Author Topic: Memory management bug in Intel CPUs threatens massive performance hits.  (Read 46571 times)

0 Members and 1 Guest are viewing this topic.

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/

Lovely for people like me who run an i7-4790k.

Curious to know what this crippling big actually is, but from what was described, I'm about ready to join with the rest of the Intel users here in giving Intel a collective backhand slap to the head.

So the question is now what sort of performance hits could we be seeing...
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline stj

  • Super Contributor
  • ***
  • Posts: 2155
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #1 on: January 03, 2018, 02:33:36 pm »
it's a memory management "bug" that should stop regular code seeing kernel workings - in simple terms.

if fixed in the way they are sugesting the hit will be absolutly huge.
they are talking about flushing the cpu cache every time a user-space thread makes a system call.

keep in mind the cache is what makes a difference between a celeron and a xeon!!!
 
The following users thanked this post: Ampera

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #2 on: January 03, 2018, 02:51:56 pm »
This is a pretty big one and they can't fix it with microcode either.

Interested to see real world load changes before everyone shits the bed however. Either way it's going to cost us a percentage more, particularly on AWS.

Intel CEO knew something was going down as well: https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx
 

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #3 on: January 03, 2018, 03:03:28 pm »
As fix, they reset the Translation lookaside buffer each context switch.

The linux devs called it FUCKWIT  :-DD
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #4 on: January 03, 2018, 03:23:08 pm »
As fix, they reset the Translation lookaside buffer each context switch.

The linux devs called it FUCKWIT  :-DD
Forcefully Unmap Complete Kernel With Interrupt Trampolines
 

Offline Avacee

  • Supporter
  • ****
  • Posts: 299
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #5 on: January 03, 2018, 03:36:14 pm »
Short-term can expect Intel's share price to drop - especially when the class action law suits start.
But I can't help but wonder if Intel's share price will go up in the mid-term as lots of people replace/upgrade their CPU's :p
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #6 on: January 03, 2018, 03:47:14 pm »
Looks like a fix might take a branch prediction rework.  If so, not trivial, and if a fix wasn't already in the works, something like this could take quite some time to fix.

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #7 on: January 03, 2018, 04:14:29 pm »
Looks like it has been exploited already to read kernel memory:

https://twitter.com/brainsmoke/status/948561799875502080

Shit is now officially fucked.
 

Offline JoeO

  • Frequent Contributor
  • **
  • Posts: 527
  • Country: us
  • I admit to being deplorable
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #8 on: January 03, 2018, 04:17:18 pm »
And to think that just today I was reading a post here on the EEVBLOG about how great Intel's processors are compared to AMD's.
The day Al Gore was born there were 7,000 polar bears on Earth.
Today, only 26,000 remain.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #9 on: January 03, 2018, 04:30:10 pm »
They're both as shit as each other. AMD has had a fair number of problems too. If that makes you feel better :)

Really this has been on the cards for a number of years. All current Intel (and AMD) CPUs are pretty much emulators. They are actually a crazy hyper-pipelined RISC microcoded virtual machines that happens to run x86 and x86-64 instructions. The problem here is that most of the bugs you can fix by changing the virtual machine implementation (microcode) but this one is actually in the physical virtual machine implementation at the bottom of the pile of turds. They hire hoards of design verification engineers to make sure that there are no holes in the native and virtual execution environments but this one slipped through. Actually quite a few have slipped through causing everything from random process crashes to big security holes like ASLR bypass.

And this is what happens people when you layer abstractions so deep and so complicated that you require several volumes of books to just explain the ISA and to maintain backwards compatibility to what is fundamentally some crack smoke inspired architecture from the late 1970s.

I hope the hell POWER wins some fans out of this.
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #10 on: January 03, 2018, 05:01:29 pm »
It's still a case of sit back and see how bad shit gets. Hope for the best, expect the worst.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #12 on: January 03, 2018, 06:42:26 pm »
To be clear the problem doesn’t affect ARM as far as anyone knows but the architectural change in Linux is being applied as a “defence in depth” strategy.
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #13 on: January 03, 2018, 06:46:17 pm »
To be clear the problem doesn’t affect ARM as far as anyone knows but the architectural change in Linux is being applied as a “defence in depth” strategy.

AMD patch already submitted:

https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?h=x86/pti&id=694d99d40972f12e59a3696effee8a376b79d7c8

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #14 on: January 03, 2018, 06:53:07 pm »
This is a pretty big one and they can't fix it with microcode either.

Interested to see real world load changes before everyone shits the bed however. Either way it's going to cost us a percentage more, particularly on AWS.

Intel CEO knew something was going down as well: https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx
He wouldn't be that stupid, right? That's how you get torn apart by investigators or even go to jail.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #15 on: January 03, 2018, 06:55:45 pm »
To be clear the problem doesn’t affect ARM as far as anyone knows but the architectural change in Linux is being applied as a “defence in depth” strategy.

AMD patch already submitted:

https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?h=x86/pti&id=694d99d40972f12e59a3696effee8a376b79d7c8

That patch is why AMD ticker shot up today. Whoever fought that deserves a bonus.

This is a pretty big one and they can't fix it with microcode either.

Interested to see real world load changes before everyone shits the bed however. Either way it's going to cost us a percentage more, particularly on AWS.

Intel CEO knew something was going down as well: https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx
He wouldn't be that stupid, right? That's how you get torn apart by investigators or even go to jail.

When it comes to CXO level staff, asking for forgiveness gets you a long way.
 

Offline Lightages

  • Supporter
  • ****
  • Posts: 4314
  • Country: ca
  • Canadian po
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #16 on: January 03, 2018, 06:58:48 pm »
So do I start shopping for a Threadripper right now? Do I disable W7 updates until I get something that isn't going to pulled back to 2010 levels of performance?
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #17 on: January 03, 2018, 07:11:37 pm »
I would sit down and do nothing for now and see what happens. Most of the embargoes are only lifted tomorrow with patches as well so time will tell.
 

Offline Gyro

  • Super Contributor
  • ***
  • Posts: 9504
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #18 on: January 03, 2018, 07:19:22 pm »
This is a pretty big one and they can't fix it with microcode either.

Interested to see real world load changes before everyone shits the bed however. Either way it's going to cost us a percentage more, particularly on AWS.

Intel CEO knew something was going down as well: https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx
He wouldn't be that stupid, right? That's how you get torn apart by investigators or even go to jail.

Combined with this quote from the link that dr.diesel posted...

Quote
Microsoft has been testing the Windows updates in the Insider program since November,

It does look dangerously close to insider trading.  :-\
Best Regards, Chris
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #19 on: January 03, 2018, 08:23:43 pm »
I am hearing anecdotal claims that the effect isn't as bad in 3D workloads as claimed, but it's still yet to be seen.

I don't think it will affect the consumer or even generic power user as much as people who work with hypervizors.

It's definitely a dancing day for AMD, though. With AMD back in the game, who knows if this is going to sink Intel's 5-6 year strong lead.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #20 on: January 03, 2018, 08:30:52 pm »
I am hearing anecdotal claims that the effect isn't as bad in 3D workloads as claimed, but it's still yet to be seen.

I don't think it will affect the consumer or even generic power user as much as people who work with hypervizors.

It's definitely a dancing day for AMD, though. With AMD back in the game, who knows if this is going to sink Intel's 5-6 year strong lead.
AMD was lagging a single digit percentage in performance, but if these percentages turn out to be correct AMD might very well lead by the same margin. I loathe to think what discussions this will cause amongst the fanboys on either side.
 

Online tszaboo

  • Super Contributor
  • ***
  • Posts: 7384
  • Country: nl
  • Current job: ATEX product design
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #21 on: January 03, 2018, 08:36:43 pm »
Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.
 

Offline Monkeh

  • Super Contributor
  • ***
  • Posts: 7992
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #22 on: January 03, 2018, 08:40:31 pm »
Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.

.. no, no, that isn't it.

This is an issue which can potentially allow an unprivileged user-mode process to read kernel memory.
 

Offline pigrew

  • Frequent Contributor
  • **
  • Posts: 680
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #23 on: January 03, 2018, 08:45:43 pm »
Do VM hypervisors normally allow multiple VMs to execute simultaneously (by dividing up cores)?
 

Offline Monkeh

  • Super Contributor
  • ***
  • Posts: 7992
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #24 on: January 03, 2018, 08:49:51 pm »
Do VM hypervisors normally allow multiple VMs to execute simultaneously (by dividing up cores)?

Sure. Or you'd have a VM with one core assigned blocking the whole shebang.
 

Offline NivagSwerdna

  • Super Contributor
  • ***
  • Posts: 2495
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #25 on: January 03, 2018, 08:52:13 pm »
Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.
Nope.  The ASLR leak has been demonstrated from Javascript so any code running from a web page you have visited can exploit MMU timing to resolve the address of kernel mode data structures and subsequently it just needs an exploit for buffer overflow etc or rewriting the stack return address and you are pwned. But ignorance is bliss.

https://www.vusec.net/projects/anc/
 
The following users thanked this post: station240

Offline mikeselectricstuff

  • Super Contributor
  • ***
  • Posts: 13748
  • Country: gb
    • Mike's Electric Stuff
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #26 on: January 03, 2018, 08:54:45 pm »
Is this even an issue for standalone PCs ?
Youtube channel:Taking wierd stuff apart. Very apart.
Mike's Electric Stuff: High voltage, vintage electronics etc.
Day Job: Mostly LEDs
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...

Offline Monkeh

  • Super Contributor
  • ***
  • Posts: 7992
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #28 on: January 03, 2018, 08:57:18 pm »
Is this even an issue for standalone PCs ?

Yes - your applications aren't meant to be able to find the kernel, let alone read it.
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #29 on: January 03, 2018, 09:00:10 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Online PA0PBZ

  • Super Contributor
  • ***
  • Posts: 5127
  • Country: nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #30 on: January 03, 2018, 09:00:50 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

Look what they did there:

Quote
Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively.
Keyboard error: Press F1 to continue.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #31 on: January 03, 2018, 09:04:27 pm »
This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.
They don't seem to be actually saying this. Just conveniently mentioning it together.

Obviously, Intel is in full damage control mode right now. This might be the moment they lose the crown to AMD, especially considering they've taken a few hits in the recent past. There is no way they wouldn't downplay the issue on their side and attempt to shift the focus elsewhere.

Regardless of which party you like more, Intel has shown to be very shrewd and ruthless when it comes to marketing again and again.
 

Online langwadt

  • Super Contributor
  • ***
  • Posts: 4427
  • Country: dk
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #32 on: January 03, 2018, 09:05:36 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.


maybe the Intel guys fixing the bug is overly cautious, or they just don't want AMD to have an advantage, but ...

https://lkml.org/lkml/2017/12/27/2



 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #33 on: January 03, 2018, 09:09:03 pm »
Darn me and my inability to read.

Yeah, this does seem like Intel is starting to freak out. Good.

AMD should take the x86 helm and keep it. Intel has been being a dick about things for way too long. Before now there just wasn't another alternative.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 
The following users thanked this post: JoeO

Offline Cerebus

  • Super Contributor
  • ***
  • Posts: 10576
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #34 on: January 03, 2018, 09:15:07 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.

To quote Mandy Rice-Davies "Well, 'e would [say that], wouldn't he?".

There is no currently extant evidence that this problem affects anyone else, just Intel.

Although the "official" explanation isn't out yet what the problem appears to be is: On Intel's chips that support speculative execution, tests for whether a privilege violation has taken place are delayed until retirement of speculative executions. Thus, say, a speculative read of kernel space by a user process can actually retrieve results from kernel space before being 'caught' by a privilege violation exception rather than being prevented from making the access in the first place. Quite how one exploits that to grab the accessed information before the exception takes place is the tricky bit, but the process of catching the violation after is has actually taken place, as opposed to preventing the violation taking place, is clearly flawed by design.
Anybody got a syringe I can use to squeeze the magic smoke back into this?
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #35 on: January 03, 2018, 09:16:19 pm »
I thought speculative execution was a P5 feature, unless I am thinking of something else.

If that is the case I don't own an Intel chip without it.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #36 on: January 03, 2018, 09:17:24 pm »
https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/

Quote
Think of the kernel as God sitting on a cloud, looking down on Earth. It's there, and no normal being can see it, yet they can pray to it.

And those who have more then a decade old CPU and not religious are safe? This time we can actually see and poke god in his/her eye! :horse:
 

Offline JoeO

  • Frequent Contributor
  • **
  • Posts: 527
  • Country: us
  • I admit to being deplorable
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #37 on: January 03, 2018, 09:23:40 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.
Wow, at least they didn't mention the ATMEGAs.  :)
The day Al Gore was born there were 7,000 polar bears on Earth.
Today, only 26,000 remain.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #38 on: January 03, 2018, 09:27:04 pm »
Some comments and anger.

----

Intel quote "Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."

Fucking bollocks. https://danluu.com/cpu-bugs/ - Intel have a very bad security record when it comes to microcode, Intel ME, horrible Atom bugs, FDIV etc. That's just basically someone saying "hey chaps Chernobyl wasn't all that bad! We've still got the best nuclear power plant in the world. Can you poke the cameras the other way please, away from the blue glow in the windows from the Cherenkov radiation"

Also going back to 2007 (!) Theo de Raadt on x86: https://marc.info/?l=openbsd-misc&m=119318909016582

IA32 and x86-64 are piles of rancid shit. There are people who have left Intel now shitposting about how bad their design verification was and the management team pushing "velocity" because they got urinated upon in the mobile sector

----

Intel quote 2: "Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively."

Fuck them in the ass. What a bunch of spin doctoring cunts. They have literally zero honour dragging AMD and ARM into this. I would be fucking pissed. This could hurt stock and reputation for a potential non issue. That's just evil.

----

Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.

As alluded to in a previous post, this is a privilege escalation bug which allows kernel memory to be read by user processes. There is a proof of concept already demonstrated which is enough to pull vectors out of kernel RAM. This entirely defeats ASLR and entirely deletes the privsep implementation of x86-64. Virtualization via VT-x is another layer of abstraction above this and we don't know exactly how that is affected yet. The big worry with this and me is VMCS shadowing. I am almost 100% sure this is a turd which is going to fall under this. Maybe not for a few months yet. If you look at how the EPT / TLB implementation is, adding IOMMU and virtualization support, it's difficult to consolidate exactly how the hell it all fits together. It's that complicated that it's like the film "the Cube". I don't think any engineering team be it forward engineering or design validation can actually rationally test the whole thing.

Ugh this is a nightmare just unfolding.
 
The following users thanked this post: JoeO, orolo, Mr. Scram

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #39 on: January 03, 2018, 09:28:46 pm »
I think it is fair to assume that every Intel cpu has "NSA inside" with Intel's management engine. :|

Personally, I think owning a computer these days is just a horror show. No privacy, bad security, bad software and what I like to think of as being the police state (what people call 'surveillance state').

Afaik, any catastrophic security flaw involving the management engine has been expected for quite some time now.
« Last Edit: January 03, 2018, 10:02:21 pm by Decoman »
 

Online tszaboo

  • Super Contributor
  • ***
  • Posts: 7384
  • Country: nl
  • Current job: ATEX product design
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #40 on: January 03, 2018, 09:50:35 pm »
Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.

.. no, no, that isn't it.

This is an issue which can potentially allow an unprivileged user-mode process to read kernel memory.
Then either they have more than 1 issue at the same time, or IDK what is going on.
https://www.techpowerup.com/240174/intel-secretly-firefighting-a-major-cpu-bug-affecting-datacenters

Quote
The vulnerability lets users of a virtual machine (VM) access data of another VM on the same physical machine (a memory leak).
Anyway, others write that all x86 is affected, even ARM (sounds bullshit, but possible). We see it in about a week, until that it is all a speculation.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #41 on: January 03, 2018, 09:56:52 pm »
Then either they have more than 1 issue at the same time, or IDK what is going on.

Some people are responding to Xen hypervisor embargoed XSA-253: https://xenbits.xen.org/xsa/ ...

I am currently hating that dealing with all this shit is my hat. I should have migrated to China in the late 1990s and done EE there :)

Also Amazon have started randomly rebooting AWS instances now, probably applying patches. Fun fun fun for me over the next few days.
 

Offline Refrigerator

  • Super Contributor
  • ***
  • Posts: 1542
  • Country: lt
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #42 on: January 03, 2018, 09:58:03 pm »
These look like extra juicy news. I'm looking forward to seeing how this unrolls.   :popcorn:
I have a blog at http://brimmingideas.blogspot.com/ . Now less empty than ever before !
An expert of making MOSFETs explode.
 

Offline Macbeth

  • Super Contributor
  • ***
  • Posts: 2571
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #43 on: January 03, 2018, 09:59:33 pm »
maybe the Intel guys fixing the bug is overly cautious, or they just don't want AMD to have an advantage, but ...

https://lkml.org/lkml/2017/12/27/2
PMSL  :-DD

Code: [Select]
if (c->x86_vendor != X86_VENDOR_AMD)
setup_force_cpu_bug(X86_BUG_CPU_INSECURE);

Enough said. But shit all my CPU's are Intel right now...
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #44 on: January 03, 2018, 10:01:56 pm »
In essence, it's half the people in the industry collectively shitting their pants and the other half waiting to see how bad it stinks.

maybe the Intel guys fixing the bug is overly cautious, or they just don't want AMD to have an advantage, but ...

https://lkml.org/lkml/2017/12/27/2
PMSL  :-DD

Code: [Select]
if (c->x86_vendor != X86_VENDOR_AMD)
setup_force_cpu_bug(X86_BUG_CPU_INSECURE);

Enough said. But shit all my CPU's are Intel right now...

Lol.

I own one Intel CPU that's affected, my main i7-4790k. All others are either AMD or too old to be affected (Pentium 3, Pentium 4, Pentium Pro, basically, I'm all about the Pentiums).

CPUs get more annoying by the day. It's a battle with no victor between people who wish to break down computers for profit and people who want to keep people secure. What it comes down to is people don't care about security, they care about a fast, simple, speedy device, with little else.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #45 on: January 03, 2018, 10:02:28 pm »
That AMD patch enabled this to happen:

 
The following users thanked this post: voltsandjolts

Online amyk

  • Super Contributor
  • ***
  • Posts: 8275
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #46 on: January 03, 2018, 10:27:00 pm »
The link posted before, https://twitter.com/brainsmoke/status/948561799875502080 , is currently the only public demonstration I know, but you can see how it works in general --- if an address has been recently accessed, then it will be in the cache so it will be faster to access than one which hasn't. My guess is that the CPU will do a speculative access and cache the data even if the access turns out to be invalid, altering the timing thereafter.

Intel's response that it's "operating as designed" is because no one ever thought this would be a real problem, and so far it remains to be seen how much of one it really is.
Is this even an issue for standalone PCs ?

Yes - your applications aren't meant to be able to find the kernel, let alone read it.
It depends on what applications you run, and whether you trust them. Obviously if you trust everything running on the CPU, e.g. like in an embedded system, this has little relevance. If you're a cloud provider or user with hardware being shared by dozens if not more users who don't trust each other at all, then it's a big problem.

This also theoretically includes things like Javascript running in browsers, so you need to be careful of any untrusted code running on your system, but if you don't have any, the situation hasn't changed.

It will be interesting to see what happens... :popcorn:
 

Offline station240

  • Supporter
  • ****
  • Posts: 967
  • Country: au
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #47 on: January 03, 2018, 10:31:01 pm »
Speculation that Intel will have to repeat the FDIV bug offer of replacement CPUs.
I can't imagine large data center companies like Amazon not demanding replacement silicon, given how huge the CPU hit is for the workaround for this bug.

Given how much shit Apple got in for slowing down CPUs in iPhones with weak batteries, I cannot imagine consumers being too pleased with Intel either.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #48 on: January 03, 2018, 10:33:44 pm »
If they offered replacements it would destroy them entirely. Watch the corporate wriggling over the next few months.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #49 on: January 03, 2018, 10:39:21 pm »
Speculation that Intel will have to repeat the FDIV bug offer of replacement CPUs.
I can't imagine large data center companies like Amazon not demanding replacement silicon, given how huge the CPU hit is for the workaround for this bug.

Given how much shit Apple got in for slowing down CPUs in iPhones with weak batteries, I cannot imagine consumers being too pleased with Intel either.
Intel never guaranteed performance and the chips still work, so I guess they're off the hook there. A problem with Apple was that they hid it and looked like they were slowing down old hardware to sell new hardware. Intel isn't hiding the problem and not hiding the performance hit.
 

Offline glarsson

  • Frequent Contributor
  • **
  • Posts: 814
  • Country: se
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #50 on: January 03, 2018, 10:46:11 pm »
Indications that Apple fixed this in MacOS 10.13.2 released in December 6, 2017.

https://twitter.com/aionescu/status/948609809540046849

As MacOS use PCID the performance hit is said to be less. No complaints about 10.13.2 anyway ...    :popcorn:
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #51 on: January 03, 2018, 11:08:19 pm »
Intel's PR response:

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

This is rather interesting. I read that this only affects Intel chips, yet Intel is stating it affects AMD and Acorn chips as well.
Intel are some huge dicks. They wrote statement in a sleazy way as if it suggests AMD is affected as well but without actually saying so:
Quote
Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively.

That caused AMD stock dropping a few %, then AMD replied with:
Quote
To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD’s architecture, we believe there is a near zero risk to AMD processors at this time. We expect the security research to be published later today and will provide further updates at that time.
« Last Edit: January 03, 2018, 11:13:52 pm by wraper »
 
The following users thanked this post: Someone, Corporate666, JoeO, bd139

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #52 on: January 03, 2018, 11:32:04 pm »
The details have now been released at https://spectreattack.com/. The Meltdown attack, which is more serious at least in the short term, affects only Intel CPUs, while the Spectre attacks probably affect every processor featuring speculative execution.

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #53 on: January 03, 2018, 11:33:14 pm »
Thanks for the link. Facts have finally dropped!

Also: https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

And oh fuck it is Intel, AMD and ARM. Looks like Intel weren't being dicks after all. Well they were because they shouldn't comment on other vendors.

edit: well one is Intel only.
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #54 on: January 03, 2018, 11:44:23 pm »
Quote
Variant 1: Bounds check bypass
This section explains the common theory behind all three variants and the theory behind our PoC for variant 1 that, when running in userspace under a Debian distro kernel, can perform arbitrary reads in a 4GiB region of kernel memory in at least the following configurations:

Intel Haswell Xeon CPU, eBPF JIT is off (default state)
Intel Haswell Xeon CPU, eBPF JIT is on (non-default state)
AMD PRO CPU, eBPF JIT is on (non-default state)
Apparently the only AMD which tested to be affected are old models running Linux with non default config.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #55 on: January 03, 2018, 11:51:23 pm »
I'm not sure they actually cover every CPU stepping and architecture with the test cases. What would be nice is a red/green test book of what has and hasn't been tested.

Well looks like I'm in for a late night :(
 

Offline Koldman

  • Newbie
  • Posts: 9
  • Country: nz
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #56 on: January 04, 2018, 12:48:10 am »
I don't quite understand the whole thing, but I feel like the kid that saved all his paper route money and bought a new bike only for it to fall apart.
 

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #57 on: January 04, 2018, 01:07:32 am »
Soo are Intel huge dicks or not? 

« Last Edit: January 04, 2018, 01:14:39 am by MT »
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #58 on: January 04, 2018, 01:13:44 am »
Soo are Intel huge dicks or not?
Average  :-DD
 

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #59 on: January 04, 2018, 01:16:20 am »
So Intel are average dicks!? Soooo what are AMD and ARM?
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #60 on: January 04, 2018, 01:19:17 am »
So Intel are average dicks!? Soooo what are AMD and ARM?
Not enough data yet.
 

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #61 on: January 04, 2018, 01:25:40 am »
Ahhh! so in meantime we just go ape shouting "world end is near"! ^-^
« Last Edit: January 04, 2018, 01:28:06 am by MT »
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #62 on: January 04, 2018, 01:34:51 am »
https://www.amd.com/en/corporate/speculative-execution
Quote
Variant One   Bounds Check Bypass   Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two   Branch Target Injection   Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three   Rogue Data Cache Load   Zero AMD vulnerability due to AMD architecture differences.
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #63 on: January 04, 2018, 01:47:14 am »
As I understand it from data currently available, AMD is only affected on Linux with non default configuration.
AMD PRO CPU, eBPF JIT is on (non-default state)
« Last Edit: January 04, 2018, 01:48:50 am by wraper »
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #64 on: January 04, 2018, 01:48:52 am »
ARM have released a white paper, and a list of which of their cores are affected by which issues: https://developer.arm.com/support/security-update

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #65 on: January 04, 2018, 05:00:22 am »
Looks like a fix might take a branch prediction rework.  If so, not trivial, and if a fix wasn't already in the works, something like this could take quite some time to fix.

The problem is speculative execution accessing protected memory.  The fix would be to fault the speculated instructions before they access memory instead of at retirement which is what AMD does by tagging the TLBs so the speculated memory accesses to protected memory do not occur.
 

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #66 on: January 04, 2018, 05:03:48 am »
And this is what happens people when you layer abstractions so deep and so complicated that you require several volumes of books to just explain the ISA and to maintain backwards compatibility to what is fundamentally some crack smoke inspired architecture from the late 1970s.

The problem occurs because of how speculative execution works so it applies to RISC designs as well.  ARM is apparently vulnerable to it but AMD is not because they tag and invalidate their TLBs which prevents this very problem.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #67 on: January 04, 2018, 06:25:52 am »
But AMD CPUs have this Cortex A5 management unit running inside, and since it's part of the security subsystem, I assume it has a higher security clearance. What if the hacker can inject some bad code pieces to the ARM firmware, then using it to attack the ARM, then using the ARM to attach the Zen cores?
The Cortex-A5 is an in-order core, so it is not vulnerable to anything involving speculative execution. Also, these attacks only allow for extracting data, they can't (directly) be used to modify anything.
 
The following users thanked this post: blueskull

Offline Mr.B

  • Supporter
  • ****
  • Posts: 1237
  • Country: nz
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #68 on: January 04, 2018, 07:30:17 am »
Thank you to all the very knowledgeable low level CPU experts here.
This post is just to acknowledge the community experts and bookmark this thread so that I can follow it easily.
The gravity of this situation intrigues me….
The combination of the immense possible damage to Intel and the resulting fallout in the general computing arena, be it attacks or a resultant processing impact due to an OS level patch, cannot be underestimated IMHO.
I approach the thinking of all of my posts using AI in the first instance. (Awkward Irregularity)
 
The following users thanked this post: JoeO

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #69 on: January 04, 2018, 07:30:50 am »
If they offered replacements it would destroy them entirely. Watch the corporate wriggling over the next few months.
Since when is bug present? I read apocalyptic headlines saying two decades, but that seems a bit long.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #70 on: January 04, 2018, 07:38:58 am »
Since when is bug present? I read apocalyptic headlines saying two decades, but that seems a bit long.
I think I read Sandy Bridge and up, which seems to make some sense from an architectural point of view.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #71 on: January 04, 2018, 07:53:29 am »
I think this could go a long way back as suggested. Speculative out of order execution goes back to Pentium Pro if I remember correctly. It would be nice to confirm it either way but the effort required is likely extensive.

You have to ask: how long have the security services known about this?

As an example of where this is heading it looks like we’ve already had patches for AWS deployed quietly. No word from some vendors yet on patch status. I suspect some are as surprised as we are.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #72 on: January 04, 2018, 08:10:46 am »
I think this could go a long way back as suggested. Speculative out of order execution goes back to Pentium Pro if I remember correctly. It would be nice to confirm it either way but the effort required is likely extensive.

You have to ask: how long have the security services known about this?

As an example of where this is heading it looks like we’ve already had patches for AWS deployed quietly. No word from some vendors yet on patch status. I suspect some are as surprised as we are.
There's a huge load of very critical leaks surfacing lately. If you stack those together, you basically have free reign over almost every computer. Intel ME, the various macOS vulnerabilites where you can get root access without much trouble and a few more.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #73 on: January 04, 2018, 08:19:39 am »
Yes indeed. It doesn’t look good for the IT business at all. I have, as someone deeply involved in the security side of things, considered cashing everything I have in and bailing. It’s too bloody stressful keeping the snowflakes covered in piss alive (google “programming sucks” for context of that comment).

There’s a bigger one on the cards as well. While this is confined to a single machine we’re actually running short on viable crypto tech at the moment. The cat and mouse game that is played against ciphers, key exchange and transport layer protocols is currently letting the cat doing some serious catching up...
 

Offline JoeN

  • Frequent Contributor
  • **
  • Posts: 991
  • Country: us
  • We Buy Trannies By The Truckload
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #74 on: January 04, 2018, 09:41:23 am »
Is this even an issue for standalone PCs ?

The Spectre attack can be delivered as Javascript which means some site you go to could deliver it and search your memory for something interesting and phone home.  The attack is actually pretty slow though, I guess maybe it's not likely to find anything, but it can randomly poke around.  Fixing Javascript to disallow it should be easy, though.

https://spectreattack.com/spectre.pdf
https://meltdownattack.com/meltdown.pdf

"The unoptimized code in Appendix A reads approximately 10KB/second on an i7 Surface Pro 3."

The attack is right in this document in C, they don't give a Javascript example, I think for a good reason.

This is Meltdown reading memory from another process:

« Last Edit: January 04, 2018, 09:49:24 am by JoeN »
Have You Been Triggered Today?
 

Offline dmills

  • Super Contributor
  • ***
  • Posts: 2093
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #75 on: January 04, 2018, 10:33:40 am »
The cat and mouse game that is played against ciphers, key exchange and transport layer protocols is currently letting the cat doing some serious catching up...
I thought the underlying math was still safeish for all the work being done on number theoretic sieves and the discrete log problem?

Now attacks on protocols and implementations, that has always been the low hanging fruit when breaking these things, between side channel and just plain broken implementations.... I just LOVE people who write their own crypto.

Regards, Dan.
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #76 on: January 04, 2018, 10:45:34 am »
Is this even an issue for standalone PCs ?

The Spectre attack can be delivered as Javascript which means some site you go to could deliver it and search your memory for something interesting and phone home.  The attack is actually pretty slow though, I guess maybe it's not likely to find anything, but it can randomly poke around.  Fixing Javascript to disallow it should be easy, though.


"Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code." (from the first .pdf)

They say "portable js code" sort of implying it can break any javascript engine sandbox which is hardly believable because no two OS/browser/browser version/cpu/cpu version combos are the same, have the same js engine, nor produce the same code after jitting, etc. The code they show is hand tweaked javascript "Like other optimized JavaScript engines, V8 performs just-in-time compilation to convert JavaScript into ma- chine language. To obtain the x86 disassembly of the JIT output during development, the command-line tool D8 was used. Manual tweaking of the source code lead- ing up to the snippet above was done to get the value of simpleByteArray.length in local memory (instead of cached in a register or requiring multiple instructions to fetch)." hardly "portable" as they say.

"We wrote a JavaScript program that successfully reads data from the address space of the browser process running it." means they could only read the browser's memory space, which is not good but not the same nor as dangerous as "search your memory for something interesting and phone home".

OTOH, I strongly believe, I have no doubt, that ALL the browsers have, on purpose, some sort of very well hidden backdoor to pwn our computers. The keys are either in Apple/Google/Mozilla/Brave/Opera or in the NSA hands. I don't think either that heartbleed was an accident.
The further a society drifts from truth, the more it will hate those who speak it.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #77 on: January 04, 2018, 11:03:01 am »
The cat and mouse game that is played against ciphers, key exchange and transport layer protocols is currently letting the cat doing some serious catching up...
I thought the underlying math was still safeish for all the work being done on number theoretic sieves and the discrete log problem?

Now attacks on protocols and implementations, that has always been the low hanging fruit when breaking these things, between side channel and just plain broken implementations.... I just LOVE people who write their own crypto.

Regards, Dan.

At the moment, yes we're safeish but as always, the transition time between safeish and unsafe gets exponentially shorter. There's a lot of progress in quantum computing which I'm keeping one eye on. There's also some of which we probably can't see and is likely well funded. They're only factoring relatively small numbers now (tangibly brute forceable on traditional compute with an eye shut) but the gains are exponential. That could make the discrete log problem trivial or at least affordable. On a decade scale, shit might be hitting the proverbial fan.

Implementations are easy pickings, especially as everything is written in bloody C still. Also look at logjam as well where the implementation was good but a bad assumption was made on the mathematical side of things (shipping same primes everywhere).

Is this even an issue for standalone PCs ?

The Spectre attack can be delivered as Javascript which means some site you go to could deliver it and search your memory for something interesting and phone home.  The attack is actually pretty slow though, I guess maybe it's not likely to find anything, but it can randomly poke around.  Fixing Javascript to disallow it should be easy, though.


"Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code." (from the first .pdf)

They say "portable js code" sort of implying it can break any javascript engine sandbox which is hardly believable because no two OS/browser/browser version/cpu/cpu version combos are the same, have the same js engine, nor produce the same code after jitting, etc. The code they show is hand tweaked javascript "Like other optimized JavaScript engines, V8 performs just-in-time compilation to convert JavaScript into ma- chine language. To obtain the x86 disassembly of the JIT output during development, the command-line tool D8 was used. Manual tweaking of the source code lead- ing up to the snippet above was done to get the value of simpleByteArray.length in local memory (instead of cached in a register or requiring multiple instructions to fetch)." hardly "portable" as they say.

"We wrote a JavaScript program that successfully reads data from the address space of the browser process running it." means they could only read the browser's memory space, which is not good but not the same nor as dangerous as "search your memory for something interesting and phone home".

OTOH, I strongly believe, I have no doubt, that ALL the browsers have, on purpose, some sort of very well hidden backdoor to pwn our computers. The keys are either in Apple/Google/Mozilla/Brave/Opera or in the NSA hands. I don't think either that heartbleed was an accident.

You may be right. You don't have to look far to find state interference in crypto implementations. Browsers are likely easier targets.

https://en.wikipedia.org/wiki/IPsec#Alleged_NSA_interference
https://en.wikipedia.org/wiki/Bullrun_(decryption_program)
http://blog.erratasec.com/2013/09/tor-is-still-dhe-1024-nsa-crackable.html

... etc etc ...
 
The following users thanked this post: GeorgeOfTheJungle

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #78 on: January 04, 2018, 11:51:58 am »
Summary:

 
The following users thanked this post: Refrigerator

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #79 on: January 04, 2018, 11:59:11 am »
I have now turned Javascript OFF in all browsers, until further notice. youTube no longer works. Bye bye, Dave!
 

Offline Rerouter

  • Super Contributor
  • ***
  • Posts: 4694
  • Country: au
  • Question Everything... Except This Statement
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #80 on: January 04, 2018, 12:13:41 pm »
Dr.Diesel, to better understand, no matter what, 2 of those vulnerabilities are present and unfixable in all affected Intel products, no matter how its patched? or is there ways to avoid it, e.g. the other poster disabling java script.

 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #81 on: January 04, 2018, 12:26:34 pm »
From the linked article below some guy (lol, this was my way of trying to reference a quotation about a quotation ) is referenced as having pointing out the following about Intel's Management Engine:

According to Zammit, the ME:
* has full access to memory (without the parent CPU having any knowledge);
* has full access to the TCP/IP stack;
* can send and receive network packets, even if the OS is protected by a firewall;
* is signed with an RSA 2048 key that cannot be brute-forced; and
* cannot be disabled on newer Intel Core2 CPUs.


https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/

This is the kind of shit that makes me sit here and think I am not really the owner or manager of my own damn computer.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #82 on: January 04, 2018, 12:30:28 pm »
I have now turned Javascript OFF in all browsers, until further notice. youTube no longer works. Bye bye, Dave!

I don't use the browser for youtube! https://rg3.github.io/youtube-dl/

This downloads which are then carted off to my iPhone via VLC and I sit and watch them on the sofa with my headphones on.

I have teenagers and a shitty Internet connection so watching youtube without horrible buffering is off the cards.

This is the kind of shit that makes me sit here and think I am not really the owner or manager of my own damn computer.

You're right. Welcome to serfdom.

Really though, I've got a few Z84C0008 parts, a whole tube of MCM6810P SRAMs, some stripboard and about 50 tubes of TTL ICs here. Build my own shit computer instead!
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #83 on: January 04, 2018, 12:30:32 pm »
Dr.Diesel, to better understand, no matter what, 2 of those vulnerabilities are present and unfixable in all affected Intel products, no matter how its patched? or is there ways to avoid it, e.g. the other poster disabling java script.

Patches are out for Meltdown, comes with a varying performance hit, but looks like Spectre will take a hardware fix, though can be made more difficult to exploit via patches.

Disabling java helps prevent a browser/webpage based attack.

This is still developing, and will lead to interesting speculative execution changes for all players, including AMD i'd bet.

Online tszaboo

  • Super Contributor
  • ***
  • Posts: 7384
  • Country: nl
  • Current job: ATEX product design
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #84 on: January 04, 2018, 12:53:46 pm »
Are you people crazy? It affects Virtual machines that can read from each other. It only affects you, if you are running more than 1 virtual machines on your PC server, and one would run malicious code, specifically designed to attack the other virtual machine. This is only an issue for cloud providers.
99.9999% of PC users are not affected.
Nope.  The ASLR leak has been demonstrated from Javascript so any code running from a web page you have visited can exploit MMU timing to resolve the address of kernel mode data structures and subsequently it just needs an exploit for buffer overflow etc or rewriting the stack return address and you are pwned. But ignorance is bliss.

https://www.vusec.net/projects/anc/
That sounds pretty bad. Also, excecuting data? So any webpage can overtake my PC. Great.
Let's just hope they fix it, the effect is not mayor with normal workload, and they fix Windows 7 also. I dont feel like downgrading my PC to windows 10.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #85 on: January 04, 2018, 01:04:48 pm »
Annoyingly I haven't seen any patches for anything other than Windows 10 and Windows Server 2016 from MSFT. I'm trying to dig through the shitfest of documentation now...

http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892 <-- this is win10 + server 2016
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #86 on: January 04, 2018, 01:10:22 pm »
You're right. Welcome to serfdom.

Well, I have to say it is even worse than that. Given the reach of surveillance and hacking and other terrible things, when nation states targets individuals, the threat is real. I personally don't think I can really travel to USA, nor UK because I have opinions that basically deem these government institutions as being villains. But enough about that. I am confident that I am on some list somewhere, and yet I have done nothing wrong. I never forget that one time some random guy in an irc chat once asked me if I owned a firearm (iirc)and if I was a member of an organization. And the truth was ofc that I had none and weren't in any organization. I like playing Arma 3 (most fun game as multiplayer, but terrible game mechanics, and you can drive ground vehicles and fly helicopters and build bases), and one time, without me even really bringing up any issue at all, this one guy who at one point claimed to be working in the arms industry, suddenly had this urge to start having a personal conversation with me about something vague and talked about causing attention like ripples in the water, and other weird stuff, making me having to now wonder if playing on that one server flagged my other co players in some way. And later when this guy in what I thought was Californian accent (obviously a foreigner) sneaks up on me in this local park and says to me "Don't be scared!" as he passes by on his skateboard, I start to wonder if I ought to get a little paranoid or not.

In the proverbial" perfect world", I am sure I wouldn't be bothered by relying on others for my security, but as it stands today, there is literally nobody to trust the way I see it. Not the local government, certainly not foreign governments, not my browser maker, not even technologists that opine on the matter of the "internet of things", and not all the people that actually work with the design and implementation of anything to do with computers and/or networking and standards. I listened to US congress having a hearing not too long ago about their supposed claims of not being able to read off this one particular mobile phone in a criminal investigation (iirc, after this show and spectacle in that US congress hearing , later it turned out that a company managed to copy the content for the law enforcement), and seeing how a higher Apple representative basically happily bent over and acknowledged the suggestion of discussing the matter further with the committee after the hearing to help out, for me just made any public statements from Apple to the public about how they care about people privacy, now a moot point. Ofc, it should be pointed out that I don't own an Apple product. I don't even own a smart phone, as I have the impression that the new phones aren't very good security wise, and they seem to incorporate various features that acts like streaming user telemetry, which imo would be basically at odds with ones privacy needs.

I am also the kind of guy that repeatedly points out to others that people's notion of 'privacy' tend to be misunderstood. As, it ought to be obvious that the matter at hand would be foremost ones privacy needs, and not as 'a right' as such, which in any case would certainly be limited by the merit of making a definition of privacy, or, just with how the mere expectation of privacy is contested, by simply disallowing expectation of privacy in some arbitrary way.
« Last Edit: January 04, 2018, 01:38:09 pm by Decoman »
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #87 on: January 04, 2018, 01:24:05 pm »
I can't argue with you. It's the same opinion here.

I work on the grey man principle. Cut your life in two. You have the public life and the private life. The public life is in line with expectations. Your private life is offline, entirely.

You will see me mentioning various things like DaveCAD (pen+paper) and using lots of old rancid analogue equipment. This is done not wholly because I enjoy it, which is fortunate that I do, but because being so close to how things really work that I am scared of it. There needs to be a backup plan away from "network dependency".
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #88 on: January 04, 2018, 01:27:52 pm »
I can't argue with you. It's the same opinion here.

I work on the grey man principle. Cut your life in two. You have the public life and the private life. The public life is in line with expectations. Your private life is offline, entirely.

You will see me mentioning various things like DaveCAD (pen+paper) and using lots of old rancid analogue equipment. This is done not wholly because I enjoy it, which is fortunate that I do, but because being so close to how things really work that I am scared of it. There needs to be a backup plan away from "network dependency".
There is no backup plan. Even if you arrange something, others will forcefully take it from you once it becomes of value.
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #89 on: January 04, 2018, 01:33:29 pm »
I think corporations would be the first to be screwed on a general basis.

So I think it makes sense that if you run an important business and have proprietary data, to be kept secret, having no operational security would be bad if having a more or less open computer network system (or bad practices regarding computer security in general, allowing phishing attacks and the like), or allowed people to just walk around the premises, or even inside your home, and even if you hired people randomly with no background checks at all.

I now am reminded of how thieves will steal the entire safe, if the safe is not nailed down. :) It has been said though that locks are only there to slow down trespassers, and not to really prevent entry/theft.
« Last Edit: January 04, 2018, 01:39:11 pm by Decoman »
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #90 on: January 04, 2018, 01:38:06 pm »
Yes that's the biggest concern for me as well.

I am developing an exit strategy at the moment. I don't want to be around the gigantic turd if it goes up in flames.
 

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
« Last Edit: January 04, 2018, 02:16:36 pm by BravoV »
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #92 on: January 04, 2018, 01:51:38 pm »
Its on CNN -> http://money.cnn.com/2018/01/03/technology/computer-chip-flaw-security/index.html

The article states that "Flaws in chips are unusual." I am no expert, but I suspect that this statement is not true as a more objective statement. I've also read that there is a real risk of (any) computer chip being vulnerable to it being doped in a subtle way by an advanced adversary for further manipulating a chip in use, in desired ways.
« Last Edit: January 04, 2018, 01:53:55 pm by Decoman »
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #93 on: January 04, 2018, 01:56:29 pm »
I think corporations would be the first to be screwed on a general basis.

So I think it makes sense that if you run an important business and have proprietary data, to be kept secret, having no operational security would be bad if having a more or less open computer network system (or bad practices regarding computer security in general, allowing phishing attacks and the like), or allowed people to just walk around the premises, or even inside your home, and even if you hired people randomly with no background checks at all.

I now am reminded of how thieves will steal the entire safe, if the safe is not nailed down. :) It has been said though that locks are only there to slow down trespassers, and not to really prevent entry/theft.
We know this to be true when t comes to computers too. Any adversary motivated enough will find a way to gain access. With enough mud thrown, something is bound to stick. You can only make yourself a less interesting target and more painful to hit.
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #94 on: January 04, 2018, 02:47:01 pm »
One thing I've learned about computers, is that it does not matter if the crypto is good, if the implementation is bad. And so, then things get really complicated, and a single wrong character in some piece of code somewhere, can lead to what is called a 'catastrophic failure' with regard to having some expected security.

An important aspect of computer security is probably how allowing physical access to an adversary makes having security more like an impossibility, as the risk of anyone tampering with physical hardware at some location is more like a feature, than a threat model.
« Last Edit: January 04, 2018, 02:49:55 pm by Decoman »
 

Offline Avacee

  • Supporter
  • ****
  • Posts: 299
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #95 on: January 04, 2018, 04:12:36 pm »
Microsoft have started pushing an Out-Of-Band update (ie they aren't waiting until next Patch Tuesday).
https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892

If you are thinking of applying it be sure to read all the known issues - especially the last one regarding Anti-Virus software.
 
The following users thanked this post: JoeO, bd139

Offline Tomorokoshi

  • Super Contributor
  • ***
  • Posts: 1212
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #96 on: January 04, 2018, 05:46:22 pm »
Doctor Who:
Quote
The trouble with computers, of course, is that they're very sophisticated idiots. They do exactly what you tell them at amazing speed, even if you order them to kill you. So if you do happen to change your mind, it's very difficult to stop them obeying the original order, but... not impossible.
 

Offline SaabFAN

  • Frequent Contributor
  • **
  • Posts: 735
  • Country: de
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #97 on: January 04, 2018, 06:14:28 pm »
Doctor Who:
Quote
The trouble with computers, of course, is that they're very sophisticated idiots. They do exactly what you tell them at amazing speed, even if you order them to kill you. So if you do happen to change your mind, it's very difficult to stop them obeying the original order, but... not impossible.
No problem with a TARDIS :)

Wasn't AMD working on something to replace the x86-Architecture for consumer-computers? I remember reading something like that one or two years back. Would be the perfect time to present the new CPU-Architecture now :D

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #98 on: January 04, 2018, 06:34:28 pm »
Doctor Who:
Quote
The trouble with computers, of course, is that they're very sophisticated idiots. They do exactly what you tell them at amazing speed, even if you order them to kill you. So if you do happen to change your mind, it's very difficult to stop them obeying the original order, but... not impossible.
No problem with a TARDIS :)

Wasn't AMD working on something to replace the x86-Architecture for consumer-computers? I remember reading something like that one or two years back. Would be the perfect time to present the new CPU-Architecture now :D

There is so much going on right now in the computing world. New architectures are ALWAYS a great idea. Replacing what everybody is using with a better technology is definitely attractive, but the issue is not only what, but how do we get people to drop their over 35 years of software support on a single platform for something else? Who is going to be able to make enough of a statement for everybody to fight against everybody who WILL want to keep the x86 battleship tanking?

At the moment, there is no consumer oriented processing platform with the same power and app support as x86. ARM has a lot of app support, and POWER has very similar, no pun intended, power, but they just don't mix. I recall watching a computer chronicles episode where they were talking about DEC Alpha, MIPS, and PowerPC machines taking the stage, and asking if the market is going to expand towards them. (It was the episode about the original Pentium if you want to see it) About 25 years later, DEC Alpha is completely dead, MIPS is hard to come by, and PowerPC is completely dead with POWER being resigned to servers and supercomputing tasks.

There have been designs that fix so many problems with x86. Heck, just starting over with x86 and re-implementing a lot of stuff would make the platform WAY better, but the reason why everybody uses x86, and the reason why I can still run the first version of PC-DOS on a Threadripper is because of backwards compatibility with application code. As more and more code is written for x86, we sink deeper into why nobody will change.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline JoeN

  • Frequent Contributor
  • **
  • Posts: 991
  • Country: us
  • We Buy Trannies By The Truckload
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #99 on: January 04, 2018, 07:24:59 pm »
You can use NoScript and leave Javascript turned on for certain sites.  I don't think Youtube is going to send you anything malicious.
Have You Been Triggered Today?
 

Online tszaboo

  • Super Contributor
  • ***
  • Posts: 7384
  • Country: nl
  • Current job: ATEX product design
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #100 on: January 04, 2018, 08:59:25 pm »
https://www.techpowerup.com/240273/intel-aware-of-cpu-flaws-before-ceo-brian-krzanich-planned-usd-24m-stock-sale
Quote
Intel CEO Brian Krzanich sold the maximum amount of shares in the company he could, keeping only the mandatory 250,000 minimum shares that come with his position at Intel. In total, Brian Krzanich's sold shares totaled 245,743 shares of stock he owned outright, and 644,135 shares he got from exercising his options. So, the man sold around 80% of his Intel shares while the company (and he himself, surely) knew the flaw would become public knowledge soon enough
Sounds like insider trading to me.
 

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #101 on: January 05, 2018, 12:17:38 am »
But AMD CPUs have this Cortex A5 management unit running inside, and since it's part of the security subsystem, I assume it has a higher security clearance. What if the hacker can inject some bad code pieces to the ARM firmware, then using it to attack the ARM, then using the ARM to attach the Zen cores?

This would be a big deal but has nothing to do with the exploits being discussed.
 

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #102 on: January 05, 2018, 01:09:07 am »

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #103 on: January 05, 2018, 06:47:15 am »
It works... Intel i7-4710MQ  :(
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #104 on: January 05, 2018, 07:39:41 am »
One thing I've learned about computers, is that it does not matter if the crypto is good, if the implementation is bad. And so, then things get really complicated, and a single wrong character in some piece of code somewhere, can lead to what is called a 'catastrophic failure' with regard to having some expected security.

An important aspect of computer security is probably how allowing physical access to an adversary makes having security more like an impossibility, as the risk of anyone tampering with physical hardware at some location is more like a feature, than a threat model.
Again, like in normal life if they want you, they have you. Obviously, there are many parties out there that collect vast amounts of zero days to use against anyone they please. However, the reality is most of us aren't important enough for zero days. Those are expensive and relatively rare and reserved for state level chess, or as the basis for a large criminal attack. There's bound to be some application or even libraries on your computer you haven't updated and that might be enough. If you somehow dodged that bullet in the most unlikely fashion, there's still social engineering. There are attacks that can catch even very careful people out and if they don't, the customer service of all the services you use aren't so well behaved. You can do everything right and still suffer from someone else's mistakes. There are a couple of well known cases where this happened.

The uncomfortable truth is that when your time has come, you're done. Of course, this applies to regular life too and people prefer to deny that too.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #105 on: January 05, 2018, 08:08:49 am »
You can use NoScript and leave Javascript turned on for certain sites.  I don't think Youtube is going to send you anything malicious.
They won't risk the fallout from doing so in this case, but I don't put it beyond them to not only index your behaviour when you use their software, but your behaviour elsewhere as well. Like a Facebook button, except it's not just your browsing behaviour, but everything you do on your computer. I realize this could be considered tin foil hatty, but it's been shown again and again that companies will overstep boundaries until the law tells them they can't, and even try to get away with as much as they can.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #106 on: January 05, 2018, 08:09:56 am »
Indeed. It’s the “better to ask for forgiveness than permission” argument. Doesn’t wash when EU GDPR kicks in. Seriously large damaging fines for pulling that shit.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #107 on: January 05, 2018, 08:37:37 am »
Indeed. It’s the “better to ask for forgiveness than permission” argument. Doesn’t wash when EU GDPR kicks in. Seriously large damaging fines for pulling that shit.
The GDPR seems a bit overreaching in some areas, but considering the things that have been going on that might just be what's needed. I just hope it isn't used to slap regular IT companies around, while the big parties dance between the raindrops with impunity.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #108 on: January 05, 2018, 08:38:52 am »
It's about shafting the big guys and the finance sector. We're having to move a lot of mountains to make it work.

Looking at 17% loss on everything now with the patches: https://lkml.org/lkml/2018/1/3/281
 

Offline justanothercanuck

  • Frequent Contributor
  • **
  • Posts: 391
  • Country: ca
  • Doing retro repairs...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #109 on: January 05, 2018, 11:16:20 am »
I hope the hell POWER wins some fans out of this.

Not sure if anyone caught this, still reading through the other 4 pages...

https://access.redhat.com/security/vulnerabilities/speculativeexecution

PPC is out too.  I wouldn't be surprised if newer SPARC was also out since they also do branch prediction and/or out-of-order execution, but c'mon...  who owns modern Oracle hardware?  :-//
Maintain your old electronics!  If you don't preserve it, it could be lost forever!
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #110 on: January 05, 2018, 11:38:05 am »
Ah bugger. I had some hopes for POWER.

This dude is still OK!  :-DD

 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #111 on: January 05, 2018, 12:10:40 pm »
Looking at 17% loss on everything now with the patches: https://lkml.org/lkml/2018/1/3/281

Yep. "The impact of this will vary depending on the workload. Every time a program makes a call into the kernel—to read from disk, to send data to the network, to open a file, and so on—that call will be a little more expensive, since it will force the TLB to be flushed and the real kernel page table to be loaded. Programs that don't use the kernel much might see a hit of perhaps 2-3 percent—there's still some overhead because the kernel always has to run occasionally, to handle things like multitasking.

But workloads that call into the kernel a ton will see much greater performance drop off. In a benchmark, a program that does virtually nothing other than call into the kernel saw its performance drop by about 50 percent; in other words, each call into the kernel took twice as long with the patch than it did without. Benchmarks that use Linux's loopback networking also see a big hit, such as 17 percent in this Postgres benchmark. Real database workloads using real networking should see lower impact, because with real networks, the overhead of calling into the kernel tends to be dominated by the overhead of using the actual network"

I wonder if the i5/i7 in a MacBookPro6,1 (running Snow Leopard) is affected by this? Or this only happens on newer cpus?
The further a society drifts from truth, the more it will hate those who speak it.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #112 on: January 05, 2018, 12:28:03 pm »
Snow leopard isn't patched. Only Sierra and High Sierra are.

I just moved two postgres and two nginx nodes over to new kernels. Here we go :D
 
The following users thanked this post: GeorgeOfTheJungle

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #113 on: January 05, 2018, 12:37:14 pm »
Yep. "The impact of this will vary depending on the workload. Every time a program makes a call into the kernel—to read from disk, to send data to the network, to open a file, and so on—that call will be a little more expensive, since it will force the TLB to be flushed and the real kernel page table to be loaded. Programs that don't use the kernel much might see a hit of perhaps 2-3 percent—there's still some overhead because the kernel always has to run occasionally, to handle things like multitasking.

But workloads that call into the kernel a ton will see much greater performance drop off. In a benchmark, a program that does virtually nothing other than call into the kernel saw its performance drop by about 50 percent; in other words, each call into the kernel took twice as long with the patch than it did without. Benchmarks that use Linux's loopback networking also see a big hit, such as 17 percent in this Postgres benchmark. Real database workloads using real networking should see lower impact, because with real networks, the overhead of calling into the kernel tends to be dominated by the overhead of using the actual network"

I wonder if the i5/i7 in a MacBookPro6,1 (running Snow Leopard) is affected by this? Or this only happens on newer cpus?
Any except the most ancient Intel CPU is affected by this. Whatever the case, unless you have a reason to think you're not affected it's likely you are.
 
The following users thanked this post: GeorgeOfTheJungle

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #114 on: January 05, 2018, 01:57:54 pm »
I wonder if the i5/i7 in a MacBookPro6,1 (running Snow Leopard) is affected by this? Or this only happens on newer cpus?
Any except the most ancient Intel CPU is affected by this. Whatever the case, unless you have a reason to think you're not affected it's likely you are.

Snow leopard isn't patched. Only Sierra and High Sierra are.

Ufff, In practice, then, ~ all the PCs in the world are vulnerable? And I'm going to have to abandon my beloved Snow Leopard? Shit.
« Last Edit: January 05, 2018, 02:00:33 pm by GeorgeOfTheJungle »
The further a society drifts from truth, the more it will hate those who speak it.
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #115 on: January 05, 2018, 02:08:43 pm »
Snow leopard isn't patched. Only Sierra and High Sierra are.

Is Sierra patched already? I haven't seen that stated anywhere else yet. I just moved my 'testbed' MBP to 10.13.2 so I can use email/web and shut down my main iMac until the dust settles a bit. But the older Macs that won't run Sierra? Are they just scrap now? I have two PPC macs which run my music library and drive the scanner that HP couldn't be bothered to support on Lion (!). Ill probably have to set up a seperate airgapped cabled network for them now. To say nothing of my father's MBP which is too old for Sierra.

You would have to be mad to buy a computer or phone of any type now or for the next two or three years, without extreme need - although I gather Raspberry Pis of all versions are not affected.
 

Offline Kalvin

  • Super Contributor
  • ***
  • Posts: 2145
  • Country: fi
  • Embedded SW/HW.
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #116 on: January 05, 2018, 02:08:54 pm »
Does this also affect virtualized OSs, like a Linux running in Virtualbox, ie. can the Linux running inside the Virtualbox running on Windows 10 host compromise the Windows 10 host? 
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #117 on: January 05, 2018, 02:12:32 pm »
Does this also affect virtualized OSs, like a Linux running in Virtualbox, ie. can the Linux running inside the Virtualbox running on Windows 10 host compromise the Windows 10 host?

Yes

Basically the hardware protection between privilege levels has been demonstrated not to work.
 
The following users thanked this post: Kalvin

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #118 on: January 05, 2018, 03:05:42 pm »
Does this also affect virtualized OSs, like a Linux running in Virtualbox, ie. can the Linux running inside the Virtualbox running on Windows 10 host compromise the Windows 10 host?
Yep it does.
On a side note, AMD introduced RAM encryption in EPYC which basically makes it immune to this.

 

Offline rrinker

  • Super Contributor
  • ***
  • Posts: 2046
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #119 on: January 05, 2018, 03:06:46 pm »
Does this also affect virtualized OSs, like a Linux running in Virtualbox, ie. can the Linux running inside the Virtualbox running on Windows 10 host compromise the Windows 10 host?

 That is the BIGGEST danger of this and why Microsoft rushed out patching their host systems for their Azure cloud environment ahead of their original planned date.
 Mostly without incident but we've had a few customers with issues where things didn't come up cleanly after the host was restarted under their VM.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #120 on: January 05, 2018, 03:11:39 pm »
Yep it does.
On a side note, AMD introduced RAM encryption in EPYC which basically makes it immune to this.


Until someone works out how to read the keys with it :)
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #121 on: January 05, 2018, 03:11:58 pm »
Does this also affect virtualized OSs, like a Linux running in Virtualbox, ie. can the Linux running inside the Virtualbox running on Windows 10 host compromise the Windows 10 host?
Yep it does.
On a side note, AMD introduced RAM encryption in EPYC which basically makes it immune to this.


If that works properly and sufficiently it might just net them a huge piece of the pie.
 

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #122 on: January 05, 2018, 03:21:27 pm »
If that works properly and sufficiently it might just net them a huge piece of the pie.

Yep, have a friend that works in big corporation at high level, just told me that regarding their company's major servers refresh program that is due this year, the upper management had decided to rule out Intel based servers as they're going to issue a major purchase order for this Q1.

I can imagine similar scenes are also happening and will happen at least for Q1 and Q2 this year throughout the world big companies.

Looks like 2018 is a good year for AMD's CEO Lisa Su at least.

Offline dr.diesel

  • Super Contributor
  • ***
  • Posts: 2214
  • Country: us
  • Cramming the magic smoke back in...
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #123 on: January 05, 2018, 03:32:29 pm »
I plan to do the same, AMD is now competitive enough to suit my/customers needs, but also, Intel needs more competition.

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #124 on: January 05, 2018, 03:39:57 pm »
This is really about two huge security problems.  Fixing them will impact performance on affected HW.

https://spectreattack.com/

>>  https://meltdownattack.com/meltdown.pdf    (Intel specific)

>> https://spectreattack.com/spectre.pdf    (Likely impacts other HW platforms  as well)

Also, several other quite similar other exploits have been discovered recently.

It seems to me that there is likely much more to this and related stories. Time will tell.
« Last Edit: January 05, 2018, 04:21:20 pm by cdev »
"What the large print giveth, the small print taketh away."
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #125 on: January 05, 2018, 03:44:41 pm »
My next main machine will be AMD. Ryzen if there isn't something better out there.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #126 on: January 05, 2018, 03:45:31 pm »
Spectre & Meltdown - Computerphile

The further a society drifts from truth, the more it will hate those who speak it.
 
The following users thanked this post: jolshefsky

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #127 on: January 05, 2018, 04:03:04 pm »
My next main machine will be AMD. Ryzen if there isn't something better out there.
Mine already is, and I use ECC RAM (ECC not officially supported but not locked out either).
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #128 on: January 05, 2018, 04:05:55 pm »
The times they are a changin'
"What the large print giveth, the small print taketh away."
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #129 on: January 05, 2018, 04:10:09 pm »
I plan to do the same, AMD is now competitive enough to suit my/customers needs, but also, Intel needs more competition.
Even without security deliberations, AMD offers a good product at a more than reasonable price. Unlike the previous generations, this seems to be a good choice.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #130 on: January 05, 2018, 04:13:04 pm »
Yeah even I'm looking at a Ryzen based machine to replace my HP Z620. Less power consumption, similar performance, quieter and smaller.

Edit: and not Intel
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #131 on: January 05, 2018, 04:17:28 pm »
Yeah even I'm looking at a Ryzen based machine to replace my HP Z620. Less power consumption, similar performance, quieter and smaller.

Edit: and not Intel
Dat workstation though. Those HP ones tickle me the right way. What processor configuration does yours have?
 

Offline RoGeorge

  • Super Contributor
  • ***
  • Posts: 6202
  • Country: ro
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #132 on: January 05, 2018, 04:20:30 pm »
Spectre & Meltdown - Computerphile



All was clear until the last step.

How exactly are the speculative results extracted?
How come that the speculated values can still leave side effects behind, even after discarding the results?
What are those side effects, and how are they used to access a miss predicted and discarded calculation?

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #133 on: January 05, 2018, 04:39:40 pm »
My next main machine will be AMD. Ryzen if there isn't something better out there.

Damn Intel, already pull the trigger on Ryzen's board just now, its way too early for my budget timing.  |O

Cause our local mobo distributors are really nasty and well known that they love to do price hiking for this kind of occasions. Also locally here mid and upper class motherboard stock are starting to dry out, as usually distributors won't stock pile them as many as compared to low end mainstream ones, and next batch of import may take months to arrive.

Just ordered Asrock X370 Taichi, hopefully this is enough for now.

Offline Kalvin

  • Super Contributor
  • ***
  • Posts: 2145
  • Country: fi
  • Embedded SW/HW.
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #134 on: January 05, 2018, 04:46:09 pm »
How exactly are the speculative results extracted?
How come that the speculated values can still leave side effects behind, even after discarding the results?
What are those side effects, and how are they used to access a miss predicted and discarded calculation?

If I understood the video correctly, the exploits take advantage of the {timing] information whether or not some [injected] value has been cached by the CPU or not, due to the speculative nature of execution of the instructions of the modern CPUs. You just need to make the CPU to fetch some known data from the memory and use the available high resolution on-chip timers to measure how long does it take to execute that data fetch. If the execution time is "fast", the value was cached and if the execution time was "slow" the value was not in the cache. By using this direct timing information one can extract indirectly the wanted information for the exploit.
 

Offline Cerebus

  • Super Contributor
  • ***
  • Posts: 10576
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #135 on: January 05, 2018, 04:46:24 pm »


All was clear until the last step.

How exactly are the speculative results extracted?
How come that the speculated values can still leave side effects behind, even after discarding the results?
What are those side effects, and how are they used to access a miss predicted and discarded calculation?

Cache timings. The speculative fetches leave the fetched data in the cache(s). By requesting something from memory and timing the result, you know whether is was cached or not, so you can probe the cache to see whether it holds something or not, and hence whether it was the target of a speculative fetch.

Mutating that ability into reading data requires a whole layer more and some knowledge of the data you're hunting that allows you to convert 'it was in the cache' to 'its value is x'. The obvious method is to conditionally fetch some forbidden data based on its content; this will fault, but not before it has speculatively executed the condition, which would control the fetch into cache, which gives you knowledge of whether the condition was met or not.

It's pretty easy to see how you could turn that into a binary tree that chases down the current value of forbidden_location.
Anybody got a syringe I can use to squeeze the magic smoke back into this?
 
The following users thanked this post: jolshefsky

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #136 on: January 05, 2018, 04:53:59 pm »
Seeing how there are all these news articles now on the net on this issue with primarily the two critical vulnerabilities nicknamed 'Spectre' and 'Meltdown', I can't help but think how helpless the world is, because at the end of the day, the news outlets seems to me to be more like entertainment than journalism, otherwise I would have wanted to see computer security to be be taken more seriously throughout the whole year, at least on some editorial level, so that there aren't just the occasional horrific event popping up.

And then I think that once reporting of computer security issues becomes this shallow, so as to being more of a public spectacle, I think that also makes the journalism that's is already there non objective, once a journalist makes general statements that maybe seems ok to the journalist there and then, but things considered, would be erroneous when simplifications and generalizations end up being poignant messages that dulls the broader range of issues with anything technical. I suppose that one type of flawed critical thinking would be to arrive at a conclusion of sorts, that dictate that something in particular is flawed (like a known vulnerability in a computer chip), when perhaps it is the underlying feature(s) that can be said to allow catastrophic failures in computer security to exist in the first place. A parallel to this idea of there being a horrible set of features in the first place, would be Adobe's Flash platform, which afaik is so badly tarnished with regard to what I understand as being an ever re-occurring events with 'remote execution vulnerabilities' in the code in the Flash plug-in.

So with regard to the Flash plugin.. some time back, I followed the advice of experts and finally un-installed Flash for good.

I wish anything related to computer software and hardware, was better compartmentalized, and having a perfectly good foundation to have computers running off that. And Linux wouldn't be that kind of software for me, which iirc, is known for working with usability, rather than security. When I one time had an interest in trying out a few Linux distros, the people on IRC seemed to be more like fanboys instead of sensible people, and sort of patting themselves on the back for knowing how to install stuff and set file flags, without really knowing how things work in the kernel. And with Linus living in USA, I feel I can't even trust the management, but that is just me. It didn't help when Linus some years ago was said to have sort of joked in relation to a serious question directed at him, in which it was asked something about if he had ever been approached by the US government to solicit cooperation from him or something like that, and then the man had said 'no', but nodded 'yes'. Not something to joke about.
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #137 on: January 05, 2018, 04:59:46 pm »
As a sort of off-topic comment of sorts, but related to computer security, I can highly recommend watching the yearly talks at the 'RSA conference', called "The cryptographers' panel" (try speaking the word- cryptographers' - out loud). They had previously some guy that used to work for NSA on the panel (iirc a Mr Brian Snow), but NSA hasn't had a representative there on the panel for a couple of years now.

Here's the 2017 one: (Note reference to NSA's "sweet bee" = suite B)


I think I incidentally read today that one of the individuals that worked with discovering one of these two new vulnerabilities is in fact the host guy seen on the very left just above in the still photo for the video. The bearded guy next to last on the right side, is Whitfield Diffie, who is known for being one of the known inventors of the Diffie Helman key exchange. It has also been pointed out that UK's spy agency also discovered this form of secure key exchange around the same point independently.

https://en.wikipedia.org/wiki/Diffie–Hellman_key_exchange
"The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, but in 1997 it was revealed that James H. Ellis, Clifford Cocks and Malcolm J. Williamson of GCHQ, the British signals intelligence agency, had previously[when?] shown how public-key cryptography could be achieved." Wikipedia

Btw, Susan Landau and Whitfield Diffie (both appearing in that video I linked just above), previously coauthored a book together about privacy and computer security (titled "Privacy on the line"), and one interesting point that I remember that was mentioned in the book, is that espionage directly undermines the needed privacy and secrecy between two parties for talks and deals that require there to be a fair agreement. So, if you on your side with espionage learn that the other party are discussing with themselves and agreeing that they will accept an offer of 10 billion $ for something in particular, your party might abuse this piece of private information to undercut the deal, by say offering 9 billion $. So, if you reading this, happen to think that nation state espionage is totally ok, because you expect someone like NSA to acquire such information as simply doing their job, I would argue that you are lauding a type of behavior that is obviously unethical, unjust, unfair, and maybe even criminal in the grand scheme of things.
« Last Edit: January 07, 2018, 10:50:48 am by Decoman »
 

Offline RoGeorge

  • Super Contributor
  • ***
  • Posts: 6202
  • Country: ro
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #138 on: January 05, 2018, 05:18:12 pm »
Still don't get it.

Let's say I have all the timing information, I know if it was a cache fetch or not, and I already tricked the processor into executing the false branch. Now, the speculative execution has finished. The results from the false branch execution are in the cache or in the CPU's registers, but the processor won't give those results to me, because very soon it will discard them all. Those results will be discarded as soon as the processor finds out that the speculative execution was in vain.

How can I read those results before being discarded?

Offline edavid

  • Super Contributor
  • ***
  • Posts: 3383
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #139 on: January 05, 2018, 05:30:34 pm »
Still don't get it.

Let's say I have all the timing information, I know if it was a cache fetch or not, and I already tricked the processor into executing the false branch. Now, the speculative execution has finished. The results from the false branch execution are in the cache or in the CPU's registers, but the processor won't give those results to me, because very soon it will discard them all. Those results will be discarded as soon as the processor finds out that the speculative execution was in vain.

How can I read those results before being discarded?

A protection fault on a speculatively executed load doesn't cause a cache flush.   So, the cached/not cached state is 1 bit of information that is not discarded, and can be read.
 

Offline Cerebus

  • Super Contributor
  • ***
  • Posts: 10576
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #140 on: January 05, 2018, 05:44:51 pm »
Still don't get it.

Let's say I have all the timing information, I know if it was a cache fetch or not, and I already tricked the processor into executing the false branch. Now, the speculative execution has finished. The results from the false branch execution are in the cache or in the CPU's registers, but the processor won't give those results to me, because very soon it will discard them all. Those results will be discarded as soon as the processor finds out that the speculative execution was in vain.

How can I read those results before being discarded?

The computational result isn't stored, but the trace of it having been speculatively calculated is there by it's presence in the cache (albeit with its old, non-speculatively-executed value). If you make that fetching into the cache conditional on some value you aren't supposed to have access to, then that presence in the cache stands as a proxy for the value.

flush X from the cache;
IF forbidden_variable == test_value THEN alter some other value X in a way that loads it into the cache FI
IF X is in the cache THEN implied that forbidden_variable == test_value FI
rinse and repeat
Anybody got a syringe I can use to squeeze the magic smoke back into this?
 

Offline timb

  • Super Contributor
  • ***
  • Posts: 2536
  • Country: us
  • Pretentiously Posting Polysyllabic Prose
    • timb.us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #141 on: January 05, 2018, 06:14:05 pm »
There have been designs that fix so many problems with x86. Heck, just starting over with x86 and re-implementing a lot of stuff would make the platform WAY better, but the reason why everybody uses x86, and the reason why I can still run the first version of PC-DOS on a Threadripper is because of backwards compatibility with application code. As more and more code is written for x86, we sink deeper into why nobody will change.

If the new CPU is sufficiently powerful you could do dynamic translation between x86 and the new architecture, or even outright emulate the x86 for legacy code. The former method could run with only a 10-15% drop in performance for most applications. Anything performance oriented would obviously be recompiled for the new architecture relatively quickly.

So, I don’t think legacy applications are what’s keeping x86 around.

In fact, Apple has undergone this very transition. Twice. They went M68k -> PPC -> x86. It was done both time by incorporating a dynamic translation engine into the OS, along with implementing fat binaries for new software (which would contain both PPC and x86 machine code in the same binary, allowing them to natively execute on either architecture). This worked pretty well for them both times.

(Technically there was a third major transition as well, the one between Mac OS Classic and Mac OS X. They literally replaced the entire OS with one that was completely different. The only bridge between them, software wise, was the Carbon API, created specifically for the purpose. Non-Carbon apps could still be run in OS X via the Classic Environment, which ran a full install of Mac OS 9 in what was, in essence, a bare metal virtual machine. OS/2 used a similar concept. Frankly Microsoft should have used this approach with NT and gotten rid of all the old Windows 9x/3.11 cruft altogether.)
Any sufficiently advanced technology is indistinguishable from magic; e.g., Cheez Whiz, Hot Dogs and RF.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #142 on: January 05, 2018, 06:34:04 pm »
If the new CPU is sufficiently powerful you could do dynamic translation between x86 and the new architecture, or even outright emulate the x86 for legacy code. The former method could run with only a 10-15% drop in performance for most applications. Anything performance oriented would obviously be recompiled for the new architecture relatively quickly.

So, I don’t think legacy applications are what’s keeping x86 around.

In fact, Apple has undergone this very transition. Twice. They went M68k -> PPC -> x86. It was done both time by incorporating a dynamic translation engine into the OS, along with implementing fat binaries for new software (which would contain both PPC and x86 machine code in the same binary, allowing them to natively execute on either architecture). This worked pretty well for them both times.

(Technically there was a third major transition as well, the one between Mac OS Classic and Mac OS X. They literally replaced the entire OS with one that was completely different. The only bridge between them, software wise, was the Carbon API, created specifically for the purpose. Non-Carbon apps could still be run in OS X via the Classic Environment, which ran a full install of Mac OS 9 in what was, in essence, a bare metal virtual machine. OS/2 used a similar concept. Frankly Microsoft should have used this approach with NT and gotten rid of all the old Windows 9x/3.11 cruft altogether.)
The difference is that Microsoft is used much more in professional and corporate settings. Keeping things ultra backwards compatible is part of why they have the market share that they do. Their corporate customers don't like rocking the boat in major way. There's a reason that most of the changes made to Windows 10 can be turned off in the Enterprise and Server editions.
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #143 on: January 05, 2018, 06:36:16 pm »
I wouldn't count on any modern CPU, firmware (or perhaps even OS) being free of these kinds of issues because they may be a feature, not a bug.

ya know..
"What the large print giveth, the small print taketh away."
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #144 on: January 05, 2018, 06:39:14 pm »
I wouldn't count on any modern CPU, firmware (or perhaps even OS) being free of these kinds of issues because they may be a feature, not a bug.

ya know..
Shoo!
 

Offline Richard Crowley

  • Super Contributor
  • ***
  • Posts: 4317
  • Country: us
  • KJ7YLK
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #145 on: January 05, 2018, 06:57:08 pm »
Quote
The majority of Azure customers should not see a noticeable performance impact with this update. We’ve worked to optimize the CPU and disk I/O path and are not seeing noticeable performance impact after the fix has been applied. A small set of customers may experience some networking performance impact. This can be addressed by turning on Azure Accelerated Networking (Windows, Linux), which is a free capability available to all Azure customers. We will continue to monitor performance closely and address customer feedback.
https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/

Quote
There has been speculation that the deployment of KPTI causes significant performance slowdowns. Performance can vary, as the impact of the KPTI mitigations depends on the rate of system calls made by an application. On most of our workloads, including our cloud infrastructure, we see negligible impact on performance
https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html

Quote
All instances across the Amazon EC2 fleet are protected from all known threat vectors from the CVEs previously listed. Customers’ instances are protected against these threats from other instances. We have not observed meaningful performance impact for the overwhelming majority of EC2 workloads.
https://aws.amazon.com/security/security-bulletins/AWS-2018-013/

Quote
...Our testing with public benchmarks has shown that the changes in the December 2017 updates resulted in no measurable reduction in the performance of macOS and iOS as measured by the GeekBench 4 benchmark, or in common Web browsing benchmarks such as Speedometer, JetStream, and ARES-6.

...Analysis of these techniques [Spectre] revealed that while they are extremely difficult to exploit, even by an app running locally on a Mac or iOS device, they can be potentially exploited in JavaScript running in a web browser.
https://support.apple.com/en-us/HT208394
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #146 on: January 05, 2018, 07:04:42 pm »
Marketing bollocks.

Reality: https://lkml.org/lkml/2018/1/3/281

We’re seeing roughly the same.

Cloud vendors are preventing the investor fall out from having to reduce their prices 20% to offset capacity reduction.
 
The following users thanked this post: Mr. Scram

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #147 on: January 05, 2018, 07:15:49 pm »
Anyone thinking that all of this seem a bit complicated and weird, it should be pointed out that nowadays, the encryption on a laptop (some of it I guess) can be broken from recording and analyzing the noise patterns coming from the laptop when measuring the sound with a recording device close by. Pretty obscure stuff.
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #148 on: January 05, 2018, 07:23:33 pm »
This is what worries me most: "can be potentially exploited in JavaScript running in a web browser". Right now, here, as we type...
The further a society drifts from truth, the more it will hate those who speak it.
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #149 on: January 05, 2018, 07:28:05 pm »
I think its not disputed that NSA attempts to get hardware manufacturers to include back doors in hardware. What would be surprising is if there were not any backdoors, not if there were.

I wouldn't count on any modern CPU, firmware (or perhaps even OS) being free of these kinds of issues because they may be a feature, not a bug.

ya know..
Shoo!

And heartbleed was not an accident...
The further a society drifts from truth, the more it will hate those who speak it.
 

Offline Richard Crowley

  • Super Contributor
  • ***
  • Posts: 4317
  • Country: us
  • KJ7YLK
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #150 on: January 05, 2018, 07:35:08 pm »
This is what worries me most: "can be potentially exploited in JavaScript running in a web browser". Right now, here, as we type...

The rest of the paragraph reads....
Quote
...Apple will release an update for Safari on macOS and iOS in the coming days to mitigate these exploit techniques. Our current testing indicates that the upcoming Safari mitigations will have no measurable impact on the Speedometer and ARES-6 tests and an impact of less than 2.5% on the JetStream benchmark. We continue to develop and test further mitigations within the operating system for the Spectre techniques, and will release them in upcoming updates of iOS, macOS, and tvOS. watchOS is unaffected by Spectre.
https://support.apple.com/en-us/HT208394
 
The following users thanked this post: GeorgeOfTheJungle

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #151 on: January 05, 2018, 07:37:00 pm »
I think its not disputed that NSA attempts to get hardware manufacturers to include back doors in hardware. What would be surprising is if there were not any backdoors, not if there were.

I wouldn't count on any modern CPU, firmware (or perhaps even OS) being free of these kinds of issues because they may be a feature, not a bug.

ya know..
Shoo!

And heartbleed was not an accident...

Heartbleed was definitely an accident. Ive written a few things before with exactly the same cock up in it.

Two entire people were responsible for maintain OpenSSL which is the foundation of a big chunk of all public facing crypto on the planet. You can’t expect even the best two people not to miss some fuck ups in a piece of software written in one of the least well defined languages of all time (C).

This is what worries me most: "can be potentially exploited in JavaScript running in a web browser". Right now, here, as we type...

The rest of the paragraph reads....
Quote
...Apple will release an update for Safari on macOS and iOS in the coming days to mitigate these exploit techniques. Our current testing indicates that the upcoming Safari mitigations will have no measurable impact on the Speedometer and ARES-6 tests and an impact of less than 2.5% on the JetStream benchmark. We continue to develop and test further mitigations within the operating system for the Spectre techniques, and will release them in upcoming updates of iOS, macOS, and tvOS. watchOS is unaffected by Spectre.
https://support.apple.com/en-us/HT208394
This is because the timers in JS have enough resolution to be able to reduce cache read times. They are merely removing timer resolution. Firefox has already done this as of v57.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #152 on: January 05, 2018, 07:38:51 pm »
On the matter of virtualisation, it’s a hack in x86. Also:

https://marc.info/?l=openbsd-misc&m=119318909016582
 

Offline RoGeorge

  • Super Contributor
  • ***
  • Posts: 6202
  • Country: ro
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #153 on: January 05, 2018, 07:45:09 pm »
Still don't get it.
....
How can I read those results before being discarded?

The computational result isn't stored, but the trace of it having been...

Just finished reading the original paper for Meltdown, https://meltdownattack.com/meltdown.pdf. The video does its best, but it was not enough, and yes, the vulnerability is as bad as it can be.

The attack is very clever indeed, but I found the paper totally worth reading it not only for describing the attack, but especially for describing the principles about speculative execution and out of order execution in general, and Intel implementation in special.
« Last Edit: January 05, 2018, 07:52:20 pm by RoGeorge »
 

Offline Corporate666

  • Supporter
  • ****
  • Posts: 2009
  • Country: us
  • Remember, you are unique, just like everybody else
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #154 on: January 05, 2018, 08:09:59 pm »
Yes indeed. It doesn’t look good for the IT business at all. I have, as someone deeply involved in the security side of things, considered cashing everything I have in and bailing. It’s too bloody stressful keeping the snowflakes covered in piss alive (google “programming sucks” for context of that comment).

Sorry for derailing the thread topic a bit, but as (primarily) a business guy myself who started out as a technical guy (software, the mechanical engineering, then electronics) - the above comment sounds like music to my ears, from a business standpoint.   In other words, you are an expert in a field that is full of fast-paced change, commotion and where there are always new emergencies and endless numbers of "snowflake" clients who need fires put out and assurances given.  That sounds like a recipe for high income, being able to be picky about who you take on as clients, and essentially shooting fish in a barrel.  What makes you want to cash out your chips and get out?  The stress? 
It's not always the most popular person who gets the job done.
 

Offline JoeN

  • Frequent Contributor
  • **
  • Posts: 991
  • Country: us
  • We Buy Trannies By The Truckload
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #155 on: January 05, 2018, 08:30:32 pm »
How exactly are the speculative results extracted?
How come that the speculated values can still leave side effects behind, even after discarding the results?
What are those side effects, and how are they used to access a miss predicted and discarded calculation?

If I understood the video correctly, the exploits take advantage of the {timing] information whether or not some [injected] value has been cached by the CPU or not, due to the speculative nature of execution of the instructions of the modern CPUs. You just need to make the CPU to fetch some known data from the memory and use the available high resolution on-chip timers to measure how long does it take to execute that data fetch. If the execution time is "fast", the value was cached and if the execution time was "slow" the value was not in the cache. By using this direct timing information one can extract indirectly the wanted information for the exploit.

The analogy I am using for non-technical people is the CPU basically has a gambler's "tell".  The gambler won't tell you his card, each time you ask him if it is a deuce or a three or a four or what he says "piss off".  But unfortunately for him, he says it a lot faster when you actually asked the right question.
Have You Been Triggered Today?
 

Offline raptor1956

  • Frequent Contributor
  • **
  • Posts: 869
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #156 on: January 05, 2018, 08:40:24 pm »
So, what are the odds that the NSA and GCHQ and many other government signals intelligence operations were unaware of this?  Wanna bet these exploits are in current use by some of the above?


Brian
 

Offline mtdoc

  • Super Contributor
  • ***
  • Posts: 3575
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #157 on: January 05, 2018, 08:50:28 pm »
The ironic thing is that while this is may cause a brief hit to Intel's rep, in the end it probably means selling a whole bunch of new chips. 

And new computer sales for Apple, HP, Dell,  etc, etc. which means new sales for storage, memory and other peripheral makers...

Based on the stocks reaction today, I think the market may be coming to realize this.

Maybe they can just make all computers disposable with a 1 year shelf life - that'll  keep the tech market pumping... ::)
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #158 on: January 05, 2018, 08:52:00 pm »
Yes indeed. It doesn’t look good for the IT business at all. I have, as someone deeply involved in the security side of things, considered cashing everything I have in and bailing. It’s too bloody stressful keeping the snowflakes covered in piss alive (google “programming sucks” for context of that comment).

Sorry for derailing the thread topic a bit, but as (primarily) a business guy myself who started out as a technical guy (software, the mechanical engineering, then electronics) - the above comment sounds like music to my ears, from a business standpoint.   In other words, you are an expert in a field that is full of fast-paced change, commotion and where there are always new emergencies and endless numbers of "snowflake" clients who need fires put out and assurances given.  That sounds like a recipe for high income, being able to be picky about who you take on as clients, and essentially shooting fish in a barrel.  What makes you want to cash out your chips and get out?  The stress? 

You’re right about the recipe. I am however entirely immune to stress. I’m the sort of person who sits there leisurely eating a Cornish pasty while the world burns around me. You don’t solve any problems by getting stressed. Occasionally smashing something that has smited you is recommended however (hat tip to Mr Widlar  for that one)

The problem is my brain. I can see the whole abstraction of the machine in my mind, vast networks spanning thousands of nodes and zoom in and out right down to individual components and even lines of code. I can feel it breathing, see where it is sick, see data flows and bottlenecks instantly. I’m sure any programmer understands the moment this clicks (and then the moment someone taps on your shoulder and it all goes away in a puff of smoke).

Problem is none of this really exists and is changing so fast and this screws your mind up over time. Unlike a JVM, you don’t have a garbage collector up there. Makes you sick. Sometimes I just phase out unable to switch between the two worlds.  It requires so much space that it pushes things that are important out. My wife can recall so many things going back 20 years. I can’t. Even some memories of my children are vague when they were very young. I attribute this to information overload. Now I can remember which methods to call on windows workflow foundation SQL persistence engine to get it to dance like the monkey it is but this is of no value now as the information is transient as I haven’t used it for nearly 8 years.

Some people attribute this to burn out but it’s something different and far more worrying. I know a few people who have bailed already on this basis. One guy even went mental and shit on his bosses chair and threw himself under a bus, which uneventfully stopped before it ran him over and the driver called an ambulance. Most people I work with are addicts of some kind also.

Ergo I suppose I worry about a cross of mental health and the value of the information I am processing over time. It’s not good for you.

Therefore I’m  taking the cash I need out as quickly as possible and filling what precious time and headspace I have with things I care about.

And there you have it.
 

Offline Corporate666

  • Supporter
  • ****
  • Posts: 2009
  • Country: us
  • Remember, you are unique, just like everybody else
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #159 on: January 05, 2018, 09:25:00 pm »
Yes indeed. It doesn’t look good for the IT business at all. I have, as someone deeply involved in the security side of things, considered cashing everything I have in and bailing. It’s too bloody stressful keeping the snowflakes covered in piss alive (google “programming sucks” for context of that comment).

Sorry for derailing the thread topic a bit, but as (primarily) a business guy myself who started out as a technical guy (software, the mechanical engineering, then electronics) - the above comment sounds like music to my ears, from a business standpoint.   In other words, you are an expert in a field that is full of fast-paced change, commotion and where there are always new emergencies and endless numbers of "snowflake" clients who need fires put out and assurances given.  That sounds like a recipe for high income, being able to be picky about who you take on as clients, and essentially shooting fish in a barrel.  What makes you want to cash out your chips and get out?  The stress? 

You’re right about the recipe. I am however entirely immune to stress. I’m the sort of person who sits there leisurely eating a Cornish pasty while the world burns around me. You don’t solve any problems by getting stressed. Occasionally smashing something that has smited you is recommended however (hat tip to Mr Widlar  for that one)

The problem is my brain. I can see the whole abstraction of the machine in my mind, vast networks spanning thousands of nodes and zoom in and out right down to individual components and even lines of code. I can feel it breathing, see where it is sick, see data flows and bottlenecks instantly. I’m sure any programmer understands the moment this clicks (and then the moment someone taps on your shoulder and it all goes away in a puff of smoke).

Problem is none of this really exists and is changing so fast and this screws your mind up over time. Unlike a JVM, you don’t have a garbage collector up there. Makes you sick. Sometimes I just phase out unable to switch between the two worlds.  It requires so much space that it pushes things that are important out. My wife can recall so many things going back 20 years. I can’t. Even some memories of my children are vague when they were very young. I attribute this to information overload. Now I can remember which methods to call on windows workflow foundation SQL persistence engine to get it to dance like the monkey it is but this is of no value now as the information is transient as I haven’t used it for nearly 8 years.

Some people attribute this to burn out but it’s something different and far more worrying. I know a few people who have bailed already on this basis. One guy even went mental and shit on his bosses chair and threw himself under a bus, which uneventfully stopped before it ran him over and the driver called an ambulance. Most people I work with are addicts of some kind also.

Ergo I suppose I worry about a cross of mental health and the value of the information I am processing over time. It’s not good for you.

Therefore I’m  taking the cash I need out as quickly as possible and filling what precious time and headspace I have with things I care about.

And there you have it.

Understood completely.  I have exactly the same situation.   I have a few different technical areas I work in at my job which are quite separate and different and require a lot of time to keep technically proficient in.  I really enjoy each of these different fields, but juggling all of that plus running a business and all the associated tasks including manufacturing/production means I always have a million things going on.  I joke that I have the memory of a goldfish - I forget everything that happened more than 2 minutes ago.  I use precisely the same description as you - that so much data goes into my brain constantly that most stuff gets squeezed out, leaving me forgetting many things most other people remember.

I don't have a wife/kids but I can definitely see how others would feel you are not "present" enough with them when you suffer from such information overload that you don't recall things and they feel it indicates a lack of care.  It doesn't, I know, but I am sure it can appear that way to others.

Well, cheers to you mate for recognizing it as a potential issue and addressing it.  Takes a solid husband and father to do so.  My respect.

It's not always the most popular person who gets the job done.
 
The following users thanked this post: bd139

Offline floobydust

  • Super Contributor
  • ***
  • Posts: 6987
  • Country: ca
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #160 on: January 05, 2018, 10:46:47 pm »
Linus Torvald called it out:

...
> Any speculative indirect calls in the kernel can be tricked
> to execute any kernel code, which may allow side channel
> attacks that can leak arbitrary kernel data.

"Why is this all done without any configuration options?

A *competent* CPU engineer would fix this by making sure speculation doesn't happen across protection domains. Maybe even a L1 I$ that is keyed by CPL.

I think somebody inside of Intel needs to really take a long hard look at their CPU's, and actually admit that they have issues instead of writing PR blurbs that say that everything works as designed.

.. and that really means that all these mitigation patches should be written with "not all CPU's are crap" in mind.

Or is Intel basically saying "we are committed to selling you shit forever and ever, and never fixing anything"?

Because if that's the case, maybe we should start looking towards the ARM64 people more.

Please talk to management. Because I really see exactly two possibilities:

 - Intel never intends to fix anything

OR

 - these workarounds should have a way to disable them.

Which of the two is it?"

                   Linus

https://lkml.org/lkml/2018/1/3/797
« Last Edit: January 05, 2018, 11:04:13 pm by floobydust »
 

Online nctnico

  • Super Contributor
  • ***
  • Posts: 26906
  • Country: nl
    • NCT Developments
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #161 on: January 05, 2018, 11:10:17 pm »
Some people attribute this to burn out but it’s something different and far more worrying. I know a few people who have bailed already on this basis. One guy even went mental and shit on his bosses chair and threw himself under a bus, which uneventfully stopped before it ran him over and the driver called an ambulance. Most people I work with are addicts of some kind also.

Ergo I suppose I worry about a cross of mental health and the value of the information I am processing over time. It’s not good for you.
What helps is to take up a hobby which doesn't need much thinking but keeps you busy. I'm not a sports person at all but I took up swimming a couple of years ago and it helps to clear&organise my mind.
There are small lies, big lies and then there is what is on the screen of your oscilloscope.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #162 on: January 05, 2018, 11:26:03 pm »
I think its not disputed that NSA attempts to get hardware manufacturers to include back doors in hardware. What would be surprising is if there were not any backdoors, not if there were.
Nobody's disputing this, but this thread is not about that. Neither are all the other threads you insist on making into conspiracy stories. My remark was about the continuous pushing of your agenda and derailing of threads.

Don't get me wrong, you seem like a nice guy I could have a drink with, but the persistence is tiring.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #163 on: January 05, 2018, 11:28:29 pm »
Anyone thinking that all of this seem a bit complicated and weird, it should be pointed out that nowadays, the encryption on a laptop (some of it I guess) can be broken from recording and analyzing the noise patterns coming from the laptop when measuring the sound with a recording device close by. Pretty obscure stuff.
Do you have a link? I think that's the kind of side channel attack that gets a fair bit of attention in regards to mitigation. Of course, an infected laptop could send out intentional sounds or signals that can be used to break encryption. That's a given, but you need to have a foothold already and in those cases you generally have more effective methods to extract data.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #164 on: January 05, 2018, 11:35:13 pm »
Some people attribute this to burn out but it’s something different and far more worrying. I know a few people who have bailed already on this basis. One guy even went mental and shit on his bosses chair and threw himself under a bus, which uneventfully stopped before it ran him over and the driver called an ambulance. Most people I work with are addicts of some kind also.

Ergo I suppose I worry about a cross of mental health and the value of the information I am processing over time. It’s not good for you.
What helps is to take up a hobby which doesn't need much thinking but keeps you busy. I'm not a sports person at all but I took up swimming a couple of years ago and it helps to clear&organise my mind.

Agree entirely. Exercise is a winner every time as well. I’m not a sports person but I found I really like running. Unfortunately this makes me hungry so I ran about 7 miles earlier this week then went in KFC on the way back and consumed my body weight in chicken  :palm:

Anyone thinking that all of this seem a bit complicated and weird, it should be pointed out that nowadays, the encryption on a laptop (some of it I guess) can be broken from recording and analyzing the noise patterns coming from the laptop when measuring the sound with a recording device close by. Pretty obscure stuff.
Do you have a link? I think that's the kind of side channel attack that gets a fair bit of attention in regards to mitigation. Of course, an infected laptop could send out intentional sounds or signals that can be used to break encryption. That's a given, but you need to have a foothold already and in those cases you generally have more effective methods to extract data.

Rubber hose cryptography is better in this situation

Then again this problem predates computers. My wife’s grandfather was the designer of “quiet rooms” used by the British government around the Cold War era. They, even in the 1960s has worked out you could listen in on conversations by listening to the sounds transmitted through heating pipes in and out of the rooms. They even had rudimentary expertise on deciphering chunks of documents that were being typed from recordings by “golden eared” experts of the pipe sounds.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #165 on: January 05, 2018, 11:37:23 pm »
The ironic thing is that while this is may cause a brief hit to Intel's rep, in the end it probably means selling a whole bunch of new chips. 

And new computer sales for Apple, HP, Dell,  etc, etc. which means new sales for storage, memory and other peripheral makers...

Based on the stocks reaction today, I think the market may be coming to realize this.

Maybe they can just make all computers disposable with a 1 year shelf life - that'll  keep the tech market pumping... ::)
Unlike many companies think, the world isn't made of money. You can't keep buying new kit and you can't keep migrating. The pace is already quite taxing as it as and adding to it might break the camel's back. There's some room, but buying new computers the whole world over simply isn't an option. Any organisation bigger than tiny is constantly renewing itself to maintain the status quo, stuffing bricks back in the crumbling wall. Many organisations are sitting ducks in a world where cybercrime is rapidly becoming one of the largest and most profitable businesses.

Maybe even more importantly, there's no guarantee the next one won't pop up next month. We've had various hardware dependent attacks the past year. You can't keep buying new stuff every time, not even having it fully deployed when the next one hits.
« Last Edit: January 05, 2018, 11:46:38 pm by Mr. Scram »
 

Offline mtdoc

  • Super Contributor
  • ***
  • Posts: 3575
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #166 on: January 05, 2018, 11:38:34 pm »
I think its not disputed that NSA attempts to get hardware manufacturers to include back doors in hardware. What would be surprising is if there were not any backdoors, not if there were.
Nobody's disputing this, but this thread is not about that. .

No, I think it is relevant. What are the odds that the NSA was not aware of this and already exploiting it?

Was this really an unintentional "bug"
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #167 on: January 05, 2018, 11:43:00 pm »
No, I think it is relevant. What are the odds that the NSA was not aware of this and already exploiting it?

Was this really an unintentional "bug"
What's the use speculating about that? We won't know, until someone releases the documents. We know that they look for these things, even try to plant them, but we don't know if that's the case here. We do know that we tend to attribute to malice what is actually stupidity. Maybe it is, maybe it's not. We can argue yes or no all we want, but we won't get closer to the truth.

And again, it's also about making every single thread into a conspiracy. It's tiring.
« Last Edit: January 05, 2018, 11:45:01 pm by Mr. Scram »
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #168 on: January 05, 2018, 11:48:21 pm »
The ironic thing is that while this is may cause a brief hit to Intel's rep, in the end it probably means selling a whole bunch of new chips. 

And new computer sales for Apple, HP, Dell,  etc, etc. which means new sales for storage, memory and other peripheral makers...

Based on the stocks reaction today, I think the market may be coming to realize this.

Maybe they can just make all computers disposable with a 1 year shelf life - that'll  keep the tech market pumping... ::)
Unlike many companies think, the world isn't made of money. You can't keep buying new kit and you can't keep migrating. The pace is already quite taxing as it as and adding to it might break the camel's back. There's some room, but buying new computers the whole world over simply isn't an option. Any organisation bigger than tiny is constantly renewing itself to maintain the status quo, stuffing bricks back in the crumbling wall. Many organisations are sitting ducks in a world where cybercrime is rapidly becoming one of the largest and most profitable businesses.

Maybe even more importantly, there's no guarantee the next one won't pop up next month. We've had various hardware dependent attacks the past year. You can't keep buying new stuff every time, not even having it fully deployed when the next one hits.

What would be nice is FPGA fabric and self reconfigurable computers. Then you can keep a base abstraction which is formal rather than a pile of hacks. If there’s a problem, reconfigure the hardware.

This is a lower level than microcode.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #169 on: January 05, 2018, 11:53:17 pm »
Some of the exploits Ive read about seem to allow arbitrary code running on a VM to access code running in a higher ring which is supposed to be invisible to the OS, allowing information from other VMS or running on the hardware3 above the kernel and OS space to be accessed..

This all begs the question, what and how do people know when OS's and virtualization end?

Recently it turned out that many processors from one manufacturer had an entire separate CPU with an embedded OS, Minix, on the same die, which could access everything running in the main CPU's OS space, image the drive, etc,  including when the processor was supposed to be powered off or hibernating.  This evil twin OS ran in something called "ring -3" and it even had a web server. Some traffic going over the net also never was seen by the OS, it went straight to this other CPU.

You can read more here:

http://www.cs.vu.nl/~ast/intel

Not one manufacturer, both major x86 manufacturers. AMD calls it TrustZone and actually has an ARM processor embedded. They aren't some hidden secret either, but sold as a management tool. It's a huge boon not having to manually turn on 2500 computers to run an update. What's new is that the theoretical risks have seen for years have now been converted into an actual, practical thread by a vulnerability and the system being dissected and understood ever more. The security through obscurity started cracking in major ways.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #170 on: January 05, 2018, 11:56:24 pm »
What would be nice is FPGA fabric and self reconfigurable computers. Then you can keep a base abstraction which is formal rather than a pile of hacks. If there’s a problem, reconfigure the hardware.

This is a lower level than microcode.
I've thought about this the past year a lot. Doing it that way solves a number of problems, but creates others. Having changeable hardware under the hood means never knowing what is actually going on. You'd need some independent way of verifying the configuration of the chip and if it's hardware doing that you're back to square one, if it's a configurable fabric it's turtles all the way down.
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #171 on: January 06, 2018, 12:09:08 am »
But, here's the problem, the author of Minix, who is kind of a luminary in the world of computing, and a significant number of other people far more knowledgeable than myself or I venture to say likely yourself as well, were disturbed enough about this to make a stink about it. And the description I have read about it it doesn't look like that is all it is to me.

Even if that was the intent, then shouldn't it not be present on cheaper HW, since that HW is basically meant to be used by consumers, not in servers, and is basically disposable?  But, it is.

Were it just a routine system administration tool, for which the internals were known and public, as you portray it as, the outcry - which was focused on security and privacy implications, would not have happened.


Some of the exploits Ive read about seem to allow arbitrary code running on a VM to access code running in a higher ring which is supposed to be invisible to the OS, allowing information from other VMS or running on the hardware3 above the kernel and OS space to be accessed..

This all begs the question, what and how do people know when OS's and virtualization end?

Recently it turned out that many processors from one manufacturer had an entire separate CPU with an embedded OS, Minix, on the same die, which could access everything running in the main CPU's OS space, image the drive, etc,  including when the processor was supposed to be powered off or hibernating.  This evil twin OS ran in something called "ring -3" and it even had a web server. Some traffic going over the net also never was seen by the OS, it went straight to this other CPU.

You can read more here:

http://www.cs.vu.nl/~ast/intel

Not one manufacturer, both major x86 manufacturers. AMD calls it TrustZone and actually has an ARM processor embedded. They aren't some hidden secret either, but sold as a management tool. It's a huge boon not having to manually turn on 2500 computers to run an update. What's new is that the theoretical risks have seen for years have now been converted into an actual, practical thread by a vulnerability and the system being dissected and understood ever more. The security through obscurity started cracking in major ways.
"What the large print giveth, the small print taketh away."
 

Offline stj

  • Super Contributor
  • ***
  • Posts: 2155
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #172 on: January 06, 2018, 12:28:32 am »
they arent called "INTEL" for nothing!!
hell, they arent even designed in the west - think about that for a second!!!
i'm pretty sure that breaks rules relating to military procurement.  :palm:
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #173 on: January 06, 2018, 12:45:47 am »
But, here's the problem, the author of Minix, who is kind of a luminary in the world of computing, and a significant number of other people far more knowledgeable than myself or I venture to say likely yourself as well, were disturbed enough about this to make a stink about it. And the description I have read about it it doesn't look like that is all it is to me.

Even if that was the intent, then shouldn't it not be present on cheaper HW, since that HW is basically meant to be used by consumers, not in servers, and is basically disposable?  But, it is.

