|
If you’re getting Event 69 errors you basically have won at Windows, the next step from here is to try to catch exit code 420 on Linux
|
# ? Jan 1, 2018 08:14 |
|
|
# ? May 19, 2024 17:28 |
|
anthonypants posted:I have no idea where you're getting this information. I posted above, but it was a fever dream confusing Enterprise with LTSB.
|
# ? Jan 1, 2018 13:11 |
|
https://vimeo.com/148946917
|
# ? Jan 1, 2018 17:50 |
|
I'd rather not click to enable adobe flash player, thanks.
|
# ? Jan 1, 2018 18:13 |
2018 is off to a great start, with at least one theory that it's a priv-esc exploit against hypervisor(s) like the ones being used by Amazon and Google.
|
|
# ? Jan 1, 2018 19:54 |
|
|
# ? Jan 1, 2018 20:31 |
|
D. Ebdrup posted:2018 is off to a great start, with at least one theory that it's a priv-esc exploit against hypervisor(s) like the ones being used by Amazon and Google. Amazing
|
# ? Jan 1, 2018 20:39 |
|
Wait. How are VMs supposed to get enough continuous access to the address bus to cause DIMMs to fail? Eventually, another VM is going to do some memory-intensive work.
|
# ? Jan 1, 2018 22:06 |
|
Rexxed posted:I'd rather not click to enable adobe flash player, thanks. https://www.youtube.com/watch?v=7E2w4sTLKtA&t=2s
|
# ? Jan 2, 2018 01:44 |
|
https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/quote:... (much clipped) ... unknown fucked around with this message at 02:31 on Jan 3, 2018 |
# ? Jan 3, 2018 02:28 |
|
The worst part about this vulnerability is that it impacts every Intel CPU, but is going to be drat near impossible to even sum up for non-tech people. High level overviews are still complicated as gently caress.
|
# ? Jan 3, 2018 02:42 |
|
Judge Schnoopy posted:The worst part about this vulnerability is that it impacts every Intel CPU, but is going to be drat near impossible to even sum up for non-tech people. High level overviews are still complicated as gently caress.
|
# ? Jan 3, 2018 02:44 |
|
Judge Schnoopy posted:The worst part about this vulnerability is that it impacts every Intel CPU, but is going to be drat near impossible to even sum up for non-tech people. High level overviews are still complicated as gently caress. its likely a similar flaw impacts at least some ARM chips as well: https://lwn.net/Articles/740393/
|
# ? Jan 3, 2018 03:05 |
|
The more I read about the vulnerability the more I want to exit the technology industry and just watch it all burn from the outside
|
# ? Jan 3, 2018 03:27 |
|
I’m enjoying watching it burn from the inside.
|
# ? Jan 3, 2018 03:34 |
|
CLAM DOWN posted:The more I read about the vulnerability the more I want to exit the technology industry and just watch it all burn from the outside I’m getting out of the managed hosting business in a couple of weeks and let me tell you, seeing this unfold a week after signing the offer letter is just the best feeling. I don’t even want to know what kind of poo poo is going to happen here once the details get revealed.
|
# ? Jan 3, 2018 03:59 |
|
Soooooooo, hypervisors? Tell me if I'm going astray here, my daily interaction with virtualization is largely though an orchestration stack. This is an exploit on the fact that an Intel cpu can be tricked into running a process while supposedly in kernel mode on user memory. The physical kernel on a hypervisor is the hypervisor's own kernel that determines whether (A) a guest's process can run straight on the cpu as is or whether (B) it's a call for privileged functionality that needs to be emulated by the hypervisor kernel or run directly on hardware with a security identifier tagging alongside. So, we have ExploitProcess (EP) running on vm CompromisedGuest (CG). CG and HaplessGuest (HG) are on esxi metal VmwareHost (VH). EP makes a system call that is first prediction bait then "Show me random memory lol" afterward. HG is really a vm whose system call is trapped by VH, which emulates the expected results of the call, and does so with prediction. The cpu goes on to run "show me some random memory" in what should be machine-specific space but isn't because it's not checking whether it should actually be doing this poo poo at all. poo poo in HG is slowly bled. Like, this loving exposes guests to each other, right?
|
# ? Jan 3, 2018 04:45 |
|
Potato Salad posted:
Yes.
|
# ? Jan 3, 2018 04:51 |
|
Okay, this is bad, I get that. What I don’t get is, if you’re running VMs for private use and there’s no direct connection to the WAN, they’re ostensibly safe, right? I’m just trying to figure out the full scope of how hosed this is.
|
# ? Jan 3, 2018 05:04 |
|
Good write up and fits my understanding of the issue as well. Now imagine how big of the deal this is on something like AWS or Azure with potentially thousands of guests on the same hardware. E: Avenging_Mikon posted:Okay, this is bad, I get that. What I don’t get is, if you’re running VMs for private use and there’s no direct connection to the WAN, they’re ostensibly safe, right? The risk is minimized in your scenario, yes.
|
# ? Jan 3, 2018 05:05 |
|
The Fool posted:Good write up and fits my understanding of the issue as well. Thanks. Now tomorrow I’m going to grill our infrastructure team on what lives on what physical host. I know our terminal server is in trouble with this.
