Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
rjmccall
Sep 7, 2007

no worries friend
Fun Shoe

linus is right: this has to be seen as a hardware bug because it's unreasonable to expect software to just accept it as a new limitation, not when the basic problem is that there are suddenly a million different ways to leak information out of the supervisor/hypervisor despite memory protections. now, hardware bugs happen, so in software you gotta do what you gotta do, but eventually the hardware bug is supposed to get fixed, and when the workaround is as terrible as this one you really want to be able to take advantage of that and getting rid of the workaround, which one reason why you always implement this kind of workaround under a switch. if it turns out that the future hardware hasn't really fixed it then whatever, just flip the switch back

i get why intel doesn't want to say this is a hardware bug. intel does not want to pay to replace every chip they've made in the last twenty-five years. but if they're seriously imagining that they don't have anything to fix, well, it is absolutely the place of people like linus to tell them that they're being dumb as hell, and the only way linus knows how to do that is by throwing a tantrum and threatening to... i don't know what, exactly, it's not like he's going to stop maintaining the x86 port

Adbot
ADBOT LOVES YOU

fishmech
Jul 16, 2006

by VideoGames
Salad Prong
why would Intel need to pay to replace all their chips in the first place though. Ain't like most companies running 2002's hottest P4s would have some sort of contract guaranteeing that level of support

flakeloaf
Feb 26, 2003

Still better than android clock

quote:

WHAT THIS LIMITED WARRANTY DOES NOT COVER:

- design defects or errors in the Product (errata)
- damage to the product or errrors or malfunctions in the Product due to . . . malicious code

hm

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

mrmcd posted:

As long as you don't execute based on pure speculation you should be fine.

Nice

mrmcd posted:

which supposedly has additional hardening, at the cost of ~10-20% more ram usage! :toot:

As if chrome needs another excuse to gobble RAM

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

rjmccall posted:

linus is right: this has to be seen as a hardware bug because it's unreasonable to expect software to just accept it as a new limitation, not when the basic problem is that there are suddenly a million different ways to leak information out of the supervisor/hypervisor despite memory protections. now, hardware bugs happen, so in software you gotta do what you gotta do, but eventually the hardware bug is supposed to get fixed, and when the workaround is as terrible as this one you really want to be able to take advantage of that and getting rid of the workaround, which one reason why you always implement this kind of workaround under a switch. if it turns out that the future hardware hasn't really fixed it then whatever, just flip the switch back

i get why intel doesn't want to say this is a hardware bug. intel does not want to pay to replace every chip they've made in the last twenty-five years. but if they're seriously imagining that they don't have anything to fix, well, it is absolutely the place of people like linus to tell them that they're being dumb as hell, and the only way linus knows how to do that is by throwing a tantrum and threatening to... i don't know what, exactly, it's not like he's going to stop maintaining the x86 port
2018 will be the year of aarch64

The_Franz
Aug 8, 2003

everyone just needs to buy one of those $5000 power9 workstations

rjmccall
Sep 7, 2007

no worries friend
Fun Shoe

i'm just saying intel is extremely skittish about admitting bugs in their chips, for pretty obvious reasons

Proteus Jones
Feb 28, 2013



rjmccall posted:

i'm just saying intel is extremely skittish about admitting bugs in their chips, for pretty obvious reasons

Yeah, their handling of the FDIV bug was incredibly inept.

Notorious b.s.d.
Jan 25, 2003

by Reene

The_Franz posted:

everyone just needs to buy one of those $5000 power9 workstations

those workstation boards are vaporware. never existed.

power is a real threat to intel when it comes to cloud providers though. they don’t have to threaten to eject intel, just threaten to shift the easy workloads over, reducing their total buys

Notorious b.s.d.
Jan 25, 2003

by Reene

Proteus Jones posted:

Yeah, their handling of the FDIV bug was incredibly inept.

looked slick as poo poo to me

they avoided any significant consequences and remained the dominant vendor

wolrah
May 8, 2006
what?

anthonypants posted:

2018 will be the year of aarch64
https://developer.arm.com/support/security-update

The_Franz
Aug 8, 2003

Notorious b.s.d. posted:

those workstation boards are vaporware. never existed.

power is a real threat to intel when it comes to cloud providers though. they don’t have to threaten to eject intel, just threaten to shift the easy workloads over, reducing their total buys

i was being sarcastic, but is ppc actually immune to these attacks or is it just a matter of nobody having checked?

i'm guessing the latter

Stereotype
Apr 24, 2010

College Slice

rjmccall posted:

i'm just saying intel is extremely skittish about admitting bugs in their chips, for pretty obvious reasons

they never will because it isn’t a bug, they mention the behavior in the specifications.

just because it was a bad design choice that in hindsight allows an enormous security vulnerability doesn’t make it a bug.

Farmer Crack-Ass
Jan 2, 2001

this is me posting irl
disallowing javascript and not running code you don't trust should button you up relatively well, right?

Stereotype
Apr 24, 2010

College Slice

Farmer Crack-rear end posted:

disallowing javascript and not running code you don't trust should button you up relatively well, right?

it’s mostly a vulnerability for servers with multiple users or virtual machines, so sure. there’s basically nothing you can do except hope google or amazon or whoever is fixing their servers.

also, if anyone trades stocks, I’d imagine in a few days when this story gets more traction will be a great time to get a deal on intel stock. it’ll get devalued because of this, but will rebound in a month or so when everyone forgets and intel experiences literally no change in profits.

ate shit on live tv
Feb 15, 2004

by Azathoth

anthonypants posted:

i mean, you could read the post on the previous page that explained that the ceo would have made their decision to sell their stock in april of last year, or you could continue to listen to el reg and reddit and hackernews with the rest of the internet, because why would the people on those websites lie to you?

http://www.businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1

quote:

But Krzanich only put that plan in place on October 30, according to the filing. His decision to set up that plan was "unrelated" to information about the security vulnerability, the representative said.

https://www.sec.gov/Archives/edgar/data/50863/000112760217033679/xslF345X03/form4.xml

:thunk:

Heavy_D
Feb 16, 2002

"rararararara" contains the meaning of everything, kept in simple rectangular structures

Subjunctive posted:

the terms of a 10b5-1 filing don’t permit that; doing so voids the protection against presumed insider trading. it’s like the first thing they tell you when you file one

where have you seen this loophole used?

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=941238 states that Blue Chip Stamps led the SEC to believe that they don't have the authority to prevent a cancellation (even though the trades should not be cancellable for the safe harbour to apply)
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=541502&rec=1&srcabs=941238&alg=1&pos=1 believes that there's a pattern to be found in selective cancellation

Wiggly Wayne DDS
Sep 11, 2010



in actual security news and not "i know what insider trading is, shut up with your facts"

https://twitter.com/GossiTheDog/status/948833769963900929

Proteus Jones
Feb 28, 2013



Wiggly Wayne DDS posted:

in actual security news and not "i know what insider trading is, shut up with your facts"

https://twitter.com/GossiTheDog/status/948833769963900929

HAHAHAHAHAHAHA

This is art.

FlapYoJacks
Feb 12, 2009

Wiggly Wayne DDS posted:

in actual security news and not "i know what insider trading is, shut up with your facts"

https://twitter.com/GossiTheDog/status/948833769963900929

All the more reason to not use AV.

bicycle
Oct 23, 2013
hahahaha

akadajet
Sep 14, 2003

ratbert90 posted:

All the more reason to not use AV.

You'll never get patched otherwise.

Shame Boy
Mar 2, 2010

this morning even NPR was jumping on the bandwagon of the intel issue

except they called it MELTDOWNNNNN which I hadn't heard anyone call it until now, i thought the correct term was FUCKWIT :colbert:

Shaggar
Apr 26, 2006

Wiggly Wayne DDS posted:

in actual security news and not "i know what insider trading is, shut up with your facts"

https://twitter.com/GossiTheDog/status/948833769963900929

they should have just uninstalled the AV, patched, and then refused to install incompatible versions after but then people would bitch about Microsoft taking control of their computer!!

Cybernetic Vermin
Apr 18, 2005

ate all the Oreos posted:

this morning even NPR was jumping on the bandwagon of the intel issue

except they called it MELTDOWNNNNN which I hadn't heard anyone call it until now, i thought the correct term was FUCKWIT :colbert:

fuckwit was the linux kernel team term for a solution i think? the wit being "with interrupt trampolines", the trampoline being a piece of code that changes to the right page table and jumps to the correct place (i don't recall the reasoning for the acronym beyond that)

meltdown is indeed the term from the people who came up with that exploit (though perhaps they were the second team to do so?)

Shame Boy
Mar 2, 2010

oh ok

they also said "hack attack" like three or four times, real fast each time, which was fun

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

Wiggly Wayne DDS posted:

in actual security news and not "i know what insider trading is, shut up with your facts"

https://twitter.com/GossiTheDog/status/948833769963900929

Mere days into 2018 and it's already amazing.

Looking forward to Trump's tweet about how The Deep State is responsible for this.

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug
https://twitter.com/paul_pearce/status/948777375281528832

Notorious b.s.d.
Jan 25, 2003

by Reene

The_Franz posted:

i was being sarcastic, but is ppc actually immune to these attacks or is it just a matter of nobody having checked?

i'm guessing the latter

the intel-specific issue is a side channel attack that will dump kernel memory at 500kb/s in their proof of concept. that poo poo is hella exploitable right now today.

the “spectre” thing potentially affects every chip with a branch predictor, but they only got it to work on intel. it looks sufficiently hairy I would be a little surprised if anyone ever got it to do something useful. maybe someone with better assembly chops finds it scarier than I do?

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

James Baud posted:

If you're executing arbitrary code to exploit the side channel, you're already 99% of the way to everything that matters in most of the world.

lol look at this dipshit

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

James Baud posted:

If you're executing arbitrary code to exploit the side channel, you're already 99% of the way to everything that matters in most of the world.

THE SECURITY MODELS BETWEEN DOS AND NT ARE INDISTINGUISHABLE

Notorious b.s.d.
Jan 25, 2003

by Reene

BangersInMyKnickers posted:

lol look at this dipshit

he’s not totally wrong. lotta bare metal applications with a single user account out there in the wild. (of course those guys were never gonna apply an os patch anyway!)

not everything is a web app dude

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

FYI the ms patch seems to have some compatibility issues with certain AV products (seem to be rootkit detection hooks) and those may require an update to avoid blue screens. There are some checks builtin and the patch won't apply unless it has passed a sanity check for some version or component version of the AV software but I dunno how many vendors they coordinated with

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Volmarias posted:

Nice


As if chrome needs another excuse to gobble RAM

no problem we'll just turn memory deduplication on oh wait...

canis minor
May 4, 2011

Things will get interesting in India: http://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details/523361.html

quote:

It took just Rs 500, paid through Paytm, and 10 minutes in which an “agent” of the group running the racket created a “gateway” for this correspondent and gave a login ID and password. Lo and behold, you could enter any Aadhaar number in the portal, and instantly get all particulars that an individual may have submitted to the UIDAI (Unique Identification Authority of India), including name, address, postal code (PIN), photo, phone number and email.

quote:

This correspondent later again approached Anil Kumar to ask for software to print Aadhaar cards. He asked for Rs 300 through Paytm No. 8107888008 (in the name of ‘Raj’). Once paid, a person identifying himself as Sunil Kumar called from mobile number 7976243548, and installed software on this correspondent’s computer by accessing it remotely through “TeamViewer”. Once the job was done, he deleted the software drivers, even from the recycle bin.

Also - regarding the Intel's stocks sale : http://uk.businessinsider.com/intel-ceo-krzanich-sold-shares-after-company-was-informed-of-chip-flaw-2018-1?r=US&IR=T

quote:

But while the public is just being informed about the security problem, tech companies have known about it for months. In fact, Google informed Intel of the vulnerability in June, an Intel representative told Business Insider in a statement.

Cybernetic Vermin
Apr 18, 2005

Notorious b.s.d. posted:

the intel-specific issue is a side channel attack that will dump kernel memory at 500kb/s in their proof of concept. that poo poo is hella exploitable right now today.

the “spectre” thing potentially affects every chip with a branch predictor, but they only got it to work on intel. it looks sufficiently hairy I would be a little surprised if anyone ever got it to do something useful. maybe someone with better assembly chops finds it scarier than I do?

i have no better chops, but the logic behind it seems straightforward enough that it seems like it could become very scary. basically it may be a matter of applying some better blackbox fuzzing techniques to figure out how to get the effects you want in the target process (i.e. on a testbed), and then having a recipe to steal a session cookie or so out of its memory in the real environment

that is, the effort to try to figure out the branch predictor behavior "by hand" may have been the only real issue that kept the poc as modest as it is, but fuzzing techniques can prove very powerful there

the seriousness may just seem less than it is because of how incredibly thorough meltdown pocs are already

Notorious b.s.d.
Jan 25, 2003

by Reene
the spectre thing is really, really slow even under ideal circumstances

I don’t understand how it would ever be useful unless you already knew exactly the target addresses you needed

explain it to me

haveblue
Aug 15, 2005



Toilet Rascal

Notorious b.s.d. posted:

I don’t understand how it would ever be useful unless you already knew exactly the target addresses you needed

explain it to me

these exploits function as smaller modules that can be combined into a larger whole, just like non-evil software libraries. if there aren't known ways to determine those target addresses there may be in the future. this is now a way to get their contents as well

Doccykins
Feb 21, 2006

Cybernetic Vermin posted:

fuckwit was the linux kernel team term for a solution i think? the wit being "with interrupt trampolines", the trampoline being a piece of code that changes to the right page table and jumps to the correct place (i don't recall the reasoning for the acronym beyond that)

meltdown is indeed the term from the people who came up with that exploit (though perhaps they were the second team to do so?)

https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1553070.html posted:

Several people including Linus requested to change the KAISER name.

We came up with a list of technically correct acronyms:

User Address Space Separation, prefix uass_

Forcefully Unmap Complete Kernel With Interrupt Trampolines, prefix fuckwit_

but we are politically correct people so we settled for

Kernel Page Table Isolation, prefix kpti_

Linus, your call :)

Adbot
ADBOT LOVES YOU

Cybernetic Vermin
Apr 18, 2005

Notorious b.s.d. posted:

the spectre thing is really, really slow even under ideal circumstances

I don’t understand how it would ever be useful unless you already knew exactly the target addresses you needed

explain it to me

googles poc for the branch predictor (spectre) case reads 1500 bytes/sec with 10-30 minutes setup, and seeing how all you need is 8-32 bytes for some cookie/certificate you can spend a fair few bytes to figure out where some interesting 32 bytes are

mostly i see no reason to expect that this is even the worst case (though they made the case simple for themselves), as noted google no doubt had to do a lot of tinkering by hand which could be replaced with grinding out a good instruction pattern on a testbed

  • Locked thread