Lucid Sleep Support Is Being Worked On For The Upstream Linux Kernel


Recommended Posts

Chrome OS supports "Lucid Sleep", which is a mode of allowing the system to carry out various tasks while the system is in a low-power mode or even suspended, and similar to Microsoft InstantGo. This feature, which allows for tasks like checking of new emails or instant messages while the system is suspended, is being worked on for (hopeful) eventual upstreaming into the mainline Linux kernel.

Tomeu Vizoso has shared that one of the Chrome OS features he's working to upstream in the mainline Linux kernel is Google's Lucid Sleep. While this could be implemented in user-space alone, Tomeu is working on porting the proper implementation of Lucid Sleep to the upstream Linux kernel.

 

image.php?id=9way-nehalem-broadwell&imag

 

While the work isn't close to being ready for proposing for mainline, those wishing to find out more about Lucid Sleep plans for Linux can read Vizoso's blog post.

 

source

Link to comment
Share on other sites

  • 2 weeks later...

I'm really not comfortable with that prospect. Sure, we like choices, and each to their own how they use their device -- but I really don't like the idea that someone could have a device in that mode.

 

It's ripe for abuse without a user present to stop whatever is happening, since it implies that a user would be away from their workstation/device for an extended period of time (> 1 hour) and the device in question is still somewhat active.

 

So, yeah, potential security issue/attack vector imo.

Link to comment
Share on other sites

I'm really not comfortable with that prospect. Sure, we like choices, and each to their own how they use their device -- but I really don't like the idea that someone could have a device in that mode.

It's ripe for abuse without a user present to stop whatever is happening, since it implies that a user would be away from their workstation/device for an extended period of time (> 1 hour) and the device in question is still somewhat active.

So, yeah, potential security issue/attack vector imo.

That's a pretty paranoid way of looking at it.

The machine is for all intents a purposes, asleep, just able to check things in the background.

Many systems already do similar things.

It's no more a security threat than regular sleep.

Link to comment
Share on other sites

Everything from a GNU/Linux perspective is viewed from a security standpoint. Paranoid? Possibly ... but that's a major reason why I won't use Windows anymore.

 

GNU/Linux isn't perfect, but I work in the IT/Development Industry and I can tell you with absolute certainty that the Microsoft ecosystems have a number of huge security issues right now. A fresh installation of Windows 8.1 can't even be updated in time before it is already compromised -- that's how bad it's become. Antivirus and Antimalware solutions are pretty much ineffective now.

 

It's only a matter of time before GNU/Linux and Mac gets hosed in the same way. The "lucid sleep" feature is another attack vector, in my eyes.

 

It's not Microsoft's fault. They patch whenever they are alerted to a vulnerability, and they do a fantastic job -- the problem is, not all exploits get disclosed and the telemetry data they receive isn't always useful.

  • Like 1
Link to comment
Share on other sites

If we eliminated all the features from an OS based on whether or not it opened an attack vector, we'd still be running everything in a terminal. If you're that paranoid, turn it off, but personally I prefer my OS to be functional.   

Link to comment
Share on other sites

Everything from a GNU/Linux perspective is viewed from a security standpoint. Paranoid? Possibly ... but that's a major reason why I won't use Windows anymore.

 

GNU/Linux isn't perfect, but I work in the IT/Development Industry and I can tell you with absolute certainty that the Microsoft ecosystems have a number of huge security issues right now. A fresh installation of Windows 8.1 can't even be updated in time before it is already compromised -- that's how bad it's become. Antivirus and Antimalware solutions are pretty much ineffective now.

 

It's only a matter of time before GNU/Linux and Mac gets hosed in the same way. The "lucid sleep" feature is another attack vector, in my eyes.

 

It's not Microsoft's fault. They patch whenever they are alerted to a vulnerability, and they do a fantastic job -- the problem is, not all exploits get disclosed and the telemetry data they receive isn't always useful.

 

 

oh the FUD is just dripping form this post... 

 

 

In any case, this is no more or less secure than any other mode, and the alternative is that the computer is just left on all the time. leaving ALL the third party services and applications with their security holes on the computer running ripe for abuse. 

 

Either way as a consumer OS and a OS to be be taken seriously for media boxes and steam boxes and similar it needs this "half sleep" mode. Also Linux doesn't view everything from a security point, that would be BSD. 

 

So if this mode scares you, well disable it then. corporate and enterprise security has already lost by the time the intrusion has reached into the network and to a computer anyway though. 

Link to comment
Share on other sites

"FUD", eh.

 

I'm not talking about Enterprise and Corporate-grade Security. I'm talking about the average user, at home, who will not have the technical expertise to deal with a compromised Windows installation because their "Complete Security Software Suite" (Firewall, Antivirus, Antimalware, Protection-gimmick BS) that they paid $99 for failed them miserably. Their financial information has been stolen, and fraudulent purchases have been made on their credit cards. Their Microsoft and Facebook accounts have been hijacked and are now sending spam messages to all of their contacts, spreading whatever trojan/virii they were infected with. All because of some stupid drive-by installer they picked up from Facebook, EBay, or Cooking.com or some other (supposedly) legitimate website(s) that came from China or Belarus or who-knows-where.

 

"FUD"? Nah, I don't think so. I'm the guy who has to deal with his Mother, Aunt, and the-multiverse-knows how many other friends and loved ones' machines and devices and help them get those messes in order.

 

Let that happen to you and see if I'm paranoid. It's not fun.

Link to comment
Share on other sites

"FUD", eh.

 

I'm not talking about Enterprise and Corporate-grade Security. I'm talking about the average user, at home, who will not have the technical expertise to deal with a compromised Windows installation because their "Complete Security Software Suite" (Firewall, Antivirus, Antimalware, Protection-gimmick BS) that they paid $99 for failed them miserably. Their financial information has been stolen, and fraudulent purchases have been made on their credit cards. Their Microsoft and Facebook accounts have been hijacked and are now sending spam messages to all of their contacts, spreading whatever trojan/virii they were infected with. All because of some stupid drive-by installer they picked up from Facebook, EBay, or Cooking.com or some other (supposedly) legitimate website(s) that came from China or Belarus or who-knows-where.

 

"FUD"? Nah, I don't think so. I'm the guy who has to deal with his Mother, Aunt, and the-multiverse-knows how many other friends and loved ones' machines and devices and help them get those messes in order.

 

Let that happen to you and see if I'm paranoid. It's not fun.

 

 

Oh so you're talking about average users who don't run linux in the first place, and where half sleep is the last possible attack vector you would ever need to worry about...

 

that made your post even more FUD. 

Link to comment
Share on other sites

I apologize if I'm coming across as "fuddy". It's been a very long two weeks for me, as I've been fixing everyone's computers around me almost non-stop (drive-by installers/payloaders from Facebook games .. in terribly translated English) and I'm quite weary of fixing compromised Windows installations. It's interfering with my work that I'm trying to make progress on.

 

The point I'm trying to make is so attack vectors like that cannot occur on GNU/Linux.

 

"Lucid Sleep" (where a device in that mode can receive information from online sources) in my opinion could theoretically be targeted with a "slow trickle upload" that carries a malicious payload and could then be activated when the system is resumed. Safeguards will have to be put into place to ensure that can't happen, and probably it can't happen anyway but it's better to be safe.

 

I have no problem adding features -- but care needs to be taken with something like this. That's all.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.