|
# ? Jan 3, 2018 05:10 |
|
This has been crossposted a few times as a possibly-related cause for this: https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/ I'm probably not reading this right, but I think what it's saying is that you can probably read kernel memory by using speculative execution to create a race condition where the CPU will load a memory address that triggers a page fault and then load another offset address based on its contents before the page fault goes through, and the contents can be iteratively resolved based on the cache timing.
|
# ? Jan 3, 2018 05:13 |
|
So, bets on the brand name of the vulnerability? My money is on "Give Intel Half A Trillion Dollars This Year As Everyone Rushes To Increase The Raw Amount Of Silicon On Earth By 25% Above Existing Demand Trend"
|
# ? Jan 3, 2018 05:48 |
|
Speculative Hypervisor Ownage by Repeatedly Testing Information Not Typically Expected to Load
|
# ? Jan 3, 2018 05:59 |
|
OneEightHundred posted:Speculative Hypervisor Ownage by Repeatedly Testing Information Not Typically Expected to Load Thread title
|
# ? Jan 3, 2018 06:01 |
|
Too late, ceo already sold a bunch
|
# ? Jan 3, 2018 06:09 |
|
Potato Salad posted:Too late, ceo already sold a bunch AKA the Equifax Platinum Parachute
|
# ? Jan 3, 2018 06:28 |
|
code:
Klyith fucked around with this message at 08:01 on Jan 3, 2018 |
# ? Jan 3, 2018 07:13 |
|
Lol, so much for amd being immune
|
# ? Jan 3, 2018 07:17 |
|
That looks like a separate problem as the processor will probably just fail to resolve addresses in the speculative fetcher and do something undefined -- I would love to know exactly what, but LOL at the magic that is Free Software coding standards; "will explode dangerously" and "bad things happen" like come on now Linux people you can loving comment better than that.
|
# ? Jan 3, 2018 08:10 |
|
Kazinsal posted:That looks like a separate problem as the processor will probably just fail to resolve addresses in the speculative fetcher and do something undefined -- I would love to know exactly what, but LOL at the magic that is Free Software coding standards; "will explode dangerously" and "bad things happen" like come on now Linux people you can loving comment better than that.
|
# ? Jan 3, 2018 08:12 |
|
The Fool posted:Lol, so much for amd being immune They're different bugs, the AMD one is much less severe security-wise. From what I can tell on AMD the malicious user process will hard crash the host machine, including from inside a VM. which is unfortunate but not as bad. Seems that linux at least is applying the the fix globally to all x86 cpus, no matter what. So AMD is gonna get hit by the performance slowdown as well on linux systems. Who knows what the MS patch will do, MS may have been able to target better. Working on a secret embargoed bug in open source is probably a lot harder than having a team of employees who can do the work quietly and behind closed doors.
|
# ? Jan 3, 2018 08:38 |
|
You realize the things you posted are a totally different set of bugs from the "we're introducing page table isolation (with the corresponding performance hit) to mitigate this" intel bug, right?
|
# ? Jan 3, 2018 08:47 |
|
The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.
|
# ? Jan 3, 2018 13:25 |
|
All those admins with a separate 12-year-old Proliant for each application would probably feel quite smug if they kept up with any sort of tech news.
|
# ? Jan 3, 2018 14:14 |
|
Would it be possible to have two verions of the kernel: one for Vee-Emming and one for plain desktop/laptop use? I don't wanna lose up to 30% performance. This is probably a bad idea, but fuckit: hit post.
|
# ? Jan 3, 2018 14:55 |
|
apropos man posted:Would it be possible to have two verions of the kernel: one for Vee-Emming and one for plain desktop/laptop use? I don't wanna lose up to 30% performance. You'd need two separate computers, one with the patch (Whatever it is) installed and the other without the patch installed. Of course I'd refrain from running out and buying poo poo or whatever until the embargo is lifted and we actually find out how big a deal the issue really is.
|
# ? Jan 3, 2018 15:15 |
|
apropos man posted:Would it be possible to have two verions of the kernel: one for Vee-Emming and one for plain desktop/laptop use? I don't wanna lose up to 30% performance. I mean if you control those VMs yourself and know there's nothing bad running in them, it's not a big deal and just use the one? Anyways there's a kernel switch nopti to boot without FUCKWIT, so you just add a new line to your bootloader to avoid it. edit: on linux that is, maybe you're talking about windows.
|
# ? Jan 3, 2018 15:40 |
|
Klyith posted:I mean if you control those VMs yourself and know there's nothing bad running in them, it's not a big deal and just use the one? I was talking about Linux. Thanks for the advice about that kernel parameter. I suppose I've got nothing majorly exposed to the outside world on my server VM's, so it aint a problem. It's the performance drop in desktop use that's really got the potential to piss me off. I just spent £1150 on a brand new Thinkpad and I'm running Fedora on it. I got an i5 because I think an i5 is 'plenty' for Linux. That thought might turn out to bite me. This thing is literally a week old.
|
# ? Jan 3, 2018 15:52 |
|
|
# ? May 19, 2024 17:28 |
|
Linux workstations run clean and efficient. My thoughts and prayers are with you.
|
# ? Jan 3, 2018 17:04 |