Re: Losing Communications with the Mount
Ah, you are referring to buffers in a generic sense. But really, ARM CPUs (which is a huge and widely varied arch) have nothing intrinsic to them that magically makes them more or less susceptible to network attacks. Low power ARM cores are used in a lot of embedded applications so I think this is guilt by association.toggle quoted messageShow quoted text
Embedded systems are certainly and usually more memory constrained and have a more finite amount of space to store connection state, packet data, cached data and information, and all the other stuff that one finds in IP stacks. But there are also modern methods to deal with this exhaustion that doesn't bring down the entire house. Things might get slow, but "don't die" is pretty much the policy of everything since, well, forever.
Luckily, the rapid rise of embedded systems in consumer IoT and networked industrial system have brought a lot of security scrutiny to the common embedded OSes that give these bits of hardware life. The embedded OS vendors have had a LOT of catching up to do, both in terms of their code quality and their policies around opening up to the security community when it comes to reporting and dealing with found security holes. Some are in great shape, others are still stuck in their opaque ways.
On May 6, 2021, at 22:12, Christopher Erickson <firstname.lastname@example.org> wrote: