things with other clients while using iSCSI anyway.