[Info-vax] Intel x86-64 Processor Design Security Vulnerability?
Jan-Erik Soderholm
jan-erik.soderholm at telia.com
Thu Jan 4 16:58:12 EST 2018
Den 2018-01-04 kl. 21:17, skrev DaveFroble:
> Arne Vajhøj wrote:
>> On 1/4/2018 9:25 AM, DaveFroble wrote:
>>> Camiel Vanderhoeven wrote:
>>>> Op donderdag 4 januari 2018 11:26:28 UTC+1 schreef Johann 'Myrkraverk'
>>>> Oskarsson:
>>>>> already5chosen at yahoo.com wrote:
>>>>>> There are two new methods of attack - Spectre and Meltdown.
>>>>>> Separate page tables only help against Meltdown.
>>>>> For people coming late to the party and aren't fully in on the
>>>>> difference between the two, this is Meltdown:
>>>>>
>>>>> https://twitter.com/misc0110/status/948706387491786752
>>>>>
>>>>> Spectre is harder to exploit, but also harder if not impossible
>>>>> to completely patch in software.
>>>>
>>>> Correct. Meltdown is easier to exploit, and enables data leaks across
>>>> the user mode - kernel mode barrier. This can be patched in the OS.
>>>> Spectre is much harder to exploit, and leaks data across the barrier
>>>> between different processes' user mode (and possibly even from kernel
>>>> mode, but that hasn't been proven). Absent a hardware fix, Spectre
>>>> would require changes to pretty much any and all code - both OS and
>>>> application - to mitigate. Just patching the codepaths that deal with
>>>> sensitive information would not be enough; all code in the
>>>> process-to-be-protected' working set would need to be patched.
>>>
>>> This is all very interesting, and I don't have a clue about how to
>>> actually perform such exploits, nor do I care to know. However, I think
>>> there is still one thing that is essential in performing any such
>>> exploits. One would first need access to the machine.
>>
>> Yes.
>>
>> But:
>> 1) Some systems run multiple applications for multiple users.
>> 2) Even for single application/user context it is bad, because
>> it reduces defense in depth - if the bad guys get in without
>> privs then they can use this to get further in
>>
>> Arne
>>
>>
>
> Ayep, which is why we're all keeping our systems as secure as we can, right?
>
> There are things an architect can do to protect the important things.
>
> For example, I seem to recall mentioning running web servers on separate
> systems. These systems have nothing of value on them. They have static
> data that is provided by the VMS system(s), using service(s). They can
> take customer orders, but then again pass that data to service(s) on the
> VMS system(s). At no time is anyone from outside actually running on the
> VMS system(s).
>
What has a web server to do with "anyone from outside actually running on
the VMS system"? Just becuse a system has web server doesn't give anyone
a way to run their own code. You also need a bug or similar in the web
server. In that way it is no different than any other software package.
> Make it as tough on the bad guys as you can.
>
>
More information about the Info-vax
mailing list