Dreckig OS

This forums is for OS project announcements including project openings, new releases, update notices, test requests, and job openings (both paying and volunteer).
User avatar
GAT
Member
Member
Posts: 75
Joined: Wed Nov 30, 2011 9:51 pm
Contact:

Re: Dreckig OS

Post by GAT »

The idea is that the only binary that runs is the kernel. This makes it fast because it never has to call to run anything outside of itself. Since all software is written into the kernel I have complete control over it, meaning I can make it play nice together.

And I mean security as in from viruses and the like. Since it never runs anything outside of the kernel it can't get infected. I am targeting Dreckig OS at embedded systems and e-appliances, so once I get network drivers &c. running it can use the web with no risk.

More info:
http://www.osnews.com/story/25463/Dreck ... hic_Kernel
d3: virtualizing kernel in progress
https://github.com/WizardOfHaas/d3/
User avatar
Combuster
Member
Member
Posts: 9301
Joined: Wed Oct 18, 2006 3:45 am
Libera.chat IRC: [com]buster
Location: On the balcony, where I can actually keep 1½m distance
Contact:

Re: Dreckig OS

Post by Combuster »

it can use the web with no risk
And only one bug will be needed to own the device :wink:...
"Certainly avoid yourself. He is a newbie and might not realize it. You'll hate his code deeply a few years down the road." - Sortie
[ My OS ] [ VDisk/SFS ]
invalid
Member
Member
Posts: 60
Joined: Thu Feb 23, 2012 8:39 am

Re: Dreckig OS

Post by invalid »

GAT wrote:it can't get infected
Everything can be hacked. What you mean is, perhaps: "Nobody will care enough to try and hack me" :)
User avatar
bluemoon
Member
Member
Posts: 1761
Joined: Wed Dec 01, 2010 3:41 am
Location: Hong Kong

Re: Dreckig OS

Post by bluemoon »

GAT wrote:it can't get infected
As long as you cannot detect it.
User avatar
brain
Member
Member
Posts: 234
Joined: Thu Nov 05, 2009 5:04 pm
Location: UK
Contact:

Re: Dreckig OS

Post by brain »

bluemoon wrote:
GAT wrote:it can't get infected
As long as you cannot detect it.
This needs to be rephrased to 'it cant get disinfected'.

If someone manages to hack the OS via an exploit and insert code into one of the binaries, there's no way to install an anti-virus or other antidote to fix it, apart from through you... It's there and it's staying there :)
User avatar
DavidCooper
Member
Member
Posts: 1150
Joined: Wed Oct 27, 2010 4:53 pm
Location: Scotland

Re: Dreckig OS

Post by DavidCooper »

ydoom wrote:
GAT wrote:it can't get infected
Everything can be hacked. What you mean is, perhaps: "Nobody will care enough to try and hack me" :)
What about a machine running nothing more than a delay loop? Could that be hacked into? Maybe if the power disconnects and it reboots you could hack into it at that point, but if it has battery back up and never crashes, how would you hack your way in? If the answer to that is that you can't hack into it, then extend this example to make the computer do some real work, and keep extending it little by little until it's able to browse the Web while still being impossible to hack into.

Running everything in kernel mode is exactly what I do, and at some stage the only additional software that will be allowed to run in my OS will have been written by A.I. in the OS, leaving no route open for anyone to get their malicious code run in the machine (unless it's built into the BIOS from the outset).
Help the people of Laos by liking - https://www.facebook.com/TheSBInitiative/?ref=py_c

MSB-OS: http://www.magicschoolbook.com/computing/os-project - direct machine code programming
gerryg400
Member
Member
Posts: 1801
Joined: Thu Mar 25, 2010 11:26 pm
Location: Melbourne, Australia

Re: Dreckig OS

Post by gerryg400 »

then extend this example to make the computer do some real work, and keep extending it little by little until it's able to browse the Web while still being impossible to hack into.
Why not extend it until it has the 'intelligence' of my 12 year old son ? Then see how easy it is to convince it to install malware and destroy itself.
If a trainstation is where trains stop, what is a workstation ?
User avatar
GAT
Member
Member
Posts: 75
Joined: Wed Nov 30, 2011 9:51 pm
Contact:

Re: Dreckig OS

Post by GAT »

My entire operating system is the kernel, which is one file. It only runs software inside of itself, so even if someone wrote a virus for it they would have to write the virus into the kernel and recompile it. This makes it so a virus can't simply be installed in Dreckig OS.
d3: virtualizing kernel in progress
https://github.com/WizardOfHaas/d3/
User avatar
bubach
Member
Member
Posts: 1223
Joined: Sat Oct 23, 2004 11:00 pm
Location: Sweden
Contact:

Re: Dreckig OS

Post by bubach »

The point people here are trying to make is that it's only "safe" until you connect it to the outside world. With an Internet connection, people could send raw packets and do all kind of trickery to find bugs in your system. As long as you're not running the browser part in ring 3 with limited access to the rest of your system it doesn't matter if the browser is part of your kernel or a separate program - a hacker will get ring 0 access to your CPU.
"Simplicity is the ultimate sophistication."
http://bos.asmhackers.net/ - GitHub
User avatar
DavidCooper
Member
Member
Posts: 1150
Joined: Wed Oct 27, 2010 4:53 pm
Location: Scotland

Re: Dreckig OS

Post by DavidCooper »

gerryg400 wrote:
then extend this example to make the computer do some real work, and keep extending it little by little until it's able to browse the Web while still being impossible to hack into.
Why not extend it until it has the 'intelligence' of my 12 year old son ? Then see how easy it is to convince it to install malware and destroy itself.
Have you managed to convince your son to install malware into himself which will destroy him? It is actually possible to do it with humans, using viruses such as religions [don't take that as an attack on all religions - I'm leaving the possiblility there that one of them's the real deal, but however you see it the rest are clearly viruses].
bubach wrote:With an Internet connection, people could send raw packets and do all kind of trickery to find bugs in your system.
Clearly it's risky in a system that could contain bugs, so unless you have a system that can eliminate all bugs, it makes sense to use the available protection features. The main problem with browsing the Web with a human-designed system that's supposed to be comletely safe would be that you'd have difficulty running any scripts in the pages you're trying to view - the complexity involved immediately opens up oodles of possibilities for things to go wrong, so you'd really have to restrict yourself to viewing the source code of the pages instead of running the scripts. However, if you only ever need to access websites which don't do anything complicated, maybe it's viable. The most important thing is to leave the door open to adding in protection features later on if it turns out they're vital. Until your OS becomes popular, no one's going to waste time trying to hack into it anyway, so it really doesn't matter at this stage.
Help the people of Laos by liking - https://www.facebook.com/TheSBInitiative/?ref=py_c

MSB-OS: http://www.magicschoolbook.com/computing/os-project - direct machine code programming
User avatar
Yoda
Member
Member
Posts: 255
Joined: Tue Mar 09, 2010 8:57 am
Location: Moscow, Russia

Re: Dreckig OS

Post by Yoda »

GAT wrote:if someone wrote a virus for it they would have to write the virus into the kernel and recompile it
The insertion of virus into kernel doesn't inevitably mean recompilation. It may be a patch with a jump to an added code.
Yet Other Developer of Architecture.
OS Boot Tools.
Russian national OSDev forum.
User avatar
brain
Member
Member
Posts: 234
Joined: Thu Nov 05, 2009 5:04 pm
Location: UK
Contact:

Re: Dreckig OS

Post by brain »

Yoda wrote:
GAT wrote:if someone wrote a virus for it they would have to write the virus into the kernel and recompile it
The insertion of virus into kernel doesn't inevitably mean recompilation. It may be a patch with a jump to an added code.
Yes and if that added code contains instructions to write to disk then it can make itself permanent. it can do this even if your fs is readonly as it could just implement a basic disk driver within itself. it comes down to if someone really can be bothered but don't underestimate a bored or interested cracker...
ACcurrent
Member
Member
Posts: 125
Joined: Thu Aug 11, 2011 12:04 am
Location: Watching You

Re: Dreckig OS

Post by ACcurrent »

We need to remember that this OS has an interpreter, so, so long as the interpreter can write to the file which stores dreckigOS's kernel it can cause damage. Also if everything is written on the same platform i.e. dreckig's VM, then u can exploit other programs running code.
Get back to work!
Github
invalid
Member
Member
Posts: 60
Joined: Thu Feb 23, 2012 8:39 am

Re: Dreckig OS

Post by invalid »

DavidCooper wrote:What about a machine running nothing more than a delay loop? Could that be hacked into? Maybe if the power disconnects and it reboots you could hack into it at that point, but if it has battery back up and never crashes, how would you hack your way in?
Yes, you're right - this would be improbable to hack remotely (you could as well ask how does one hack a stone). And yes, you nailed it - the attack surface in this case would be a bootstrap storage device, and perhaps the battery ;) But as soon as you start "adding instructions" (and make the machine do something actually), you also start adding risk, because:
- you haven't had time to foresee all situations
- different parts of program rely on each other (sometimes even trust blindly)
- everything is always put in some context (let it be hardware context, for example), introducing even more of The Unknown

Think about how you can hack a pizza delivery system by ordering pizzas from all around the city to your victim. Now please, start from "pizzaman doing nothing, without a phone, and just sitting", and extend it "step by step" to a "safe" system.

IMHO that's a macro scale manifestation of the second law of thermodynamics, but I can't explain how :)
Post Reply