You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ROS2 threat model document mentions that one of the security issues in ROS2.0 is caused by the malicious node(s).
An attacker deploys a malicious node to the robot. This node performs dangerous movements that compromise safety. The node attempts to perform physical or logical damage to the modules.
It is unclear to me why malicious users are able to deploy a node on your robot (a benign user). Is it that the attacker can deceive you to use a repository containing malicious code? Or could the attacker be a collaborator, sharing access to the robot and thereby having the ability to directly deploy any node?
Are there any cases in which multiple users share a robot (or OS, such as Ubuntu) and can all deploy nodes?
The text was updated successfully, but these errors were encountered:
@lizhi16 The design doc was created 5 years ago, and it is currently difficult to find authors.
From the context, I think that the latter one "Or could the attacker be a collaborator, sharing access to the robot and thereby having the ability to directly deploy any node?" is true.
As regards:
Are there any cases in which multiple users share a robot (or OS, such as Ubuntu) and can all deploy nodes?
Not. At least not directly, as far as I am aware.
However, if the composition manager is running and the attacker has access over the network, he can run some node that is already on the robot and visible with ament_index by using commands like ros2 component load /ComponentManager composition composition::Talker. See details in the https://docs.ros.org/en/foxy/Tutorials/Intermediate/Composition.html.
Greetings,
The ROS2 threat model document mentions that one of the security issues in ROS2.0 is caused by the malicious node(s).
It is unclear to me why malicious users are able to deploy a node on your robot (a benign user). Is it that the attacker can deceive you to use a repository containing malicious code? Or could the attacker be a collaborator, sharing access to the robot and thereby having the ability to directly deploy any node?
Are there any cases in which multiple users share a robot (or OS, such as Ubuntu) and can all deploy nodes?
The text was updated successfully, but these errors were encountered: