Hacker News new | past | comments | ask | show | jobs | submit login
How might Ventura’s rapid security response work? (eclecticlight.co)
42 points by ingve on June 14, 2022 | hide | past | favorite | 14 comments



I suspect it's something like "apply the changes to the SSV in the background, and meanwhile apply the mitigations to the running system" - and after a reboot they're in place.


Right. The OS is a read-only volume, but that's only for when it's being read off the disk into system memory. No reason a patch could not be loaded into both disk (SSV requiring reboot) and RAM (actively loaded) simultaneously. The kernel would need to approve, but if the kernel approved it could change any memory address it wants.

In theory, a Rapid Security Response is not necessarily only an update. It's a Response. It could contain instructions saying, hey, update this file here, and then patch in memory these particular address to specific new values.


I did a ⌘F of “cryptex” and didn’t find anything so I feel like the author might’ve missed that Apple pulled the shared cache out of the normal SSV and loads it separately, which might make it easier to update. On iOS there’s a separate cryptex containing just WebKit and associated frameworks so it seems pretty clear that this is to be the mechanism for rapid security updates, especially if you’ve been listening in to what the team has been talking about during WWDC. But you’d have to know the right people and questions to ask for that ;)


> especially if you’ve been listening in to what the team has been talking about during WWDC

Do you have specific talk links? I'd love to dive in more but I don't know which sessions contain the most useful details.


This isn't part of a talk. That said, a lot of this stuff ends up on Twitter, e.g. https://twitter.com/never_released/status/153397682922836787...


@never_released is exactly where I ended up, but I was hoping there was more information available. Sadly, it looks like researchers on Twitter and `man cryptex` are the only sources of information floating around for this stuff.


Apple will probably write a paragraph in the platform security guide this fall. The real meat of it will probably remain on Twitter, or if you're lucky, a good blog post.


Apart from Jonathan Levin (who doesn't work on macOS anymore) and Eclectic Light, is there other great content on the internals of macOS?



Leveraging snapshots seems like a good one, especially if you can pick which snapshot of the system volume a process is running against.

Then you could create the new snapshot and do a live update by rolling over one process at a time.


Sounds like a great attack vector.

Exactly what keys are needed to force a patch?


Most likely the patches will require digital signatures by Apple and the kernel will verify the signatures before allowing itself to be patched. Most likely the signatures will be compiled into the kernel itself and not be part of any external configuration file. Not a great vector.


Sounds like the same, or similar, keys that would give you the ability to push a full update.


Yes but a "rapid" security update that doesn't force a reboot is more likely to get under the radar




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: