Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
rafikki
Mar 8, 2008

I see what you did there. (It's pretty easy, since ducks have a field of vision spanning 340 degrees.)

~SMcD


Burn the entire advertising industry to the ground

Adbot
ADBOT LOVES YOU

Chalks
Sep 30, 2009

maskenfreiheit posted:

cool did this

also i simply don't store any important passwords in there... stuff like the bank or my email pw get manually copied from keepass so i've got that going for me

It's also a good idea to set up a master password for your firefox profile if you've not done so already.

DrPossum
May 15, 2004

i am not a surgeon

rafikki posted:

Burn the entire advertising industry to the ground

this but capitalism in general

geonetix
Mar 6, 2011


rafikki posted:

Burn the entire advertising industry to the ground

EU is on it

Wiggly Wayne DDS
Sep 11, 2010



Wiggly Wayne DDS posted:

Squeezing a key through a carry bit by Sean Devlin, Filippo Valsorda (50:02)
- alt name: "not obviously exploitable", leveraging a rare carry bug (~2^32) to full key recovery. crash course on ecc then p straightforward crypto talk on the bug itself then optimising it to a feasible attack. no real q&a though

Wiggly Wayne DDS posted:

Microarchitectural Attacks on Trusted Execution Environments by Keegan Ryan (55:02)
- do you want to learn about side-channels? this talk is for you then. great introduction to cache attacks focusing on trustzone and sgx. great watch with good q&a

KRACKing WPA2 by Forcing Nonce Reuse by Mathy Vanhoef (61:42)
- corrects some misconceptions on the attack and provides a thorough walkthrough of the attack with issues on specific implementions highlighted. great watch imo, q&a is good too

The Ultimate Apollo Guidance Computer Talk by Michael Steil and Christian Hessmann (61:42)
- another in the ultimate series - fast and dense talk. 60m to learn as much as possible about the apollo guidance computer. must watch imo, no q&a.

Everything you want to know about x86 microcode, but might have been afraid to ask by Benjamin Kollenda and Philipp Koppe (57:25)
- talk is really on reversing microcode updates, then writing arbitrary microcode updates to modify runtime. demo is great as well, must watch. q&a is thorough as well

How to drift with any car by Guillaume Heilles and P1kachu (51:18)
- must watch talk going in depth on reading the can bus and reversing commercially successful fuel improvement tools. good demos and the q&a is gold

Taking a scalpel to QNX by Jos Wetzels and Ali Abbasi (46:18)
- QNX 7: prngs and exploit mitigations. great in-depth talk building on last year that's a must watch. q&a is light

Financial surveillance by Jasmin Klofta and Tom Wills (59:06)
- must watch talk on evaluating a leaked list of WorldCheck and finding their 'reputable sources' for flagging people as terrorists/money launderers. q&a is good as well

LatticeHacks by djb and Tanja Lange and Nadia Heninger (65:56)
- the headline crypto talk of the conference. bit more straightforward than the last few years so great for beginners. must watch, but no time for q&a

Wiggly Wayne DDS posted:

Public FPGA based DMA Attacking by Ulf Frisk (31:27)
- must watch on using pcileech for dma attacks. great demos and presentation, with no real wasted time. q&a is good as well

The Internet in Cuba: A Story of Community Resilience by Will Scott and kopek (58:30)
- must watch talk on networking in cuba, mainly focusing on havana's snet - a rarely discussed community network. q&a is good with few dumb questions

SCADA - Gateway to (s)hell by Thomas Roth (45:09)
- the yearly ics talk. tackles 3 devices with vulnerabilities for them all. must watch, with a great q&a as the speaker buffered for the demos failing
these are the highlight talks imo, there's still great talks outside of these but if you could only watch x talks i'd choose these

geonetix
Mar 6, 2011


https://twitter.com/s1guza/status/947603265700601856

don’t know if it holds any merit but looks woops

maskenfreiheit
Dec 30, 2004

Chalks posted:

It's also a good idea to set up a master password for your firefox profile if you've not done so already.

yes i set up a master password. but firefox asks for that each session then it's fair game?

i turned off the autofill to be extra safe

Chalks
Sep 30, 2009

maskenfreiheit posted:

yes i set up a master password. but firefox asks for that each session then it's fair game?

i turned off the autofill to be extra safe

Yeah, it's not directly related to the issue but it's a really good idea if you're using firefox to manage passwords and it's not an immediately obvious feature.

Podima
Nov 4, 2009

by Fluffdaddy

Wiggly Wayne DDS posted:

as a generic issue it's more about autofilling usernames/passwords so: http://kb.mozillazine.org/Signon.autofillForms

go to auto:config and set signon.autofillforms to false

not 100% as i don't use firefox (nor autofill) but that seems supported by the documentation and no real alternative seems to exist

thanks for this

vOv
Feb 8, 2014

geonetix posted:

https://twitter.com/s1guza/status/947603265700601856

don’t know if it holds any merit but looks woops

i'm on an mbp so i could try it but lol if you think i'm going to

Trabisnikof
Dec 24, 2005

geonetix posted:

https://twitter.com/s1guza/status/947603265700601856

don’t know if it holds any merit but looks woops

lol applescript is the gift that keeps giving

quote:

First, we can try with some AppleScript trickery. loginwindow implements something called “AppleEventReallyLogOut” or “aevtrlgo” for short, which attempts to log the user out without a confirmation dialogue. For reasons of apparent insanity, loginwindow does not seem to verify where this event is coming from, so any unprivileged account such as, say, nobody, can get away with this:

osascript -e 'tell application "loginwindow" to «event aevtrlgo»'

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.


Wiggly Wayne DDS posted:

these are the highlight talks imo, there's still great talks outside of these but if you could only watch x talks i'd choose these

i need to try and find the time to watch these because some of them look interesting even for an idiot such as myself so thanks for the summary!

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Wiggly Wayne DDS posted:

these are the highlight talks imo, there's still great talks outside of these but if you could only watch x talks i'd choose these

Thanks!

cinci zoo sniper
Mar 15, 2013




warning: loud music

https://www.youtube.com/watch?v=vMP6zu38YE4

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug
are
you
READY
for
some
GOD
drat
FOOTBALL???


http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table

quote:

Putting it all together, I would not be surprised if we start 2018 with the release of the mother of all hypervisor privilege escalation bugs, or something similarly systematic as to drive so much urgency, and the presence of so many interesting names on the patch set’s CC list.



Invest in popcorn, 2018 is going to be fun

syscall girl
Nov 7, 2009

by FactsAreUseless
Fun Shoe

yer gosh darn right

https://www.youtube.com/watch?v=ocUUPJOiInI

https://www.youtube.com/watch?v=1AuQRjx13Gk

Max Facetime
Apr 18, 2009

some good talks not already mentioned


The making of a chip by Ari (52 min)

https://www.youtube.com/watch?v=JlshnJjsw8E

Quick talk on what goes into a chip and how to manufacture one. The Q&A is longer than the talk itself and is really what makes this talk. And just as you think it’s over the presenter pulls out what might be the starter for next year’s talk!


Free Electron Lasers by Thorsten (59 min)

https://www.youtube.com/watch?v=RKqof77pKBc

Great talk, great presentation and a good Q&A covering the advances in microscopic imaging, how particle accelerators work and the scales involved, from someone who builds these things. Also a brief glimpse to the prettiest worst UI imaginable.


Dude, you broke the Future! by Charles Stross (57 min)

https://www.youtube.com/watch?v=RmIgJ64z6Y4

Fun talk calling bullshit on Roko’s Basilisk, Singularity and more nerd fetishes, with a little bit of how to be a sci-fi writer, but mainly questioning what sort of machine intelligence are we really building. This talk was a positive surprise to me.

Wiggly Wayne DDS
Sep 11, 2010



yeah there's been rumblings about a generic mmu-based side-channel attack

Isentropy
Dec 12, 2010

Wiggly Wayne DDS posted:

these are the highlight talks imo, there's still great talks outside of these but if you could only watch x talks i'd choose these

the SCADA talk was amazing and terrifying, thank you. i work with some of these devices (but all are airgapped/firewalled/in probably the most secure type of building in North America) on the "closer to the machines/process" side as an ME but vaguely had an idea of how lax security on these devices could be.

leaves me wondering where to learn more about this, and, uh, how lovely security in consumer IoT/Smart devices must be

Malcolm XML
Aug 8, 2009

I always knew it would end like this.
(k)aslr is extremely weak and anyone relying on it to provide any real security is in for a surprise

Carbon dioxide
Oct 9, 2012

https://twitter.com/mubix/status/947866655111204864

Jewel
May 2, 2009

https://twitter.com/PeterNHess/status/947612630499422214

vOv
Feb 8, 2014


is this why they call it fuzzing

pseudorandom name
May 6, 2007

https://lkml.org/lkml/2017/12/27/2

quote:

AMD processors are not subject to the types of attacks that the kernel
page table isolation feature protects against. The AMD microarchitecture
does not allow memory references, including speculative references, that
access higher privileged data when running in a lesser privileged mode
when that access would result in a page fault.

Disable page table isolation by default on AMD processors by not setting
the X86_BUG_CPU_INSECURE feature, which controls whether X86_FEATURE_PTI
is set.

Pikavangelist
Nov 9, 2016

There is no God but Arceus
And Pikachu is His prophet



DrPossum posted:

this but capitalism in general

Raere
Dec 13, 2007


I'm X86_BUG_CPU_INSECURE

Bulgogi Hoagie
Jun 1, 2012

We

well of course they’re still on xp lol

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum
https://twitter.com/grsecurity/status/947439275460702208

Truga
May 4, 2014
Lipstick Apathy
why are grsec people so bad lol

pseudorandom name
May 6, 2007

I'm assuming X86_BUG_CPU_INSECURE is a placeholder until the embargo lifts and then they'll rename it.

possibly relevant: https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/

if I understand this correctly:

if an unprivileged thread loads data from a supervisor page, the CPU will generate a fault

however, Intel CPUs will speculatively execute instructions after the faulting instruction before the fault is generated

this means you can load a value from an arbitrary kernel address and then load data from a userspace address derived from that kernel value, and then even though that kernel read faulted and the value was never given to userspace you can measure the cache timings for a bunch of userspace addresses to figure out what the kernel value was

and because the kernel has all of physical memory mapped, you can read all of the memory in every other hypervisor guest

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Truga posted:

why are grsec people so bad lol
spender did nothing wrong

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

fwiw, this article is "this seemed promising, but didn't end up with any concrete results"

it does seem likely that someone found a way to actually leak useful information with this mechanism, but it's not the way described in this article

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

this PTI kerfuffle is the best thing in ages

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug
Pardon
The
Intrusion

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

:kimchi:

Luigi Thirty
Apr 30, 2006

Emergency confection port.


lol my brother used to keep cash in this plastic toy safe as a childe

he forgot the combination when he found it again so I just smashed it against the floor until it opened

Shame Boy
Mar 2, 2010

when i was a kid i just got a wooden box and then with dad's help put two different padlocks on it so that it was extra safe :smug:

then i forgot the combo to one of them and we had to angle grinder it off

Bulgogi Hoagie
Jun 1, 2012

We
when i was a kid my primary security concern was making sure my cats didn’t poo poo in my lego

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
Oh joy, another CPU bug that requires hardware changes to fix:

https://nixcraft.tumblr.com/post/169209890277/the-mysterious-case-of-the-linux-page-table

quote:

tl;dr: there is presently an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve. Urgent development of a software mitigation is being done in the open and recently landed in the Linux kernel, and a similar mitigation began appearing in NT kernels in November. In the worst case the software fix causes huge slowdowns in typical workloads. There are hints the attack impacts common virtualization environments including Amazon EC2 and Google Compute Engine, and additional hints the exact attack may involve a new variant of Rowhammer.

I don’t really care much for security issues normally, but I adore a little intrigue, and it seems anyone who would normally write about these topics is either somehow very busy, or already knows the details and isn’t talking, which leaves me with a few hours on New Years’ Day to go digging for as much information about this mystery as I could piece together.

Beware this is very much a connecting-the-invisible-dots type affair, so it mostly represents guesswork until such times as the embargo is lifted. From everything I’ve seen, including the vendors involved, many fireworks and much drama is likely when that day arrives.

Adbot
ADBOT LOVES YOU

Shame Boy
Mar 2, 2010


isn't that the one we've been talking about for like the last page or two? i can't tell because everyone seems to be addressing it in the abstract since it's embargoed so there's no real details

  • Locked thread