From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wm1-x331.google.com (mail-wm1-x331.google.com [IPv6:2a00:1450:4864:20::331]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id D8C463B2A4; Fri, 14 Apr 2023 00:04:44 -0400 (EDT) Received: by mail-wm1-x331.google.com with SMTP id q5so9632896wmo.4; Thu, 13 Apr 2023 21:04:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1681445083; x=1684037083; h=content-transfer-encoding:to:subject:message-id:date:from :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=81hSHXNCwI+e8f8bboheWKI2iSTmwHkwmpGVZ9smZ2E=; b=oAtnYS4edO4EnxPKrCbUlVZjeGu8EGAcyGw81ubwWc9EmLjcNxxrsWEWSQf82QzVUV FdqiBfY6JJHTVyP0MqwOppY+qLSWA1wTo23/XFEnlaiN6gLpTx5/Nnkmx4lyapnFzYQl b+X/ZZ98K4yg9KkJT2biaDMeI1+6EUir7gcE4uQNyopWdpFLrDKaD4ad2/teIS9AxvO6 J58ssDY+YCmlMGh0pEwyVwlf3boixSotxwLertXrUfW6wXZNA66B8t/kdqWmDVIybu2o AbOP/QP5N9UJX86eqfSom0UzDykFe2zeSOvkkxCP74LvOuXp5XZZHduO7oes+bCm6nz8 DZrA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681445083; x=1684037083; h=content-transfer-encoding:to:subject:message-id:date:from :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=81hSHXNCwI+e8f8bboheWKI2iSTmwHkwmpGVZ9smZ2E=; b=bpoG8BQszRHe63xKZC5pKNQRuc/oG26sGkGyj2wa+vqzKoDdAW22GgyTmer/bg7u79 buWuerSzQ2bH2oHDwefWrAjYWYb/XX6XYT8rEU8OVXk2N1A1lb434UtwVYySQcoZOcOk v3TVSZ7C2JkqwN8ApKMyEFsMPikPRpl/wHVWQpk6u3SnzwNxytsTnQiO0zFGf8VCrznB eeFNd91IOsZMfqFsIquy3kd+oJe0ulK4Rl/w+gwDRRrNFQUFGAGd9E1B3BGXKuEsUCEP lD7lmjMNaJZe0sOFdHK1McFcgrYONkNR/Bsj95A2nkQbRFzJLhLXfmHsR2U1MJ1fpAEj 0b+A== X-Gm-Message-State: AAQBX9cClYu1SINCrxbAoYXkLW5f2OisVKC52kCtqio/qSebuwOjO/No a/AoA7hlJxt6Z3XX19iR1fUuj7LOacYf3Df0QuiX+XTqxY8= X-Google-Smtp-Source: AKy350Ycf3KFxnC7LjR3Fyfm/TgS3elbxB8ubg0Kp7K7DevZvnLs27Amy80B6/emw3TbDqzsmcSfObF7FWNTD1use9A= X-Received: by 2002:a7b:c395:0:b0:3f0:a137:90e9 with SMTP id s21-20020a7bc395000000b003f0a13790e9mr1074749wmj.0.1681445082910; Thu, 13 Apr 2023 21:04:42 -0700 (PDT) MIME-Version: 1.0 From: Dave Taht Date: Thu, 13 Apr 2023 21:04:31 -0700 Message-ID: To: cerowrt-devel , bloat Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Subject: [Bloat] can bus attack X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Apr 2023 04:04:45 -0000 The biggest bug with the early fq_codel deployment was that it dropped from head and fq'd which led to the prospect of messages sent out of order on the can protocol, which was not designed for that.. After much thought, we ended up overriding the default fq_codel qdisc, for a fifo, for the can bus devices, but there were a few years there where fq_codel was the default for can, in openwrt, which sometimes keeps me awake at night. This set of security bugs is bigger and essentially a message flood attack on a FIFO, making it possible to steal a car via accessing the headlamp, using a 10 dollar adaptor. Fascinating reading. https://kentindell.github.io/2023/04/03/can-injection/ -- AMA March 31: https://www.broadband.io/c/broadband-grant-events/dave-taht Dave T=C3=A4ht CEO, TekLibre, LLC