Were it just a routine system administration tool, for which the internals were known and public, as you portray it as, the outcry - which was focused on security and privacy implications, would not have happened.
I can't put this any more gently than that it seems that you're filling the gaps of your knowledge with your imagination. The tool being present was well know. It has been a black box for quite a while, but criticized because of exactly that too. I have included a link to the FAQ of the open source BIOS Libreboot, which doesn't support processors with Intel ME. It explains in some detail what it is, does and what its capabilities are. It also includes links to other independent pages with similar information. The page dates July 2015, and isn't manipulated after the fact as I read it myself around that time. There are many other sources with similar information which pre-date this page significantly. One of the links is for instance dated June 2014.

The recent uproar was because it became clear the black box was showing cracks. The thing hidden from sight could now be seen by many people and the protection the obscurity was supposed to bring was gone. Despite the Intel ME and it's capabilities being known, its exact inner workings weren't known. One of the things discovered was that it actually runs MINIX, much to the surprise of the author of that software.

The Intel ME may have been a surprise to the general public, but it hardly was a secret. People who know what they're talking about have been fearing what would inevitably happen for years and the actual source of the uproar was that it was the big "told you so" moment everyone knew was coming. The exposure merely meant the public at large finally caught wind of it.

So please, keep this thread clear of the speculations and theories you tend to line other threads with. The subject is complicated enough as it is and many people already have trouble understanding what actually is going on without FUD being mixed in.

https://web.archive.org/web/20150730233729/http://libreboot.org:80/faq/#intelme
https://web.archive.org/web/20150908031804/https://www.fsf.org/blogs/community/active-management-technology
 

Offline Cerebus

  • Super Contributor
  • ***
  • Posts: 10576
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #174 on: January 06, 2018, 01:15:07 am »
No, I think it is relevant. What are the odds that the NSA was not aware of this and already exploiting it?

Was this really an unintentional "bug"

No, it wasn't, on the balance of probabilities, deliberate.

I can quite see how the engineers would miss this. Their targets would have been meeting performance goals and providing the security specified by the architecture, not meeting the security goals that someone with adversarial security experience would consider desirable -  which would include quashing any possible side channels. (I can tell you from experience of trying to design systems to be covert channel free that this is very hard to do on small systems, and immensely hard to do on large complex systems like the super-scalar, out of order, execution engines that modern CPUs are.)

Speculative execution (and super-scalar processors) are all about trying to reduce latency. Protection mechanisms introduce latency. So you try and run the protection checks in parallel with the speculative execution and only stop the speculative execution once you've got results from the protection checks. This means that you will almost certainly use some protected data for speculative execution before you know the results of the protection checks for that data If you don't, you lose some of the latency advantages of speculative execution.

However, this has side effects, one of which - as we have seen - is polluting the cache with speculative fetches. An adversarial security-minded mindset would have spotted this as an information leak and at least provided an option to stall the speculative execution pipeline with interlocks between protected actions and  protection check results, resulting in no cache pollution and hence no information leak.

The problem is one of designing the chipset with a performance mindset and not being aware of the security trade-offs of some of those performance enhancing tricks. In a performance mindset it's OK that a speculative execution that falls foul of a protection check simply fails to retire* those instructions rather than undoes all the side effects of that speculative execution. Done that way there is no explicit access to that data and the architectural security model is satisfied. As we have seen, this is not enough to satisfy an adversarial security model that is intolerant of implicit partial data leaks.

*retire in this sense means 'write back the results to architectural registers once the speculative execution becomes non-speculative'.
Anybody got a syringe I can use to squeeze the magic smoke back into this?
 
The following users thanked this post: VintageTekFan

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
"What the large print giveth, the small print taketh away."
 

Offline JoeO

  • Frequent Contributor
  • **
  • Posts: 527
  • Country: us
  • I admit to being deplorable
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #176 on: January 06, 2018, 04:23:27 am »
Anyone thinking that all of this seem a bit complicated and weird, it should be pointed out that nowadays, the encryption on a laptop (some of it I guess) can be broken from recording and analyzing the noise patterns coming from the laptop when measuring the sound with a recording device close by. Pretty obscure stuff.
Do you have a link? I think that's the kind of side channel attack that gets a fair bit of attention in regards to mitigation. Of course, an infected laptop could send out intentional sounds or signals that can be used to break encryption. That's a given, but you need to have a foothold already and in those cases you generally have more effective methods to extract data.
I think this is the link you are looking for:
https://arstechnica.com/information-technology/2015/10/how-soviets-used-ibm-selectric-keyloggers-to-spy-on-us-diplomats/
The day Al Gore was born there were 7,000 polar bears on Earth.
Today, only 26,000 remain.
 

Offline JoeO

  • Frequent Contributor
  • **
  • Posts: 527
  • Country: us
  • I admit to being deplorable
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #177 on: January 06, 2018, 04:27:27 am »
The ironic thing is that while this is may cause a brief hit to Intel's rep, in the end it probably means selling a whole bunch of new chips. 

And new computer sales for Apple, HP, Dell,  etc, etc. which means new sales for storage, memory and other peripheral makers...

Based on the stocks reaction today, I think the market may be coming to realize this.

Maybe they can just make all computers disposable with a 1 year shelf life - that'll  keep the tech market pumping... ::)
I think that right now, no one will be buying Intel laptops or desktops.  Why buy a defective product?
As soon as the bugs are fixed in the hardware sales will resume.

This could also mean there will be great sales on Intel Ls and Ds now until the defective stock is cleared out.
The day Al Gore was born there were 7,000 polar bears on Earth.
Today, only 26,000 remain.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #178 on: January 06, 2018, 04:45:12 am »
I think that right now, no one will be buying Intel laptops or desktops.  Why buy a defective product?
As soon as the bugs are fixed in the hardware sales will resume.

This could also mean there will be great sales on Intel Ls and Ds now until the defective stock is cleared out.
The same might apply to AMD and even ARM. The coming months or even years might be a nightmare for all of them, as a lot of people are going to wait for new silicon to arrive and that could be a matter of years. No easy fixes here, you need an actual change of architecture, albeit not the whole architecture. Almost all hardware currently out there, and certainly Intel hardware, has suddenly lost a significant part of its value. As soon as fixed processors arrive, why knows what happens. They might be considered scrap and the prices for the new stuff might go through the roof. You don't really want to replace all of your infrastructure, but you also don't really want to be the one to explain why you're still running outdated hardware. The only real difference with software patches is that this costs a lot more money.

That'd actually be a fairly horrific scenario, if Intel and AMD get rewarded for having serious issues in the hardware.
 

Offline timb

  • Super Contributor
  • ***
  • Posts: 2536
  • Country: us
  • Pretentiously Posting Polysyllabic Prose
    • timb.us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #179 on: January 06, 2018, 04:55:57 am »
If the new CPU is sufficiently powerful you could do dynamic translation between x86 and the new architecture, or even outright emulate the x86 for legacy code. The former method could run with only a 10-15% drop in performance for most applications. Anything performance oriented would obviously be recompiled for the new architecture relatively quickly.

So, I don’t think legacy applications are what’s keeping x86 around.

In fact, Apple has undergone this very transition. Twice. They went M68k -> PPC -> x86. It was done both time by incorporating a dynamic translation engine into the OS, along with implementing fat binaries for new software (which would contain both PPC and x86 machine code in the same binary, allowing them to natively execute on either architecture). This worked pretty well for them both times.

(Technically there was a third major transition as well, the one between Mac OS Classic and Mac OS X. They literally replaced the entire OS with one that was completely different. The only bridge between them, software wise, was the Carbon API, created specifically for the purpose. Non-Carbon apps could still be run in OS X via the Classic Environment, which ran a full install of Mac OS 9 in what was, in essence, a bare metal virtual machine. OS/2 used a similar concept. Frankly Microsoft should have used this approach with NT and gotten rid of all the old Windows 9x/3.11 cruft altogether.)
The difference is that Microsoft is used much more in professional and corporate settings. Keeping things ultra backwards compatible is part of why they have the market share that they do. Their corporate customers don't like rocking the boat in major way. There's a reason that most of the changes made to Windows 10 can be turned off in the Enterprise and Server editions.

You can’t really get more backward compatible than running the entire legacy OS in a virtual machine though. In fact, with current versions of Windows, when you try to run a legacy application don’t you essentially download an entire copy of XP that runs in a VM?

Keeping things ultra backwards compatible is also the reason Windows became a security nightmare. All for the benefit of a minority of their customers.
Any sufficiently advanced technology is indistinguishable from magic; e.g., Cheez Whiz, Hot Dogs and RF.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #180 on: January 06, 2018, 05:07:02 am »
You can’t really get more backward compatible than running the entire legacy OS in a virtual machine though. In fact, with current versions of Windows, when you try to run a legacy application don’t you essentially download an entire copy of XP that runs in a VM?

Keeping things ultra backwards compatible is also the reason Windows became a security nightmare. All for the benefit of a minority of their customers.
I think you'd be surprised how much of the world is dependent on things like these. There's plenty of banks and similar critical institutions that run much older software, stuck together with tape and prayers of greybeards, which absolutely critical to the well being of entire nations.

It's also not just single machines. It's entire networks and how they interact. There practically never is a point where you throw it all in the bin and start from fresh. You are always building on the choices and mistakes from the past, trying to patch just enough holes to keep things afloat. As I've stated before, the ideas our current software is based on are inherently dated, but the attacks levelled against them are not. The average hardware and software in the field cannot be anything else than behind the curve.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #181 on: January 06, 2018, 06:12:23 am »
This is a colorful image but it doesn't sound very realistic.

>stuck together with tape and prayers of greybeards, which absolutely critical to the well being of entire nations.

Huge sums of money are transferred in and out of stocks in countries in microseconds.

Huge fortunes can be made and countries future earnings for decades lost in less time than it takes to wash one's hands of the crime.
I don't think I have much to gain from trying to convince you, though I will point out I was pretty much spot on last time you doubted me in this thread. Considering all the, let's call them theories you subscribe to, it both surprises and amuses me you've picked this one to question.

Obviously, stock trading isn't quite the same as the banking system, and the fact that an old and crumbling highway handles huge amounts of traffic isn't reason to relax and sit back. I'd say it's quite the opposite.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #182 on: January 06, 2018, 06:19:08 am »
Oh, what the hey, I'll throw another one in the hat. I think Reuters can be considered a trustworthy source, right?

“Some of the software I wrote for banks in the 1970s is still being used,” said Hinshaw."

"He says banks have a mistaken view of technology. “Banks in the last century all held the view: ‘If ain’t broken, don’t touch it.’ So they had all these core processing systems for deposit accounts and payments that, once built, were never touched again. They were just maintained. This made sense in the past, because building core processing systems cost a lot of money, in terms of development and hardware. “Over the years, the systems were cemented in place by new developments around them, such as ATMs and callcentres. By the time the internet came around, the cement was so thick that internet banking was just added making the cement more like granite rock.”

"The risk is “not so much that an individual may have retired,” Andrew Starrs, group technology officer at consulting firm Accenture PLC, said. “He may have expired, so there is no option to get him or her to come back.”

https://www.reuters.com/article/us-usa-banks-cobol/banks-scramble-to-fix-old-systems-as-it-cowboys-ride-into-sunset-idUSKBN17C0D8
http://www.computerweekly.com/news/2240212567/Big-banks-legacy-IT-systems-could-kill-them
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #183 on: January 06, 2018, 06:19:16 am »
Microsoft seem to have a support page for an update, but then they write this below:
https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution

Q1: I wasn’t offered the Windows security updates that were released on January 3, 2018. What should I do?

A1: To help avoid adversely affecting customer devices, the Windows security updates that were released on January 3, 2018, have not been offered to all customers. For details, see Microsoft Knowledge Base Article 4072699.


Edit: I am not 100% sure but I think I saw something on twitter having indicating that your antivirus software might be problematic re. new updates. Unsure.
Edit2: Ah, maybe related to the following link from Microsoft:
https://support.microsoft.com/en-us/help/4072699 ("Important: Windows security updates released January 3, 2018, and antivirus software")
« Last Edit: January 06, 2018, 07:35:01 am by Decoman »
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #184 on: January 06, 2018, 06:33:49 am »
Linus Torvald called it out:"Why is this all done without any configuration options? A *competent* CPU engineer would fix this by making sure speculation doesn't happen across protection domains. Maybe even a L1 I$ that is keyed by CPL. https://lkml.org/lkml/2018/1/3/797

I want to see compartmentalized software and hardware. I for one do not trust Linus and  I do not want to the type of idea that Linus Torvald is said to have said here by having lots of configuration options. I am no expert, but I would think that with optional parameters, an accidental, or, ill-willed toggle of an option can make an adversary easily abuse your computer. Why not just remove that possibility of abusing built in parameters by making sensibly sized modular code? It seems obvious that software ought to be more monolithic, such that the piece of software is compiled to your needs, but also that one ought to be able to authenticate and recognize if a piece of software is:

1) properly coded (not a single instance of there being an omission of a ; character in the code for example, NOR, a single instance of there being a superfluous character in the code)
2) has the features you want and nothing more (at least as per the official guide)
3) Is secure against tampering (presumably, something that could be verified by means of some kind of authentication)

Afaik, one example of parameters being known to have been abused, is the fall back option of export ciphers using something called 'Dual EC DRBG', in which this patently flawed piece of crypto ended up being used by some, for "secuirty". The 'Dual Elliptic Curve Deterministic Random Bit Generator)' is also known as being a standard that was pushed by NIST, apparently after having been paid some millions of dollars by NSA, where one is now speculating that NSA paid NIST to have a vulnerability/backdoor built into computers/software.
https://en.wikipedia.org/wiki/Dual_EC_DRBG

If there is something I've learned about cryptography, it is that there are certain things you must not have in your implemented cipher code design for sake of security, things like: a seed number acting as as hidden initialization vector for some piece of crypto math, hidden patterns, hardcoded numbers, dynamic numbers that reflect the date and mimicking other known data values, "home brewed crypto ciphers", and ofc, any other "up your sleeve" type of math/numbers. So far, the ideal is afaik one way functions, in which an error in just 1 bit is enough to transmute a cipher text into a seemingly random stream of 0's and 1's, and using prime numbers is afaik one way to do this to avoid trivial factorization of numbers, when also scaled to take into account what kind of computing power is required to scramble an encrypted message sufficiently, to not be decrypted in the next 10-20-50-100 years.

I think that at the very least, a secure method of communicating between a website is required, and even better if there are other ideas to authenticate valid webpages, code and software supposed to having been downloaded from a trusted supplier.

I personally think it would be a nice idea, if only naively here, to get to have software (code) turned into hardware, which you then can put checkers on with hardware only (something that just works and isn't subject to a never ending cycle of re-occurring updates), and that you can view/review with your own eyes by taking the hardware out and looking at it. I imagine some kind of thin circuit plate that can be inspected (at least for the critical parts, for sake of compartmentalization of running software on hardware, as opposed to building it all into some obscure package like a damn cpu). Maybe something that could also bridge hobby electronics with regular people I imagine. :) Imagine having to now worry about hidden unseen connections in a transparent circuit board (as if one initially trusted to be able to see all the wiring paths in copper on the circuit board, and now having to worry about transparent copper or subtle doping with graphite material).


As long as severed flaws like Heartbleed happening (iirc someone being able to dump the server memory because of a flaw in the code used for networking protocols), there is imo no good point pointing a finger at how users are too dumb to manage their computer. I think it should be obvious that the industry is shit and "science" and "math" isn't there in the world as some existing and neutral party to it all to help out (and after all, the implementation of code and things has to be good and flawless, and as Bruce Scheier have said, "you are the product" (think: corporations stealing and abusing your personal data). Ofc, I don't fully trust that guy either to be this neutral party, who I personally think of as being either too naive, and who apparently thinks that nation state espionage is just ok on a general basis, being on the record for having opined a broad sweeping statement that point out that the NSA is doing a job that he expects of them to do (or something to that effect, I don't have a quotation ready at hand), who by now should knowing well that NSA and the like is involved in shady stuff and also involved in killing people with drones on the other side of the Earth. And as I think I pointed out some other time here on the forums earlier, that guy met with congress in a hearing and simply agreed to the very general notion that innovation is very important but without explaining what it meant (and iirc the subtext for that piece of discussion was that the congress panel in that hearing had stated a problem of not wanting to create rules and regulations that would be at odds with 'innovation' (whatever that could mean, I thought of it as potentially wanting to avoid putting regulations for mass surveillance software/hardware and the way the internet allows for mass surveillance).
« Last Edit: January 06, 2018, 07:31:15 am by Decoman »
 

Offline A Hellene

  • Frequent Contributor
  • **
  • Posts: 602
  • Country: gr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #185 on: January 06, 2018, 07:51:08 am »
they arent called "INTEL" for nothing!!
hell, they arent even designed in the west - think about that for a second!!!
i'm pretty sure that breaks rules relating to military procurement.  :palm:
Ah! A hit right on the head of the nail!

Even though Eurovision, for example, tries its best to teach the flock otherwise...


-George
Hi! This is George; and I am three and a half years old!
(This was one of my latest realisations, now in my early fifties!...)
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #186 on: January 06, 2018, 08:03:38 am »
I thought Eurovision was a comedy. And intel but that’s another story.
 

Offline A Hellene

  • Frequent Contributor
  • **
  • Posts: 602
  • Country: gr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #187 on: January 06, 2018, 08:17:12 am »
Of course, Eurovision has always been a bad joke, promoting the --according to their nomenclature-- NWO; just see the grave outcome today...

As Intel has also become...

The question is, why have they decided to reveal that right now?


-George
Hi! This is George; and I am three and a half years old!
(This was one of my latest realisations, now in my early fifties!...)
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #188 on: January 06, 2018, 09:14:46 am »
M’kay!
 

Online nctnico

  • Super Contributor
  • ***
  • Posts: 26906
  • Country: nl
    • NCT Developments
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #189 on: January 06, 2018, 10:21:49 am »
Linus Torvald called it out:

A *competent* CPU engineer would fix this by making sure speculation doesn't happen across protection domains. Maybe even a L1 I$ that is keyed by CPL.

That is easy to say in hindsight. I read a little bit about how the actual hack works and it isn't very straightforward. The way I understand it they make the CPU execute code using the branch prediction feature which accesses data to which the process shouldn't have access to. By calculating the time it takes it can be determined (bit by bit !) what data is at that address. The problem seems to be that the CPU checks the protection of the memory area AFTER the code has executed but BEFORE the result is marked as valid.
There are small lies, big lies and then there is what is on the screen of your oscilloscope.
 

Offline timb

  • Super Contributor
  • ***
  • Posts: 2536
  • Country: us
  • Pretentiously Posting Polysyllabic Prose
    • timb.us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #190 on: January 06, 2018, 11:37:51 am »
You can’t really get more backward compatible than running the entire legacy OS in a virtual machine though. In fact, with current versions of Windows, when you try to run a legacy application don’t you essentially download an entire copy of XP that runs in a VM?

Keeping things ultra backwards compatible is also the reason Windows became a security nightmare. All for the benefit of a minority of their customers.
I think you'd be surprised how much of the world is dependent on things like these. There's plenty of banks and similar critical institutions that run much older software, stuck together with tape and prayers of greybeards, which absolutely critical to the well being of entire nations.

It's also not just single machines. It's entire networks and how they interact. There practically never is a point where you throw it all in the bin and start from fresh. You are always building on the choices and mistakes from the past, trying to patch just enough holes to keep things afloat. As I've stated before, the ideas our current software is based on are inherently dated, but the attacks levelled against them are not. The average hardware and software in the field cannot be anything else than behind the curve.

Oh, trust me, I know! I spent the first 12 years of my adult life in IT. I recognized what was coming and got out (switched to electrical engineering). Best move I ever made.

As of 5 years ago there were still bank ATMs running OS/2 Warp! I think they’re all gone by this point, however, some critical banking software is still based around OS/2, obviously it has to run in VM, but it’s still there; the kicker is that some of these OS/2 applications are in and of themselves virtualized environments, which were created in the 1990’s to run software originally created in the 1970’s! This is why I keep my money in my mattress.

The Financial Industry: Our Software is Turtles All the Way Down

Anyway, the article you quoted essentially proves the point I was trying to make. The banking industry is in the mess they’re in because they didn’t plan ahead and keep up with improvements in technology. Other industries are in a similar situation.
Any sufficiently advanced technology is indistinguishable from magic; e.g., Cheez Whiz, Hot Dogs and RF.
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #191 on: January 06, 2018, 11:52:49 am »
Twitter is really great for getting to learn about stuff, and so i have something like 100+ twitter accounts loaded from various people that I trawl through a few times a day. :) Sadly, I have now no longer have all the tabs loading in the background, so going through all of them and loading them one by one is ofc  much slower now as opposed to when I only had 50 twitter pages open.

Meanwhile on twitter:


I don't know that guy, nor if the paper he is referring to is legit so to speak, but it makes me wonder "oh, this sounds like it might be interesting".
« Last Edit: January 06, 2018, 11:57:04 am by Decoman »
 
The following users thanked this post: GeorgeOfTheJungle

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #192 on: January 06, 2018, 10:21:25 pm »
As of 5 years ago there were still bank ATMs running OS/2 Warp! I think they’re all gone by this point, however, some critical banking software is still based around OS/2, obviously it has to run in VM, but it’s still there; the kicker is that some of these OS/2 applications are in and of themselves virtualized environments, which were created in the 1990’s to run software originally created in the 1970’s! This is why I keep my money in my mattress.

For heavens sake dude, dont tell people who know your physical IP location you have your Fiat money in your mattress! :palm:

Quote
The Financial Industry: Our Software is Turtles All the Way Down

Anyway, the article you quoted essentially proves the point I was trying to make. The banking industry is in the mess they’re in because they didn’t plan ahead and keep up with improvements in technology. Other industries are in a similar situation.

There is absolutely nothing wrong or failing with the finical industry, they are better off then ever before, just look into the paradise and panama papers! ^-^
Its us, the involunteered screwed, the bankpenis in the rectum people who have a hard time!

The banks psychopath oligarchs secret agenda is to end all Fiat moneys and implement oligarch psychopath controlled bitcoins, thats a lot worse!
 

Offline station240

  • Supporter
  • ****
  • Posts: 967
  • Country: au
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #193 on: January 06, 2018, 10:22:06 pm »
Why the Raspberry PI isn't effected
Simple explanation of how the modern CPU pipelining works.
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #194 on: January 06, 2018, 10:33:04 pm »
The banks psychopath oligarchs secret agenda is to end all Fiat moneys and implement oligarch psychopath controlled bitcoins, thats a lot worse!

No more cash, only electronic transactions, no way to hide a penny, then they'll have got us by the balls. Game over.
« Last Edit: January 07, 2018, 12:16:38 pm by GeorgeOfTheJungle »
The further a society drifts from truth, the more it will hate those who speak it.
 

Offline Richard Crowley

  • Super Contributor
  • ***
  • Posts: 4317
  • Country: us
  • KJ7YLK
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #195 on: January 06, 2018, 11:28:19 pm »
Why the Raspberry PI isn't effected
Simple explanation of how the modern CPU pipelining works.
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
Yeah, and Arduino probably isn't affected either.  Or my Casio calculator.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #196 on: January 06, 2018, 11:33:07 pm »
This is by far the best two responses from the OpenBSD guys:

https://marc.info/?l=openbsd-misc&m=151522749523849&w=2

https://marc.info/?l=openbsd-tech&m=151521473321941&w=2

This is after Theo on numerous occasions pretty much said this was coming.

Also check this performance degradation report:

https://www.epicgames.com/fortnite/forums/news/announcements/132642-epic-services-stability-update

Our nginx load balancers are running about 35% hotter as well. Looking at migration to more efficient bits of tech (HAproxy for example). Increasing capacity means $$$

Shit is indeed fucked.

Oh BTW don't believe all that shit about the banks in certain states. The main use of OS/2 was a TN3270 node while they ported front office stuff to other tech (mainly Java) which was a big job. It wasn't connected to the Internet and talked to branch AS/400 platforms which all talked to massive mainframes. The security abstraction was actually on the fully supported AS/400 platforms. Now it's all a combination of z-series, piles of front end caches (to support OLB), lots of windows servers (RBS/Natwest anyway) and JBoss (HSBC).

It doesn't matter if the tech is old. It is supported.

As for your fiat money, it's bits of paper and metal. It has no real value. Look at Maslow's hierarchy of needs and build a backup plan based on trading incremental steps up the ladder. If you want security, build an empire.
« Last Edit: January 06, 2018, 11:41:41 pm by bd139 »
 
The following users thanked this post: orolo


Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #198 on: January 06, 2018, 11:53:28 pm »
Globalresearch.ca is "alternative news" aka bollocks. India's demonetisation was a big move to try and kill part of their black economy which was built on forgery of the 500/1000 Rs notes mainly. 99% of notes were returned and cashed. They are back again now, with new security features.

I don't think people have realised that most of these large organisations, banks and anything seen to be evil by conspiracy theorists have a few interesting attributes:

1. Incompetence. Any significant mass of humans (usually about 2 or above) can't step forward rationally together. This isn't some grand conspiracy.
2. There is no global elite controlling anything. Because they couldn't fucking agree on what to control (see 1).
3. Shit sticks together in lumps. Sometimes big lumps.
4. People like money. I like money. Money hangs around in banks. Sometimes you get stuck to the shit lump. I keep doing it.

 :palm:

(Source: have worked for retail and commercial banking outfits and it's a turdfest of incompetence and nothing more. If they had an agenda it's what sandwich to have from Pret or possibly what seat covering in their Nissan Qashqai that the dog is going to piss all over the day they get it)
« Last Edit: January 06, 2018, 11:55:08 pm by bd139 »
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #199 on: January 06, 2018, 11:59:28 pm »
Why the Raspberry PI isn't effected
Simple explanation of how the modern CPU pipelining works.
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
Yeah, and Arduino probably isn't affected either.  Or my Casio calculator.
:palm:, but many other ARM CPUs ARE affected. Like one in my phone. Don't compare arduino with a device which basically is a PC, just lower performance. For example, BeagleBone Black which is similar to raspberry pi is affected by Spectre.
« Last Edit: January 07, 2018, 12:04:04 am by wraper »
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #200 on: January 07, 2018, 12:07:54 am »
Ménage à trois ?

https://www.globalresearch.ca/a-well-kept-open-secret-washington-is-behind-indias-brutal-demonetization-project/5566167

https://www.citizen.org/sites/default/files/memo-gats-conflict-with-bank-size-limits-may-10-2011.pdf

https://fas.org/sgp/crs/misc/india-wto.pdf
I'll ask you again. Will you please stop the tin foil hat posts? At least in this thread, but preferably elsewhere too. There are a few threads where it can't get much worse, like the dowsing thread or the 5G one. Those would be good threads to get it all out.

These vulnerabilities already confuse people a lot, no need for muddying the waters more. People understanding what's going on might very well soften the impact a lot.
 

Offline timb

  • Super Contributor
  • ***
  • Posts: 2536
  • Country: us
  • Pretentiously Posting Polysyllabic Prose
    • timb.us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #201 on: January 07, 2018, 01:02:06 pm »
As of 5 years ago there were still bank ATMs running OS/2 Warp! I think they’re all gone by this point, however, some critical banking software is still based around OS/2, obviously it has to run in VM, but it’s still there; the kicker is that some of these OS/2 applications are in and of themselves virtualized environments, which were created in the 1990’s to run software originally created in the 1970’s! This is why I keep my money in my mattress.

For heavens sake dude, dont tell people who know your physical IP location you have your Fiat money in your mattress! :palm:

That’s why I keep the mattress itself in the back of a Fiat, which I park in a different location each night.

Any sufficiently advanced technology is indistinguishable from magic; e.g., Cheez Whiz, Hot Dogs and RF.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #202 on: January 07, 2018, 01:28:04 pm »
As a Fiat owner, that's probably the most secure place to leave it. No one is going to steal that pile of shit.
 

Offline Monkeh

  • Super Contributor
  • ***
  • Posts: 7992
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #203 on: January 07, 2018, 01:29:28 pm »
As a Fiat owner, that's probably the most secure place to leave it. No one is going to steal that pile of shit.

And if they tried it probably wouldn't start anyway. Or get up the first hill they encounter.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #204 on: January 07, 2018, 01:41:36 pm »
Yes. It's the only car I've ever had that the OBD2 cable gets used as much as the key.
 
The following users thanked this post: SeanB

Offline SparkyFX

  • Frequent Contributor
  • **
  • Posts: 676
  • Country: de
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #205 on: January 07, 2018, 04:07:49 pm »
Given the complexity of your typical personal computer, plus the whole operating system, plus gear needed to connect it to a network that´s obviously too much knowledge needed for a single person to be an expert in all these areas, which means there must be a dependency of or problem with trust all along the way.
OTOH, no one ever said you can securely connect something to a network without someone else being able to interact with it, because the whole purpose of the connection is an interaction with other nodes.

Is this now a big problem? No, it made the news and everyone goes ape, but in effect it means an additional test case for anti-virus software, which you need anyway if you want to protect such a system.
Support your local planet.
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #206 on: January 07, 2018, 04:35:31 pm »
Is this now a big problem? No, it made the news and everyone goes ape, but in effect it means an additional test case for anti-virus software, which you need anyway if you want to protect such a system.
It's a big problem for servers, as some are hit with up to 50% CPU performance drop after security patch like some Epic games servers. If you think that antivirus is effective against such flaw, then you are clueless.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #207 on: January 07, 2018, 04:44:28 pm »
Wasn't AMD working on something to replace the x86-Architecture for consumer-computers? I remember reading something like that one or two years back. Would be the perfect time to present the new CPU-Architecture now
The K12 core is AFAIK supposed to be based on the same Zen architecture as Ryzen and friends, but it was postponed after AMD saw how good performance they were getting out of Ryzen. But Spectre and Meltdown are implementation issues, not architecture issues.

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #208 on: January 07, 2018, 05:49:53 pm »
Wasn't AMD working on something to replace the x86-Architecture for consumer-computers? I remember reading something like that one or two years back. Would be the perfect time to present the new CPU-Architecture now

The K12 core is AFAIK supposed to be based on the same Zen architecture as Ryzen and friends, but it was postponed after AMD saw how good performance they were getting out of Ryzen. But Spectre and Meltdown are implementation issues, not architecture issues.

AMD was going to make a desktop performance ARM ISA processor at some point which shared the x86 infrastructure (sort of like DEC Alpha and AMD Athon?) but I do not remember why it was cancelled.

Intel intended the Pentium 4 to be the last x86 processor series to be replaced by Itanium until AMD rained on their parade with their 64 bit Opteron and Athlon64 processors.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #209 on: January 07, 2018, 06:00:42 pm »
AMD was going to make a desktop performance ARM ISA processor at some point which shared the x86 infrastructure (sort of like DEC Alpha and AMD Athon?) but I do not remember why it was cancelled.
Yes, that is the K12. It is not officially cancelled, but AMD have understandably decided to focus on Ryzen for now.

Offline Towger

  • Super Contributor
  • ***
  • Posts: 1645
  • Country: ie
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #210 on: January 07, 2018, 06:59:09 pm »
lots of windows servers (RBS/Natwest anyway)

Ah yes, the bank which managed to f*ck up both their main and backup mainframes and had no backups of the scripts they lost.  The fallout from this is still ongoing years later.  Takes a long time to take customers to court after they have runaround between branchs/ATMs taking out money.

A fine example of outsourcing at its best...
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #211 on: January 07, 2018, 07:00:40 pm »
Yes but that was not the fault of the technology. Merely the humans which I outlined elsewhere in another post.
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #212 on: January 07, 2018, 10:28:55 pm »
Alright guys, I have an almost pointless CPU-Z benchmark done on my i7-4790k before and after the meltdown patch:

Before:


After:


As you guys, gals, and various species of intelligent cephalopod can clearly see, straight performance has not really gone down, and this makes sense. This affects specific workloads, which I have not measured at the moment, but I honestly don't use. My day to day performance isn't ruined, but your mileage may vary, especially if you are using VMs.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #213 on: January 07, 2018, 10:35:32 pm »
Among home users measurable impact is for those who use NVMe SSD.
CrystalDisk 6 results Samsung 960 PRO 2TB NVMe
Before:

After:
« Last Edit: January 07, 2018, 10:41:21 pm by wraper »
 

Offline Refrigerator

  • Super Contributor
  • ***
  • Posts: 1542
  • Country: lt
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #214 on: January 07, 2018, 10:36:14 pm »
Alright guys, I have an almost pointless CPU-Z benchmark done on my i7-4790k before and after the meltdown patch:

Before:


After:


As you guys, gals, and various species of intelligent cephalopod can clearly see, straight performance has not really gone down, and this makes sense. This affects specific workloads, which I have not measured at the moment, but I honestly don't use. My day to day performance isn't ruined, but your mileage may vary, especially if you are using VMs.
I think i read somewhere that the fix has to be enabled to take effect, you might want to check if that's true.
I have a blog at http://brimmingideas.blogspot.com/ . Now less empty than ever before !
An expert of making MOSFETs explode.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #215 on: January 07, 2018, 10:39:56 pm »
Alright guys, I have an almost pointless CPU-Z benchmark done on my i7-4790k before and after the meltdown patch:

Before:


After:


As you guys, gals, and various species of intelligent cephalopod can clearly see, straight performance has not really gone down, and this makes sense. This affects specific workloads, which I have not measured at the moment, but I honestly don't use. My day to day performance isn't ruined, but your mileage may vary, especially if you are using VMs.
What does CPU-Z actually test? You can't just translate that to your personal use.
 

Offline Refrigerator

  • Super Contributor
  • ***
  • Posts: 1542
  • Country: lt
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #216 on: January 07, 2018, 10:46:51 pm »
What does CPU-Z actually test? You can't just translate that to your personal use.
Word processing, image processing, web browsing and some other stuff, if i remember correctly.
I have a blog at http://brimmingideas.blogspot.com/ . Now less empty than ever before !
An expert of making MOSFETs explode.
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #217 on: January 07, 2018, 11:08:17 pm »
It does something. Idk, I said this wasn't a great benchmark, was just something I had lying around.

I've overclocked to 4.7ghz if on 2 cores and 4.6ghz if on 4 cores, and it seems to be working fine, and that should counteract any issues I'm having.

As for the SSD, that almost seems to be within some strange margin of error, as the writes have gone up, but the reads have gone down. I don't really see how NVMe drives would be affected, but who knows, maybe I'm sniffing snot.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #218 on: January 07, 2018, 11:11:14 pm »
It does something. Idk, I said this wasn't a great benchmark, was just something I had lying around.

I've overclocked to 4.7ghz if on 2 cores and 4.6ghz if on 4 cores, and it seems to be working fine, and that should counteract any issues I'm having.

As for the SSD, that almost seems to be within some strange margin of error, as the writes have gone up, but the reads have gone down. I don't really see how NVMe drives would be affected, but who knows, maybe I'm sniffing snot.
Don't look at sequential read/write. Those are not typical loads and also highly vary during test iterations as well. Look how 4kiB Q32 went down by 30%.
 
The following users thanked this post: Mr. Scram

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #219 on: January 07, 2018, 11:18:10 pm »
It does something. Idk, I said this wasn't a great benchmark, was just something I had lying around.

I've overclocked to 4.7ghz if on 2 cores and 4.6ghz if on 4 cores, and it seems to be working fine, and that should counteract any issues I'm having.

As for the SSD, that almost seems to be within some strange margin of error, as the writes have gone up, but the reads have gone down. I don't really see how NVMe drives would be affected, but who knows, maybe I'm sniffing snot.
Don't look at sequential read/write. Those are not typical loads and also highly vary during test iterations as well. Look how 4kiB Q32 went down by 30%.

That's gotta suck. I run a SATA SSD so I'm not affected, but damn.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #220 on: January 07, 2018, 11:19:59 pm »
That's gotta suck. I run a SATA SSD so I'm not affected, but damn.
I doubt SATA is going to be less affected. If so, only because its inherent slower performance might be hiding the actual performance hit. The underlying kernel calls aren't going to be much different.
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #221 on: January 07, 2018, 11:59:48 pm »
That's gotta suck. I run a SATA SSD so I'm not affected, but damn.
I doubt SATA is going to be less affected. If so, only because its inherent slower performance might be hiding the actual performance hit. The underlying kernel calls aren't going to be much different.
:-//

I haven't noticed anything
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Online Marco

  • Super Contributor
  • ***
  • Posts: 6721
  • Country: nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #222 on: January 08, 2018, 12:37:34 am »
I wonder how they are going to solve Spectre.

If there just happen to be microcode instructions available to wipe the BTB that would be awfully convenient.
 

Offline SparkyFX

  • Frequent Contributor
  • **
  • Posts: 676
  • Country: de
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #223 on: January 08, 2018, 12:51:27 am »
Is this now a big problem? No, it made the news and everyone goes ape, but in effect it means an additional test case for anti-virus software, which you need anyway if you want to protect such a system.
It's a big problem for servers, as some are hit with up to 50% CPU performance drop after security patch like some Epic games servers. If you think that antivirus is effective against such flaw, then you are clueless.
Antivirus is always ineffective against the vulnerability itself, it won´t magically patch that. But it can always scan for code that follows a pattern or for specific exploits, and yes, there are self-encrypting ones and yes, it´s always high profile.

Nevertheless can an impact on CPU load only be measured after a patch has been applied.
I come to think it might even be a problem to give a definite number, as this is speculative execution.
Support your local planet.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #224 on: January 08, 2018, 04:48:42 am »
Among home users measurable impact is for those who use NVMe SSD.
I'd say there's a measurable impact for those who run storage benchmarks (with fast media), since those will be issuing a very large number of syscalls, while a CPU benchmark will be negligibly affected since they hardly issue any syscalls at all.

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #225 on: January 08, 2018, 04:52:43 am »
Interesting to see how this will affect video rendering like Dave does, as he must be aware or at least feel it, as he did it a lot if there is say a 20% impact.

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #226 on: January 08, 2018, 06:30:12 pm »
Yep, moar syscalls => moar slowdown, because after the patch syscalls may take up to twice longer than before, IIANM.
« Last Edit: January 08, 2018, 09:09:59 pm by GeorgeOfTheJungle »
The further a society drifts from truth, the more it will hate those who speak it.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #227 on: January 08, 2018, 08:52:53 pm »
Video rendering is almost entirely compute-bound, so the effects should be small.

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #228 on: January 08, 2018, 08:55:45 pm »
Apart from the massive IO...
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #229 on: January 09, 2018, 09:55:19 am »
Meanwhile on twitter:


https://twitter.com/misc0110/status/948706387491786752

Why lots of people are using password managers in the first place, I don't know (Correction: I guess what had me wondering was, why would people think a password manage to be secure?). Seems wildly insecure to me, though I am ofc no expert. Maybe I am being weird, but why put all your important "eggs" in one big digital basket?

https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)



Also.. Reconstructing images from the memory apparently:
https://twitter.com/mlqxyz/status/950378419073712129
« Last Edit: January 09, 2018, 12:08:22 pm by Decoman »
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #230 on: January 09, 2018, 10:06:41 am »
Why lots of people are using password managers in the first place, I don't know. Seems wildly insecure to me, though I am ofc no expert.
Because otherwise you'll need to recycle your passwords which is much worse. You cannot remember 10's of them and remember from which particular website they are.
 

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #231 on: January 09, 2018, 10:09:35 am »
Why lots of people are using password managers in the first place, I don't know. Seems wildly insecure to me, though I am ofc no expert. Maybe I am being weird, but why put all your important "eggs" in one big digital basket?
There is a trade-off between convenience and security. You can't have both.
A password manager is convenient and somewhat safe compared to only one password, easy passwords or post-its.
Looking at the system and compatibility with humans, password managers are an acceptable solution.

It's bad news that the meltdown bug is this easy to exploit. With prefabricated victim software...
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #232 on: January 09, 2018, 10:10:08 am »
Hm, it looks to me that my win 7 computer has MAYBE been updated by 'windows update' to patch the known vulnerabilities for 'Meltdown' and 'Spectre', with KB4056894. The Microsoft article about this update, doesn't spell it out, and I have to freaking read other people's articles about KB4056894, which might not even be correct.

https://support.microsoft.com/en-us/help/4056894/windows-7-update-kb4056894

 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #233 on: January 09, 2018, 10:12:03 am »
Why lots of people are using password managers in the first place, I don't know. Seems wildly insecure to me, though I am ofc no expert.
Because otherwise you'll need to recycle your passwords which is much worse. You cannot remember 10's of them and remember from which particular website they are.

Are you saying that a password manager re-creates new passwords? That sounds unlikely, as I would think that you would have to manually change the passwords for all your websites anyway. Am I perhaps missing something here? (Edit: I guess a password manager could generate a random string of characters, but I would think that you would still do some manual work to start the process of changing passwords for every single website.)


Btw, I am thinking that professionally, so called 'key management' is an important aspect to say the military afaik, which has to issue new keys around so that they this way won't allow re-using old keying material, which presumably would be bad for anything to do with operational security. For civilian use, with the poor infrastructure of the internet, and computing in general, I can't imagine that it is a good idea to keep re making your passwords if the passwords were long and complicated in the first place. I would think that anyone having placed a keylogger on your keyboard or in your computer, like say some organization, would then be able to round up all your new passwords in a much shorter period of time.
« Last Edit: January 09, 2018, 10:24:49 am by Decoman »
 

Offline andtfoot

  • Supporter
  • ****
  • Posts: 352
  • Country: au
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #234 on: January 09, 2018, 10:25:22 am »
Why lots of people are using password managers in the first place, I don't know. Seems wildly insecure to me, though I am ofc no expert.
Because otherwise you'll need to recycle your passwords which is much worse. You cannot remember 10's of them and remember from which particular website they are.

Are you saying that a password manager re-creates new passwords? That sounds unlikely, as I would think that you would have to manually change the passwords for all your websites anyway. Am I perhaps missing something here?


Btw, I am thinking that professionally, so called 'key management' is an important aspect to say the military afaik, which has to issue new keys around so that they this way won't allow re-using old keying material, which presumably would be bad for anything to do with operational security. For civilian use, with the poor infrastructure of the internet, and computing in general, I can't imagine that it is a good idea to keep re making your passwords if the passwords were long and complicated in the first place. I would think that anyone having placed a keylogger on your keyboard or in your computer, like say some organization, would then be able to round up all your new passwords in a much shorter period of time.
You have to go around to the different websites to change the passwords, but the creation of the password can be randomly generated and usually can be auto-filled into the relevant fields. It means you can have a complicated unique password for each site without having to remember all of them.
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #235 on: January 09, 2018, 10:30:04 am »
Are you saying that a password manager re-creates new passwords? That sounds unlikely, as I would think that you would have to manually change the passwords for all your websites anyway. Am I perhaps missing something here?
You have one master password for password manager and separate password for each website. I can say from my own experience that using the same password on multiple websites is a very bad idea (I'm registered on at least 40 websites). I had my password stolen from one hacked website, I became aware of it when my skype account which had the same password started sending spam links. Then I changed that password where I remembered. But like after a year I got a call from airline company because someone tried to spend my bonus miles. And yep, I forgot to change my password there. Just in case to not look that stupid - I had separate passwords for things that involved money.

EDIT: I certainly know that password was stolen from a hacked website as I checked my email in pwned database. And Skype spam came from login via website, not my computer. Also I've seen same skype spam coming from few other people, guess their passwords were stolen the same way.
« Last Edit: January 09, 2018, 01:36:47 pm by wraper »
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #236 on: January 09, 2018, 11:26:41 am »
I like having huge random chars large passwords for anything remotely important, but on a piece of paper.
 

Offline wraper

  • Supporter
  • ****
  • Posts: 16864
  • Country: lv
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #237 on: January 09, 2018, 01:20:10 pm »
I like having huge random chars large passwords for anything remotely important, but on a piece of paper.
And you need to carry this piece of paper with you everywhere in the world. Someone else can steal a password from it, like your wife who is checking if you are cheating  >:D. Also it becomes completely impractical once there are more than a few passwords or when you need to change them.
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #238 on: January 09, 2018, 01:26:20 pm »
I use a box of filing cards...
 

Offline medical-nerd

  • Regular Contributor
  • *
  • Posts: 198
  • Country: gb
  • What's that coming over the hill?
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #239 on: January 09, 2018, 01:30:39 pm »
Hiya

Just gone through this thread - does the problem affect UltraSparc 4+ processors??
Is it time to power up my Sparc V490 servers??  (noisy beasts though)  ;D

Cheers


'better to burn out than fade away'
 

Offline AmperaTopic starter

  • Super Contributor
  • ***
  • Posts: 2578
  • Country: us
    • Ampera's Forums
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #240 on: January 09, 2018, 03:13:29 pm »
There may be problems with any CPUs that have speculative execution as part of the design, but you would have to test it out to see for sure, or go looking for someone who already has.
I forget who I am sometimes, but then I remember that it's probably not worth remembering.
EEVBlog IRC Admin - Join us on irc.austnet.org #eevblog
 

Online langwadt

  • Super Contributor
  • ***
  • Posts: 4427
  • Country: dk
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #241 on: January 09, 2018, 03:15:33 pm »
Why lots of people are using password managers in the first place, I don't know. Seems wildly insecure to me, though I am ofc no expert. Maybe I am being weird, but why put all your important "eggs" in one big digital basket?
There is a trade-off between convenience and security. You can't have both.
A password manager is convenient and somewhat safe compared to only one password, easy passwords or post-its.
Looking at the system and compatibility with humans, password managers are an acceptable solution.

It's bad news that the meltdown bug is this easy to exploit. With prefabricated victim software...

post-its seems like the safest option
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #242 on: January 09, 2018, 03:18:36 pm »
Apart from the massive IO...

But would that not be accomplished via a few memory map DMA calls.  Map the input files into memory, map the output file to memory, compute between the two.  The actual IO is handled by the kernel, DMA controller and MMU via page faults.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #243 on: January 09, 2018, 03:26:23 pm »
Apart from the massive IO...
It's about the amount of work per syscall. I assume a video encoder would read and write fairly large chunks of data while spending a lot of time processing each one, meaning the overhead would be low. A GPU-decelerated codec would be impacted more due to having to frequently call into the graphics driver.

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #244 on: January 09, 2018, 03:31:45 pm »
Depends as much on the filesystem implementation as the load profile. Consider nasty shit like MFT fragmentation on NTFS.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #245 on: January 09, 2018, 03:32:55 pm »
Apart from the massive IO...

But would that not be accomplished via a few memory map DMA calls.  Map the input files into memory, map the output file to memory, compute between the two.  The actual IO is handled by the kernel, DMA controller and MMU via page faults.

Depends on how the privilege separation works. If you’re working through a hypervisor this may make no difference.
 

Offline andersm

  • Super Contributor
  • ***
  • Posts: 1198
  • Country: fi
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #246 on: January 09, 2018, 03:45:02 pm »
Depends as much on the filesystem implementation as the load profile. Consider nasty shit like MFT fragmentation on NTFS.
Fragmentation doesn't concern the application.

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #247 on: January 09, 2018, 04:39:08 pm »
To be honest I'm not all that concerned.  I mostly live in Linux.  Linux is vunerable of course, but it is far less likely to be running malicious code than your average home Windows box.  About 99% of my Linux software is open source and compiled from source.  Therefore if it has malware in it it would be spotted and removed.

There is still a risk, but it's much less than your average Windows box which are metaphorically like a Saigon hooker.  So much nasty stuff in it you can see them crawling down the desktop's legs!  (sorry you got that image).

I do have a Windows laptop and a gaming machine which will now be put on quarantine, so no online banking, no sensitive stuff etc.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #248 on: January 09, 2018, 04:39:37 pm »
Meanwhile on twitter:


https://twitter.com/misc0110/status/948706387491786752

Why lots of people are using password managers in the first place, I don't know (Correction: I guess what had me wondering was, why would people think a password manage to be secure?). Seems wildly insecure to me, though I am ofc no expert. Maybe I am being weird, but why put all your important "eggs" in one big digital basket?

https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)

Also.. Reconstructing images from the memory apparently:
https://twitter.com/mlqxyz/status/950378419073712129
Sensible people don't put all their eggs in one basket. Using a password manager doesn't mean putting every single last password in there. However, we live in a world where you literally need an account to go to the barber and you can't realistically remember loads of different passwords. That's why you use a manager to keep track of passwords.

A sensible password strategy uses tiers for passwords of different values.  It's also good to realize that experts are aware passwords aren't ideal, but that we also haven't found the perfect replacement yet. There isn't one golden strategy, just incremental insights into what are bad ideas. Using the same password in multiple places is a bad idea. Using weak passwords is a bad idea. That's where password management comes in.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #249 on: January 09, 2018, 04:43:40 pm »
To be honest I'm not all that concerned.  I mostly live in Linux.  Linux is vunerable of course, but it is far less likely to be running malicious code than your average home Windows box.  About 99% of my Linux software is open source and compiled from source.  Therefore if it has malware in it it would be spotted and removed.

There is still a risk, but it's much less than your average Windows box which are metaphorically like a Saigon hooker.  So much nasty stuff in it you can see them crawling down the desktop's legs!  (sorry you got that image).

I do have a Windows laptop and a gaming machine which will now be put on quarantine, so no online banking, no sensitive stuff etc.
Your hubris might be expensive. You browse the web, I presume? Javascript is seen as a major possible vector and will run just as happily on your box as it does on Windows. You can compile from source until the cows come home and still have your passwords taken from under your nose. Security through obscurity never works.

Fanboy stances on this OS or that also don't help. The problem almost always is the user and rarely ever the OS. If it really were the OS, Windows wouldn't be so dominant in the very security concious enterprise market.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #250 on: January 09, 2018, 04:55:29 pm »
To be honest I'm not all that concerned.  I mostly live in Linux.  Linux is vunerable of course, but it is far less likely to be running malicious code than your average home Windows box.  About 99% of my Linux software is open source and compiled from source.  Therefore if it has malware in it it would be spotted and removed.

There is still a risk, but it's much less than your average Windows box which are metaphorically like a Saigon hooker.  So much nasty stuff in it you can see them crawling down the desktop's legs!  (sorry you got that image).

I do have a Windows laptop and a gaming machine which will now be put on quarantine, so no online banking, no sensitive stuff etc.
Your hubris might be expensive. You browse the web, I presume? Javascript is seen as a major possible vector and will run just as happily on your box as it does on Windows. You can compile from source until the cows come home and still have your passwords taken from under your nose. Security through obscurity never works.

Fanboy stances on this OS or that also don't help. The problem almost always is the user and rarely ever the OS. If it really were the OS, Windows wouldn't be so dominant in the very security concious enterprise market.

I'll update my browsers, but on that front I'm angry.  I have warned people for years to keep the damn script kiddies at bay.  Now we even have Javascript on servers (NodeJS) FFS and Javascript with memory access.  WTF?  Idiots.  One of the worst, most annoying languages ever written.  It should have remained a junk interrupted, sandboxed, mickey mouse script tool for making text flash and modifying HTML. </rant>

Compiling from source.  It's not obscurity, that's not the point of compiling from source.  In fact it's the polar opposite.

Windows is popular in the security conscious enterprise market because of the centralized management AD et al, because of "single vendor", because of support, because of... on and on and on.  None of them are to do with it being secure.  Secure enterprises can afford the teams of people required to keep a windows network lock down enough to keep it secure.  I'm sitting in one right now.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #251 on: January 09, 2018, 05:15:09 pm »
I'll update my browsers, but on that front I'm angry.  I have warned people for years to keep the damn script kiddies at bay.  Now we even have Javascript on servers (NodeJS) FFS and Javascript with memory access.  WTF?  Idiots.  One of the worst, most annoying languages ever written.  It should have remained a junk interrupted, sandboxed, mickey mouse script tool for making text flash and modifying HTML. </rant>

Compiling from source.  It's not obscurity, that's not the point of compiling from source.  In fact it's the polar opposite.

Windows is popular in the security conscious enterprise market because of the centralized management AD et al, because of "single vendor", because of support, because of... on and on and on.  None of them are to do with it being secure.  Secure enterprises can afford the teams of people required to keep a windows network lock down enough to keep it secure.  I'm sitting in one right now.
My remark about obscurity wasn't related to self compiling code, though I doubt it helps much.

The truth is all OSs are unsafe and very leaky. Windows, macOS or Linux, it's all the same. The main difference is that Windows is much more popular, and is therefore targeted more. Any modern OS is such a huge pile of code that it's inevitable to be full of errors and vulnerabilities. No OS escapes this.

Besides, this isn't an OS vulnerability. This is a hardware vulnerabilty. OS updates can mitigate it, but won't solve it. We're in this together.
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #252 on: January 09, 2018, 05:23:18 pm »
The problem with Javascript in the browser is that nowadays, to get better performance, it is downloaded as (minified) source and then compiled to native machine code instead of bytecode (like Java) or interpreted from source. Since the process 'sandbox' is now broken, thanks to Meltdown & Spectre, it is unsafe to download, compile and run ANY language, be it Javascript, Erlang, Snobol or CORAL66. At least with Java you only have to worry about the security of the JVM, not the actual code you may download. We will have to wait and see what these forthcoming browser 'fixes' amount to.

Server-side Javascript is no more or less dangerous than any other compiled language. The 'good parts' of Javascript, in its latest versions, are quite a pleasant programming language.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #253 on: January 09, 2018, 06:33:42 pm »
The truth is all OSs are unsafe and very leaky. Windows, macOS or Linux, it's all the same. The main difference is that Windows is much more popular, and is therefore targeted more. Any modern OS is such a huge pile of code that it's inevitable to be full of errors and vulnerabilities. No OS escapes this.

You can't just bundle all operating systems together.  They are all susceptible to bugs and exploits yes, but there are fundamental differences.

The one that is relevant is the ability to install software.  In Windows software is "live" out of the box.  On most domestic systems it can install itself and run itself, anything with a .exe is fair game and fully trusted software.  The stupid notifications you get are just ignored by 90% of people who invariably click "OK".  You just can't do that on Linux, for one you have to be root, second you have to actually mark it executable, thirdly, outside of a distribution Linux is not binary compatible, so one size doesn't fit all.  This is why Linux viruses are incredibly rare and don't propagate anywhere near as easily.   There are dozens of other examples between the two OSes to compare security, but it's safe to say that it is a lot easier to sneak mal-code onto a windows machine than a Linux one.  More recent versions of Windows are improving, but the basic architecture remains insecure as a multi-user system, it can be tamed, but it takes a LOT of effort to lock it down.  But lets not delve into that rabbit hole of this OS verus that (though granted I started it).

To exploit these hardware vulnerabilities you need to execute malicious code.  That was my point.  This is harder to do on Linux, historically and architecturally.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #254 on: January 09, 2018, 06:41:18 pm »
Server-side Javascript is no more or less dangerous than any other compiled language. The 'good parts' of Javascript, in its latest versions, are quite a pleasant programming language.

I just hate it.  I hate it's history, I hate it ethos, I hate it's structure.

It's got nothing to do with Java, that was just because someone invited the marketing team to the naming meeting and Java was a new buzz word.   It was never meant to be a language in the first place just a browser automation engine.  If anything it's more like Clojure which was a clunky, bizarre 1970s recursive language that still survive today in places.  Everything is a function that takes a function which returns a function with takes a function. <shudder>

Newer Javascript with modern frameworks like Angular is 'tolerable', but only just and if you look under the hood of Angular or NodeJS you find it jumping through all the hundreds of hoops and work arounds to make the thing work.  I spent a number of years writing enterprise front ends in Angular.

It's just a personal opinion, but Javascript is a botch that should have remained consigned to making text marques and flashing banners.  A browser automation framework.  Pampering the it's proponents and allowing it to develop into a compiled application language with raw memory, file, network access was a mistake, IMHO.  But maybe I'm just being bitchy.

https://www.destroyallsoftware.com/talks/wat
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #255 on: January 09, 2018, 06:48:26 pm »
You can't just bundle all operating systems together.  They are all susceptible to bugs and exploits yes, but there are fundamental differences.

The one that is relevant is the ability to install software.  In Windows software is "live" out of the box.  On most domestic systems it can install itself and run itself, anything with a .exe is fair game and fully trusted software.  The stupid notifications you get are just ignored by 90% of people who invariably click "OK".  You just can't do that on Linux, for one you have to be root, second you have to actually mark it executable, thirdly, outside of a distribution Linux is not binary compatible, so one size doesn't fit all.  This is why Linux viruses are incredibly rare and don't propagate anywhere near as easily.   There are dozens of other examples between the two OSes to compare security, but it's safe to say that it is a lot easier to sneak mal-code onto a windows machine than a Linux one.  More recent versions of Windows are improving, but the basic architecture remains insecure as a multi-user system, it can be tamed, but it takes a LOT of effort to lock it down.  But lets not delve into that rabbit hole of this OS verus that (though granted I started it).

To exploit these hardware vulnerabilities you need to execute malicious code.  That was my point.  This is harder to do on Linux, historically and architecturally.
I have absolutely no desire to start another war about OSs. Linux has been traditionally been less targeted because it's both less popular on the desktop and much more fragmented, as you state correctly. That's not the same as it being inherently secure, but whatever is the case, that's not a discussion suitable for this thread and not one I desire to pursue. Everyone can consider an OS of choice to be superior for whatever reasons he desires. I don't care.

It's also of no relevance to the current problem. Most Linux distributions have a browser in it out of the box and are therefore as susceptible to the kind of code execution that's needed for this vulnerability as any other OS. Linux, Windows, macOS, AMD, Intel - they're all at risk.

We really need to focus on solving this problem the best we can without getting sidetracked by irrelevant squabbles.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #256 on: January 09, 2018, 06:53:09 pm »
We really need to focus on solving this problem the best we can without getting sidetracked by irrelevant squabbles.

True but I really don't think the desktop is the issue we have right now.  Why hack one person when you can hack a million people?
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline metrologist

  • Super Contributor
  • ***
  • Posts: 2212
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #257 on: January 09, 2018, 06:57:29 pm »
What is the exposure really? If I go home and watch youtube all night, my yt password might be exposed? Assuming MS and Google don't just automatically load up all my passwords in memory. They probably do...
 

Offline Monkeh

  • Super Contributor
  • ***
  • Posts: 7992
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #258 on: January 09, 2018, 06:58:37 pm »
We really need to focus on solving this problem the best we can without getting sidetracked by irrelevant squabbles.

True but I really don't think the desktop is the issue we have right now.  Why hack one person when you can hack a million people?

Because the admins running the server with a million people to hack are paying attention, and the million people at home are burying their heads in the sand.
 
The following users thanked this post: Mr. Scram

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #259 on: January 09, 2018, 07:02:02 pm »
True but I really don't think the desktop is the issue we have right now.  Why hack one person when you can hack a million people?
The biggest threat by far is indeed the server space, where many servers often share the same hardware. This allows code execution on or from a server completely separated from yours, outside of your control. Obviously, most servers are maintained well and will therefore be patched properly. It's likely that malicious people will then target individual users, like ransomware has been doing lately. Code running from a website that's able to recover your administrator or sudo password or encryption passwords or keys from the computer's memory is an absolute nightmare, though websites aren't the only vector imaginable. There are many ways of running scrips in userspace, mainly because we have always counted on the separation doing its job. There is very little mitigation, because we never counted on it being a possibility. Even worse, some forms of mitigation in other areas make a system more vulnerable to this problem.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #260 on: January 09, 2018, 07:22:42 pm »
What is the exposure really? If I go home and watch youtube all night, my yt password might be exposed? Assuming MS and Google don't just automatically load up all my passwords in memory. They probably do...
Anything that's in memory can be read if someone manages to run code in userspace, the latter typically not being considered high risk. When you visit a website, this happens all the time. This vulnerability means malicious people can intercept any password, like your administrator password, encryption passwords and keys, SSL keys, you name it. In fact, they can intercept anything they want, but it makes more sense to go for short snippets of valuable data that give access to the other data. They can help themselves to everything that keeps the internet, your data and your money safe. You use encryption all the time without even realizing it, like when you browse this website. Our modern world is literally built on the protection this grants us and that protection is potentially gone. Obviously, with your passwords being exposed, you can then completely own a system and all the data on it.

At the same time, we shouldn't overstate the reach of this vulnerability. It doesn't mean attackers can take over your system without executing code on your side and it also doesn't mean they can just alter data or take over a system directly. That can be a consequence of what they learn, but the primary issue is that data that is supposed to be inaccessible and secret can be recovered and funnelled away.

When you know this, you might also understand why people are so worried about enterprise and cloud environments, where many customers often share the same underlying hardware thanks to virtualization. It means that a fully patched and completely up to date server can be attacked by code run on another virtual server sharing the same hardware, recovering passwords, databases, encryption keys and more. This is the primary worry everyone has, as it's how almost the whole internet is constructed. Only after that there are worries about individual systems. When criminals can't attack well maintained servers, they might very well attack much less well maintained computers at home.

However, with the flaw being in the hardware and not in the software it seems we might be able to mitigate the risk, but experts aren't sure it can actually be made safe without changing the hardware. Obviously, changing all the hardware in the world isn't done overnight, and isn't very economically and logistically feasible. We're still learning about the vulnerabilities, so it may turn out to be workable in the end or we may discover that we really do need to replace everything eventually to be completely safe.

If this were just about your Youtube password being exposed, we wouldn't have heard about it.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #261 on: January 09, 2018, 09:21:39 pm »
It's also not that easy to exploit to full potential, if I understand it correctly.  A lot of it is poking around randomly in the dark.

To get a full targeted exploit of something like a browser the attacker needs to be very specific about memory addresses and vectors so needs an understanding of the running programs memory in addition to a good understanding the kernel address space routines that will yield the details they need.   Such as the TLB maps and process descriptors.

Not saying because it's difficult it won't be done, but it's not like every script kiddy malware writer out there will do it either.

Note that the original 'authors' of the exploit determined they could read out kernel memory at something like 500Kbps.  So to dump the whole kernel would take quite a while.  Then they have to analyse that and find various offsets to the programs running, then know specifics about those programs to re-run the exploit and try and access the correct physical memory locations via the cached out-of-order executions access those locations.

As I understand it anyway. 

There are a lot of moving parts to a successful exploit and making it generic enough to run in Javascript in a browser and target any PC or any random application will not be easy or potentially even possible.   I expect attacks will need to be much more targetted.

Password managers have been mentioned and might probably be a primary target.  As will browser password auto-complete stores etc. 

One good thing is it's read only.  So they can't hack bits of memory to hijack things directly.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #262 on: January 09, 2018, 10:55:46 pm »
One good thing is it's read only.  So they can't hack bits of memory to hijack things directly.
Of course, if they can find and read the root/administrator password somewhere in kernel memory, then they can easily leverage that into total ownership of the system...
 

Online nctnico

  • Super Contributor
  • ***
  • Posts: 26906
  • Country: nl
    • NCT Developments
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #263 on: January 09, 2018, 11:15:08 pm »
And ofcourse only Windows7 & 8 get slower  :palm:
There are small lies, big lies and then there is what is on the screen of your oscilloscope.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #264 on: January 09, 2018, 11:20:06 pm »
On Unixes, passwords never exist in kernel memory. The kernel is only aware of UID and GID which it keeps in the kernel data structure. It has no idea what a password even is.

Only passwd and login handle passwords and they are user mode programs. passwd is setuid and login is only executable by root.

At best if there are stale pipes in memory then those could be revealed but that’s it. Even ssh is a user mode process and the kernel will only handle encrypted streams.

If they unmap the kernel and only the process and any libraries it talks to are loaded into the address space then this is total isolation. The process can’t see the kernel nor read any other processes. All it does is put some shit in some registers, pray to the kernel and it falls entirely out of existence when god (Linux) answers the prayer. If you get the prayer wrong or poke around the wrong bits of the universe,  behold for you are killed, unless you’re slightly attached to the universe still at which point you are a zombie. I don’t like zombies.  Zombies eat your brains.

Windows: fuck knows. Between COM, bits of msgina, lsass, bits of kernel OM, some sticky tape, string and some dead rodents, your guess is as good as mine. This is the company that managed to put LSASS in a little Hyper-V sponsored pit of despair, declare security victory and only the next day end up with a CVE. MSFT can’t outrun some crap kicked out by some hippies from the 1970s on way too much green that hasn’t changed a whole lot.

Psss idiots.

Disclaimer: slightly too much wine this evening.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #265 on: January 09, 2018, 11:23:10 pm »
And ofcourse only Windows7 & 8 get slower  :palm:
Is that speculation on your part or based on numbers?
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #266 on: January 09, 2018, 11:25:07 pm »
On Unixes, passwords never exist in kernel memory. The kernel is only aware of UID and GID which it keeps in the kernel data structure. It has no idea what a password even is.

Only passwd and login handle passwords and they are user mode programs. passwd is setuid and login is only executable by root.

At best if there are stale pipes in memory then those could be revealed but that’s it. Even ssh is a user mode process and the kernel will only handle encrypted streams.

If they unmap the kernel and only the process and any libraries it talks to are loaded into the address space then this is total isolation. The process can’t see the kernel nor read any other processes. All it does is put some shit in some registers, pray to the kernel and it falls entirely out of existence when god (Linux) answers the prayer. If you get the prayer wrong or poke around the wrong bits of the universe,  behold for you are killed, unless you’re slightly attached to the universe still at which point you are a zombie. I don’t like zombies.  Zombies eat your brains.

Windows: fuck knows. Between COM, bits of msgina, lsass, bits of kernel OM, some sticky tape, string and some dead rodents, your guess is as good as mine. This is the company that managed to put LSASS in a little Hyper-V sponsored pit of despair, declare security victory and only the next day end up with a CVE. MSFT can’t outrun some crap kicked out by some hippies from the 1970s on way too much green that hasn’t changed a whole lot.

Psss idiots.

Disclaimer: slightly too much wine this evening.
All OSs are vulnerable. The traditional flame wars can be omitted, this one hits everyone.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #267 on: January 09, 2018, 11:27:15 pm »
The mitigation strategies are different and the surface area is smaller on Unixes. Way smaller.

Also there is secondary mitigation with MAC (SELinux) which kills off a huge portion of entry vectors. Bar timing attacks via browsers, which are now pretty much mitigated by reducing timer resolution, the main attack vector is system access because you need to run arbitrary code on the target.

This isn’t an OS war, it’s a mitigation architecture war now.

Plus it looks like we can get some performance back now in a few months, looking at Linux 4.14. PCID is coming in. Incidentally OSX already uses thisnas does Hyper-V but not windows server (wtf)

This has been my life since it dropped for ref.
« Last Edit: January 09, 2018, 11:30:56 pm by bd139 »
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #268 on: January 09, 2018, 11:56:22 pm »
The mitigation strategies are different and the surface area is smaller on Unixes. Way smaller.

Also there is secondary mitigation with MAC (SELinux) which kills off a huge portion of entry vectors. Bar timing attacks via browsers, which are now pretty much mitigated by reducing timer resolution, the main attack vector is system access because you need to run arbitrary code on the target.

This isn’t an OS war, it’s a mitigation architecture war now.

Plus it looks like we can get some performance back now in a few months, looking at Linux 4.14. PCID is coming in. Incidentally OSX already uses thisnas does Hyper-V but not windows server (wtf)

This has been my life since it dropped for ref.
Please note that this paragraph is a generic rant, not aimed at you. I'm so sick of the petty pissing contests that break out whenever an OS is mentioned. "My OS better because..." Nobody cares. Every OS has merits the others don't. Every OS has some serious problems the others don't. They all sorta kinda work. Nobody cares that you compile from source [Linux], or have the biggest software library [Windows], or have a market share too small to make malware viable [macOS]. Shoo, go call your mother. She'll be happy to hear from you, as opposed to the rest of the world.

I don't believe reducing the resolution solves the problem. So far it only seems to make the attack noisier, but we all know that's just a matter of integrating a bigger dataset. But sure, maybe all the little bits add up and make an attack impractical.

Besides, it doesn't matter what the size of the hole is if the ship is sunk. We're all boned, and working as hard as we can to get unboned. That's all we can do right now.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #269 on: January 10, 2018, 12:15:54 am »
Indeed. Couldn’t agree more.

I’ve actually got about 500 machines on all platforms to save from this mess. There are no winners really. Everything is fucked, slow or on fire. Also some vendors who have patched their appliances have patched too quickly and botched it. Total nightmare.

Reducing resolution is adding a work factor yes. Is it enough, we don’t know yet. A good point.

So back in about 1995 I should have taken the the other coloured pill at this moment in time. Any one want to hire an EE. Will solder for pennies.
 
The following users thanked this post: Mr. Scram

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #270 on: January 10, 2018, 12:30:54 am »
Indeed. Couldn’t agree more.

I’ve actually got about 500 machines on all platforms to save from this mess. There are no winners really. Everything is fucked, slow or on fire. Also some vendors who have patched their appliances have patched too quickly and botched it. Total nightmare.

Reducing resolution is adding a work factor yes. Is it enough, we don’t know yet. A good point.

So back in about 1995 I should have taken the the other coloured pill at this moment in time. Any one want to hire an EE. Will solder for pennies.

"There are no winners really. Everything is fucked, slow or on fire. Also some vendors who have patched their appliances have patched too quickly and botched it. Total nightmare."

Yeah. Companies are just throwing out updates, which are obviously not thoroughly tested, will probably not fix the whole problem and likely cause other issues. We've seen a number of those already. Everyone is running around confused and making it up as they go along.

As it happens, I have some CCTV footage from actual IT departments. It's fairly grim stuff:


« Last Edit: January 10, 2018, 03:16:14 am by Mr. Scram »
 
The following users thanked this post: SeanB, bd139

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #271 on: January 10, 2018, 03:13:09 am »
And ofcourse only Windows7 & 8 get slower  :palm:
Is that speculation on your part or based on numbers?

Claim made by Microsoft :palm: and obviously it is a golden opportunity to cripple kill Win 7 & 8 and forcing users to upgrade to Win 10.

Quote :
With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.

Straight from Microsoft's Executive Vice President, Windows and Devices Group ...

https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/
« Last Edit: January 10, 2018, 08:18:13 am by BravoV »
 
The following users thanked this post: Mr. Scram

Online nctnico

  • Super Contributor
  • ***
  • Posts: 26906
  • Country: nl
    • NCT Developments
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #272 on: January 10, 2018, 07:02:59 am »
And ofcourse only Windows7 & 8 get slower  :palm:
Is that speculation on your part or based on numbers?
Dutch news article.
There are small lies, big lies and then there is what is on the screen of your oscilloscope.
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #273 on: January 10, 2018, 08:35:04 am »
On Unixes, passwords never exist in kernel memory.
They are never left hanging around for their sentimental value, naturally, but they do exist transiently in the buffers of the HID input driver or console serial driver.

Disclaimer: slightly too much wine this evening.
Entirely understandable, given the circumstances
 

Offline DimitriP

  • Super Contributor
  • ***
  • Posts: 1307
  • Country: us
  • "Best practices" are best not practiced.© Dimitri
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #274 on: January 10, 2018, 09:04:57 am »
And ofcourse only Windows7 & 8 get slower  :palm:

All those years most people thought "Intel inside" meant something different :)

It was just like the warning on every windows machine "Starting Windows"...



 
   If three 100  Ohm resistors are connected in parallel, and in series with a 200 Ohm resistor, how many resistors do you have? 
 
The following users thanked this post: stj

Offline IanMacdonald

  • Frequent Contributor
  • **
  • Posts: 943
  • Country: gb
    • IWR Consultancy
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #275 on: January 10, 2018, 09:05:27 am »
Probably the best answer to this is to do all browsing in a virtual machine.

That said, the real issue here is that this has existed since 1995 and no security expert noticed it until now.  During that time it may well have been exploited by bad guys. There is no way of telling if it has. :palm:

When you think about it, if you forget to lock your house or car, the security issue doesn't arise when you realise you did so.  It arises when you walk away without locking it. Likewise, assuming this vuln hasn't been exploited in over 20 years of the computer being 'left unlocked' is naive. This is the fallacy behind the idea that patching and updating makes a computer secure. It is only marginally better than a placebo.

Especially as there are thousands of similar vulns in all operating systems, still unpatched.

Linux and MacOS are in principle no better then Windows in this respect, since they are all based on C, whose buffer overflow risk is the No1 cause of vulns. What is really needed is a completely new OS that ditches all of this bad code.  :--

The decision to use C instead of Pascal for the IBM PC, must rank as the single worst decision in the entire history of computing. That said, the really inexcusable thing is that C was allowed to become entrenched in the IT industry even after its security flaws became apparent. So deeply entrenched that it's now going to take the IT equivalent of D-Day to oust it.  |O
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #276 on: January 10, 2018, 09:39:53 am »
I agree with C being a big problem but it's not the root of all evil here. We also don't use C for anything at all these days. It's python, C#, Java and Go. Go is looking like a good replacement for C in a lot of areas.

However none of the above languages prevent this issue. Also a VM won't help you at all here. And people did notice problems in this space as far back as 2005/7.

There are three travesties here:

1. We've allowed the glorified 8080 to progress as long as it has, tacking more bits to it, shovelling more turds onto the pile and hiding a RISC processor and all sorts of "go faster" hacks underneath it.
2. We've blindly used bits of computer science from the 1960's without formal verification on modern architectures. Turns out with all the hacks above, the output is not as deterministic as people were hoping.
3. There is actually no need for processors as fast as we have to get work done. We've been burning the "it's cheaper to make it fast later" paradigm candle.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #277 on: January 10, 2018, 10:38:24 am »
3. There is actually no need for processors as fast as we have to get work done. We've been burning the "it's cheaper to make it fast later" paradigm candle.

But you favor virtual machine based languages over C?

I'm a bit confused by the aggression against C.  Buffer overrun is not a C issue, it's a CPU issue.  If you ask the CPU to read memory and that memory is mapped it will.  Having languages/VM boundary check all your array accesses would have significant impact on performance and trash various coding styles with dynamic unbound arrays.

Bad code is bad code, moving it between languages is just like using public toilet paper, it just moves the problem around.

Pascal?  Seriously?  Look up what pascal was intended for.  Teaching students.  Yet oddly it's one of the weirder of the languages.  Only slightly better than BASIC in a lot of regards. Thankfully I haven't touched Pascal since the Amiga in the 90s.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #278 on: January 10, 2018, 10:47:02 am »
I favour virtual machine based languages over C because it's down to the implementation of the language to do the optimisations rather than the end user and it doesn't require recompilation then to add and remove instrumentation or optimisations.

Buffer overrun is a C issue because C has a virtual machine model as well (stack frames + heap) and offers no compile or execution time guarantees at all.

Pascal was rather nice, particularly in a p-code virtual machine environment. I have seen programs written on one architecture running on another before without modification and this was in the late 1980s. Then there was Turbo Pascal which paired with DESQview turned your little 386 into a stupidly reliable multitasking workstation.

Ada is another good one. Did a bit of that on PPC in the late 1990s. Absolutely bomb proof, apart from when it was actually used in a bomb and blew up.
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #279 on: January 10, 2018, 10:51:12 am »
I'll update my browsers, but on that front I'm angry.  I have warned people for years to keep the damn script kiddies at bay.  Now we even have Javascript on servers (NodeJS) FFS and Javascript with memory access.  WTF?  Idiots.  One of the worst, most annoying languages ever written.  It should have remained a junk interrupted, sandboxed, mickey mouse script tool for making text flash and modifying HTML.

Sorry, I like C as much as JS, both have their things, but which language hasn't?

Code: [Select]
((a,b)=>{[22,24,25].forEach((i)=>b+=a[i]+' '),alert(b+=a[30].split('').reverse().join(''))})("I have warned people for years to keep the damn script kiddies at bay.  Now we even have Javascript on servers (NodeJS) FFS and Javascript with memory access.  WTF?".replace(/[(.?.)]/g,'').split(' '),'')

« Last Edit: January 10, 2018, 10:55:53 am by GeorgeOfTheJungle »
The further a society drifts from truth, the more it will hate those who speak it.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #280 on: January 10, 2018, 11:11:31 am »
Sorry, I like C as much as JS, both have their things, but which language hasn't?

Common LISP :)
 

Offline GeorgeOfTheJungle

  • Super Contributor
  • ***
  • !
  • Posts: 2699
  • Country: tr
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #281 on: January 10, 2018, 11:13:16 am »
Dear applications programmers, systems programming is none of your business, so stop disparaging C you silly script kiddies.  >:D

--
Linus T.
The further a society drifts from truth, the more it will hate those who speak it.
 
The following users thanked this post: paulca

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #282 on: January 10, 2018, 11:22:18 am »
Buffer overrun is a C issue because C has a virtual machine model as well (stack frames + heap) and offers no compile or execution time guarantees at all.

Done much assembler?  C does this for a reason.  If you write any complex "functions" in asm you will find yourself using self rolled stack frames.  Though I agree that is some ways you are forced to do things how the compilers wants and have little to no control over that.

Heap is a C++ thing.  C you are on your own with malloc et al.  C++ has the whole botch local, reference, pointer, heap (new/delete construct/destruct) bollox that causes endless confusion and bugs, 16 different ways to swing the cat so nobody understands each others code.

All this said when you move to higher level languages you don't lose the baggage, you just add more on top and lose performance and control.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online Marco

  • Super Contributor
  • ***
  • Posts: 6721
  • Country: nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #283 on: January 10, 2018, 12:22:26 pm »
systems programming is none of your business, so stop disparaging C you silly script kiddies.  >:D

Once you learn to completely avoid buffer overflows and use after free, so never.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #284 on: January 10, 2018, 01:02:04 pm »
Buffer overrun is a C issue because C has a virtual machine model as well (stack frames + heap) and offers no compile or execution time guarantees at all.

Done much assembler?  C does this for a reason.  If you write any complex "functions" in asm you will find yourself using self rolled stack frames.  Though I agree that is some ways you are forced to do things how the compilers wants and have little to no control over that.

Yes. I've written a couple of non trivial compilers as well. The problem is that the hardware provides no isolation guarantees between stack frames. There are some admittedly clever things like stack canaries but these aren't comprehensive

Heap is a C++ thing.  C you are on your own with malloc et al.  C++ has the whole botch local, reference, pointer, heap (new/delete construct/destruct) bollox that causes endless confusion and bugs, 16 different ways to swing the cat so nobody understands each others code.

All this said when you move to higher level languages you don't lose the baggage, you just add more on top and lose performance and control.


malloc/free is just an abstraction over a heap. I have written allocators. Agree with C++. The problem with C++ is complexity.

Not quite true with higher level languages. Your job is to solve something in the problem domain, not incur problems outside of the problem domain. 99.9% of all problems don't need a system programming language and 80% of the problems in the system programming domain don't need low level languages. Literally the only two things that need direct memory access not via an abstraction are talking to hardware and any IO buffering etc.

Programmers have lost the right to manage their own memory at this point.

All of the above is solved easily (common lisp etc) but there's a lot of investment in a shitty way to do stuff that people don't want to burn or admit was wrong.
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #285 on: January 10, 2018, 01:46:09 pm »
Programmers have lost the right to manage their own memory at this point.

That's a slippery slope though.  Just look at Enterprise Java.  I get angry everyday about over engineering.  Object models of data structures and ORM frameworks, abstract, parallel builder patterns and the whole works.  When you cancel it all out against each other the net is 0.  0 fucking point.  They argue that it abstracts complexity into frameworks, but those frameworks don't get included in their complexity calculations...  Again public toilet toilet roll, it just moves the turd around.  Solving complexity with complexity is the Emperors new clothes of Object Orientation which has gone way too far IMHO that it's getting to ridiculous extremes.

The relevance I want to draw out, is that while you might be right that most programmers should stay in higher levels, they should be absolutely FORCED to spend some time doing low level C, Asm etc.  So they at least know what the computer is doing underneath.  Giving juniors high level languages from the get go and not providing them with any low level experience leads to extremely inefficient code.

I have seen people importing a mulit-megabyte jar in Java, rewriting a bunch of classes to support the framework in that jar all just to use a single string formatting function for dates!  Utter madness.... and they still got the fecking timezones wrong and it made it to production because nobody ever tested it in another timezone!

More related to electronics, I watched a video the other night that measured the "digitalWrite()" function in the Arduino libs taking approximately 179 instruction cycles!  Using it is fine, as long as you understand the cost.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #286 on: January 10, 2018, 01:57:48 pm »
No one said enterprise Java. That's it's own special turd :D

Agree with forcing people to do low level stuff as well. I think you should start at the bottom and work your way up. Step 1: here's a resistor ... Step 50: here's an AbstractBeanFactory.

Don't talk to me about time zones. We can't get anyone who knows their shit on that front. It's impossible. It's quite a difficult subject. I dealt with an event tracking system a while ago which used date spans. Turns out some clever fucker stored the start date in UTC and end date in local time. Bring on DST, all the events dropped an hour in length. CHAOS this caused. That's the sort of shit I get paid to fix.

Arduino is horrid. I use neat AVR-GCC for that banana and use the arduino as a dev board.
 

Offline dmills

  • Super Contributor
  • ***
  • Posts: 2093
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #287 on: January 10, 2018, 02:33:23 pm »
I would add to the low level direct memory pile anything needing DMA, anything with short deadline real time constraints, anything running without an OS where the peripherals are registers mapped into the memory map, and anything that needs to be deterministic (To the point of running from non cachable memory sometimes!).

C & C++ undoubtedly get used way outside the appropriate application domains, with C++ adding the fun of a leaky, fragile and complex set of abstractions, but actually there is a reason people still write in those languages that goes way past inertia. And some of us just like a language that (like Latin) stays still for years at a time.

If you are doing systems on small cores (Maybe a dozen kB of flash and a few kB of RAM), as I see it your choices are C and assembler, with maybe a very stripped down C++ as a third contender, what else is there that will actually let me deal with the memory mapped peripherals in a sane way?

Go and Rust will be taken seriously when there is a defined language that does not change every other month, and when there are a few different compilers implementing that defined language (Also a defined ABI for the common platforms would be nice).

Incidentally, GCs are right out! Reference count if you must, but garbage collection does bad things to realtime code (Yes I know bounded GCs exist, comment still usually stands with real implementations).
Personally, I favour the old embedded guys approach, figure out how many of what size at compile time and statically allocate the lot! You can still run off the end, but there will be no 'use after free' if you never free anything!

For date and time stuff, "Calendrical Calculations" is still my goto reference, but mixing UTC and well **Anything else** is just always going to be a source of pain.

Regards, Dan.
 
The following users thanked this post: Someone

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #288 on: January 10, 2018, 02:46:31 pm »
Can't disagree with anything there :)
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #289 on: January 10, 2018, 02:48:19 pm »
Incidentally, GCs are right out! Reference count if you must, but garbage collection does bad things to realtime code (Yes I know bounded GCs exist, comment still usually stands with real implementations).
Personally, I favour the old embedded guys approach, figure out how many of what size at compile time and statically allocate the lot! You can still run off the end, but there will be no 'use after free' if you never free anything!

In the stock exchange (order entry gateways where customers would complain if we breached 100uS wire to wire) we would pre-allocate everything.  We are talking about 60Gb of pre-allocation.  C++ abstractions where banned in most places.  Even function calls where frown upon in some places.  Loops where a matter of "find someone elses and add you code there".

There was a legacy Java version and while we measured our latency in microseconds (which I achieved a sub micro-second "New Order" message I was proud of), the Java guys measured in milliseconds.  We were averaging 50-80 micros they were averaging 10-20 millis.  But we had few outlyers and those caused by TCP reorders and stuff like Nagles not being configured.  Java had them all over the place measuring up to 1000 miliseconds while it resized a hash map or did some large scale garbage collection.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #290 on: January 10, 2018, 02:57:48 pm »
Why the hell you'd do that with Java I don't know. That's definitely real time territory.

Our guarantees are merely 100ms RTT 95th percentile. Than again most of our messages are fucking XML so that has it's own can of worms  :palm:
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #291 on: January 10, 2018, 03:06:33 pm »
Why the hell you'd do that with Java I don't know. That's definitely real time territory.

Our guarantees are merely 100ms RTT 95th percentile. Than again most of our messages are fucking XML so that has it's own can of worms  :palm:

We had a guy show up to an interview from the Java space.  He told us a story about his previous project and said it was an XML message gateway.  We asked how many messages per second.  He looked at us uncertainly and said, about 40 a minute with a questioning inclination.

We smiled affectionately and said, "We do 20,000 per second per session and we support 20 sessions per gateway." 

His mouth dropped.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #292 on: January 10, 2018, 03:15:23 pm »
We interview them occasionally as well. They're the sort of people who you ask what a profiler is and they think it's an attachment for their clippers.

Our front office stuff handles about 20,000 requests a second. And that's all shitty code written by the lowest bidder with layers and layers of accumulated crap built over 20 years. Fun fun fun. Thank god I only do messaging. We had one guy almost crying because he found latency on one page was due to 22 SQL joins with an aggregate of about 50 gig of data on one endpoint  :-DD
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #294 on: January 10, 2018, 03:23:43 pm »
How do you optimize performance on servers, especially when it comes to non-uniform memory access? (NUMA)
"What the large print giveth, the small print taketh away."
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #295 on: January 10, 2018, 03:28:36 pm »
SQL

Standard Quota of Latency
Yep that’s about it.

Or Shit Queries Lock which is fixed by Dickheads Bearing Attitudes.

Today’s exploration is Erlang and Riak which is fun. That goes like the clappers. Learning me some erlang for great good.

How do you optimize performance on servers, especially when it comes to non-uniform memory access? (NUMA)

One avoids the fuck out of NUMA architectures if you can.
 

Offline dmills

  • Super Contributor
  • ***
  • Posts: 2093
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #296 on: January 10, 2018, 03:40:14 pm »
And failing that, profile the hell out of it **ON THE EXACT HARDWARE AND OS AND OTHER CODE YOU WILL BE USING!**

Regards, Dan.
 

Offline Old Don

  • Regular Contributor
  • *
  • Posts: 163
  • Country: us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #297 on: January 10, 2018, 04:40:56 pm »
Warning Will Robertson, your self driving car is equipped with Takata air bags and Intel microprocessors. What could go wrong!   :wtf:
Retired - Formerly: Navy ET, University of Buffalo Electronic Tech, Field Engineer and former laptop repair business owner
 

Online Bicurico

  • Super Contributor
  • ***
  • Posts: 1714
  • Country: pt
    • VMA's Satellite Blog
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #298 on: January 10, 2018, 04:54:10 pm »
I have not read this whole thread, so excuse me if this thought has come up already, I think it hasn't.

I have a major question:

How much is this really a "bug" and Intel's fault?

I have read the technical explanation on the Raspberry Pi website (very well done) and to me it seems that the problem is not a "fault" but a "consequence" of trying to implement predicted branching, out of order processing, etc.

One could decide for security and switch it off, at the cost of less performance.

But it seems to me like with a car: you can turn off all driving assistance features and the car drives faster, doesn't reduce power on drifts, etc., but at the expense of less security.

How is Intel to blame for this?

I am not arguing in favour of Intel (or other chip manufacturers), I am just asking.

It would be a bug, if after a predictive branching you could issue 3 consecutive NOP commands that would dump memory pages to user space. That would be a bug.

But programming a routine that deliberatly will fool the predictive branching, making it wrong to then allocate the previously used memory blocks of discarded operations and read them out, does not necessarily seem like a bug to me?

Also, how probable is it to actually get to a memory page that contains usefull data? How would you then analyse binary data? Like getting the page that contains half the cryto string? How would you know which part it is? This is something I cannot visualize in my mind. Would be nice if someone could explain how these new "bugs" could in PRACTICE be expoited.

Mind me, I am not a low level programmer, nor am I too familiar with CPU architecture, hence why I have this question.

Also, how could you avoid this kind of attacks and still have all these speed optimizations?

Thanks,
Vitor

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #299 on: January 10, 2018, 05:04:00 pm »
How much is this really a "bug" and Intel's fault?

Simply because address space isolation is the bastion of multi-program, multi-user systems for the past 30 years.  It is meant to be absolutely impossibly for one program to read another's private memory.  The processor's architecture is meant to prevent this at a hardware level.  The bug means there is a way past this.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online Bicurico

  • Super Contributor
  • ***
  • Posts: 1714
  • Country: pt
    • VMA's Satellite Blog
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #300 on: January 10, 2018, 05:22:30 pm »
What I meant is: can the "bug" be prevented on a CPU that is using out-of-order processor, branch prediction, speculation, cache and side channel?
Is it possible to have address space isolation with branch prediction and out of order processing?
As far as I have read, the only CPU's that don't suffer from this "bug" are the ones that do not feature branch prediction and out of order processing.

Again, I am genuinely asking because I don't know the answer.

In my mind (oh God, I am listening to The Smiths - Heaven Knows I'm Miserable Now and was starting the sentece writing along...), which has a simplistic representation of how the CPU works, the only secur way I could imagine would be a cache cleaning routine, that would wipe any memory block that had to be dismissed, before allowing any other process to use it. I don't know how that would hit performance and if this would even make sense...

Regards,
Vitor

Offline dmills

  • Super Contributor
  • ***
  • Posts: 2093
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #301 on: January 10, 2018, 05:46:38 pm »
Such a cleaning routine would expose you the other way.... Now I am timing to see if my accessible cache line has been evicted from the cache by the speculative load!

Having the speculative load check the memory safety of BOTH branches before executing the cache load (And falling back on a pipeline stall followed by an in order load if the MMU reports that both addresses are not safe) looks like it would work, but would move the problem to the TLB (You would need to fall back it the TLB does not contain both possible target pages rather then loading a TLB entry!).
You would still have a small window between changing the MMU permissions and the speculative load that would need careful consideration as there might be a window of a few instructions there that could be exploited.

This is a non issue if you take care to ensure that you control the jobs running on your machines, which of course sucks for the cloud providers (My heart bleeds, bleeds I tell you!), and probably argues that we should NOT have ended up with turing complete web browsers!

I am surprised that folks are surprised by this, cache side channel attacks are a common and popular game for breaking badly written crypto and out of order execution and its interaction with the cache is about as hard to reason about as crypto implementations.


Regards, Dan.
 

Offline SeanB

  • Super Contributor
  • ***
  • Posts: 16284
  • Country: za
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #302 on: January 10, 2018, 05:59:12 pm »
Basically this was known about years ago, as an erratum in a datasheet about the superscalar architecture, having variable latency in branching, due to the speculative code execution, branch prediction and other fun things to do with caching. Due to the CPU being so fast that waiting for the slow ( to the CPU) L2 cache to respond to a memory access request would involve 100 or more clock cycles that could otherwise be used, and the L2 cache similarly would have a 1000 or more cycle ( to the processor all of eternity plus some more in waiting time for the first byte to come through, then again an eternity for the rest of the byte) to main memory for data. Thus the need to use that otherwise unused cycle time, first by having a prediction algorithm to do the OOO execution, the predictive branching and the speculative execution in the waiting time, and then having extra cache space and controllers to handle all the data that came with it before it was discarded, and then seeing that a separate set of those cache blocks and some logic meant you could have a virtual processor to use the time that L1 was stalled waiting for L2 or main to respond, thus you could create hyperthreads in the same silicon with minimal overhead in most cases.

All this means that execution times per instruction depend on the other things around, and this was considered an annoyance as it prevented simple loops from being a good time ( as before on older X86 code with predictable number of cycle execution times and thus a known time to do a loop) standard. then just recently somebody took a look at that and thought that if the timing depends on what happens around the thread then there could be information leaking out of there. Thus Spectre and Meltdown, and previously Rowhammer where they thought about that old bug in memory, of bounce being an issue with memory cells if there was enough noise induced into a cell, to cause local reference rails to rise enough to cause a flipped bit in adjacent cells of memory.
 

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #303 on: January 11, 2018, 03:18:40 am »
Simply because address space isolation is the bastion of multi-program, multi-user systems for the past 30 years.  It is meant to be absolutely impossibly for one program to read another's private memory.  The processor's architecture is meant to prevent this at a hardware level.  The bug means there is a way past this.

IBM should have known better but I saw a list of vulnerable processors which included theirs.  I think their Z series was on it.

What I meant is: can the "bug" be prevented on a CPU that is using out-of-order processor, branch prediction, speculation, cache and side channel?
Is it possible to have address space isolation with branch prediction and out of order processing?
As far as I have read, the only CPU's that don't suffer from this "bug" are the ones that do not feature branch prediction and out of order processing.

The thing in common with the processors which are vulnerable to Meltdown is that permission checks occur at instruction retirement which makes sense because that is where instruction faults must be resolved.  By definition, an instruction fault during speculation is irrelevant unless that side of the branch is taken which is why the exploit can take advantage of speculative instruction faults without causing an actual instruction fault which would be acted on.

All that is necessary to prevent Meltdown is an earlier permission check which either blocks speculative loads entirely or blocks the speculatively loaded data from being operated on during speculative instructions.  AMD apparently does this by invalidating (but not flushing) TLB entries on CR3 register changes which yields the benefits of the software workaround without the performance penalty and testing permissions of the speculative load before instruction retirement.

Having the speculative load check the memory safety of BOTH branches before executing the cache load (And falling back on a pipeline stall followed by an in order load if the MMU reports that both addresses are not safe) looks like it would work, but would move the problem to the TLB (You would need to fall back it the TLB does not contain both possible target pages rather then loading a TLB entry!).

There are no current processors which speculatively execute both sides of a branch which Wikipedia calls "eager execution".  If they did, then branch prediction would not be necessary because every branch would be automatically predicted correctly 100% of the time in retrospect.
 

Offline BrianHG

  • Super Contributor
  • ***
  • Posts: 7733
  • Country: ca
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #304 on: January 11, 2018, 03:36:27 am »
LOL, I think the Motorola 68040 back in the day already had branch speculation caching as well.  Though, I don't believe it had the processing power with high resolution timers to take advantage of the flaw in the same way today's cpus can.
 

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #305 on: January 11, 2018, 03:46:44 am »
Say there is a bad guy, and about to do a crime, also he worked as a programmer in a company that he has the know how the application's internal work that is used by the company.

Its running at an external hosting service to serve all their back office activities, say like general ledger, customers information or hell, even billing.

Now, once the guy quit the company, assuming he can order the same hosting service running at the "exact" same host as the company is using, and then do the snooping say all the customers info and etc and sell it to the company's competitor.  >:D

Does this bug traceable if it happened ? I mean in system log ?

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #306 on: January 11, 2018, 04:12:18 am »
Does this bug traceable if it happened ? I mean in system log ?

The data leak occurs through speculated instructions which are never retired as part of the visible instruction stream.  This is why monitoring for access violations will not reveal anything.  As far as the CPU is concerned, they never happened. 

If someone profiled the code they might wonder what it was doing; it might not seem to be getting anything done while using a lot of processor cycles.
 

Offline BravoV

  • Super Contributor
  • ***
  • Posts: 7547
  • Country: 00
  • +++ ATH1
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #307 on: January 11, 2018, 04:16:45 am »
Does this bug traceable if it happened ? I mean in system log ?

The data leak occurs through speculated instructions which are never retired as part of the visible instruction stream.  This is why monitoring for access violations will not reveal anything.  As far as the CPU is concerned, they never happened. 

If someone profiled the code they might wonder what it was doing; it might not seem to be getting anything done while using a lot of processor cycles.

As I suspected, if the above scenario happened, it will be untraceable crime isn't it ?

I guess even the authority will have a real problem proofing the crime in the court.

Offline David Hess

  • Super Contributor
  • ***
  • Posts: 16615
  • Country: us
  • DavidH
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #308 on: January 11, 2018, 04:18:55 am »
As I suspected, if the above scenario happened, it will be untraceable crime isn't it ?

I guess even the authority will have a real problem proofing the crime in the court.

People are usually caught through means other than technical so I doubt it will make a difference.  The perpetrator would be a former employee who stole confidential information and that would be enough.
 

Offline Mr. Scram

  • Super Contributor
  • ***
  • Posts: 9810
  • Country: 00
  • Display aficionado
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #309 on: January 11, 2018, 08:00:55 am »
Probably the best answer to this is to do all browsing in a virtual machine.

That said, the real issue here is that this has existed since 1995 and no security expert noticed it until now.  During that time it may well have been exploited by bad guys. There is no way of telling if it has. :palm:

When you think about it, if you forget to lock your house or car, the security issue doesn't arise when you realise you did so.  It arises when you walk away without locking it. Likewise, assuming this vuln hasn't been exploited in over 20 years of the computer being 'left unlocked' is naive. This is the fallacy behind the idea that patching and updating makes a computer secure. It is only marginally better than a placebo.

Especially as there are thousands of similar vulns in all operating systems, still unpatched.

Linux and MacOS are in principle no better then Windows in this respect, since they are all based on C, whose buffer overflow risk is the No1 cause of vulns. What is really needed is a completely new OS that ditches all of this bad code.  :--

The decision to use C instead of Pascal for the IBM PC, must rank as the single worst decision in the entire history of computing. That said, the really inexcusable thing is that C was allowed to become entrenched in the IT industry even after its security flaws became apparent. So deeply entrenched that it's now going to take the IT equivalent of D-Day to oust it.  |O
Virtual machines or sandboxing aren't effective in this case. That's pretty much the cause of all the consternation. Normally, you could assume that code run in a sandbox or VM could only touch its own userspace. Now it turns out that it could very well read data outside of its own area, breaking the barriers we rely upon for security. Data can leak between user and kernel, sandbox and kernel or VM and another VM.

Even though it's a complex attack, there's no doubt that malware makers are working on weaponizing it as we speak. It's likely that it will then be sold off to anyone willing to pay in a convenient package, so the smaller fish don't have to develop the complicated software themselves. Malware has unfortunately become a proper business and people have deep pockets to invest in new ways to make our lives a bit more difficult.
 

Offline dmills

  • Super Contributor
  • ***
  • Posts: 2093
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #310 on: January 11, 2018, 09:32:00 am »
but would move the problem to the TLB (You would need to fall back it the TLB does not contain both possible target pages rather then loading a TLB entry!).

There are no current processors which speculatively execute both sides of a branch which Wikipedia calls "eager execution".  If they did, then branch prediction would not be necessary because every branch would be automatically predicted correctly 100% of the time in retrospect.
That is not quite what I was getting at, the question is not one of executing both sides of a branch, but "Could both conditions of this branch execute without causing a cache or TLB change before retirement?", execution has nothing to do with it, the question is will either condition of this branch change the cache or TLB state in a way that differs between the two branches. 

Of course thinking about it, even this does not really do it, because I can still use the timing differences between the speculation ok (Both things are in cache and TLB) case and the no speculation because one of these things is not in the cache or TLB to extract information, it is just another level of indirection!

Regards, Dan.
 

Offline Decoman

  • Regular Contributor
  • *
  • Posts: 161
  • Country: no
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #311 on: January 15, 2018, 03:59:53 pm »
And, somewhat related (to Intel and computer security):

"INTEL AMT SECURITY ISSUE LETS ATTACKERS BYPASS LOGIN CREDENTIALS IN CORPORATE LAPTOPS"
https://press.f-secure.com/2018/01/12/intel-amt-security-issue-lets-attackers-bypass-login-credentials-in-corporate-laptops/

"Intel AMT is a solution for remote access monitoring and maintenance of corporate-grade personal computers, created to allow IT departments or managed service providers to better control their device fleets. The technology, which is commonly found in corporate laptops, has been called out for security weaknesses in the past, but the pure simplicity of exploiting this particular issue sets it apart from previous instances. The weakness can be exploited in mere seconds without a single line of code."

"To exploit this, all an attacker needs to do is reboot or power up the target machine and press CTRL-P during bootup."

"Although the initial attack requires physical access, Sintonen explained that the speed with which it can be carried out makes it easily exploitable in a so-called “evil maid” scenario. “You leave your laptop in your hotel room while you go out for a drink. The attacker breaks into your room and configures your laptop in less than a minute, and now he or she can access your desktop when you use your laptop in the hotel WLAN."

"The issue affects most, if not all laptops that support Intel Management Engine / Intel AMT. It is unrelated to the recently disclosed Spectre and Meltdown vulnerabilities."
« Last Edit: January 15, 2018, 04:01:50 pm by Decoman »
 
The following users thanked this post: cdev

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #312 on: January 15, 2018, 04:22:17 pm »
 :palm:

This should be turned off by default. First thing we do is kill AMT on our laptops fortunately.
 

Offline stj

  • Super Contributor
  • ***
  • Posts: 2155
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #313 on: January 15, 2018, 10:48:37 pm »
:palm:

This should be turned off by default. First thing we do is kill AMT on our laptops fortunately.

unless your removing the module with a bios editor, i wouldnt assume it's "off"

and on that subject - [CRTL]-[P] anybody?!!
http://www.theregister.co.uk/2018/01/12/intel_amt_insecure/
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #314 on: January 16, 2018, 12:02:07 am »
The system is broken.
"What the large print giveth, the small print taketh away."
 

Offline stj

  • Super Contributor
  • ***
  • Posts: 2155
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #315 on: January 16, 2018, 12:40:07 am »
The system is broken.
or the system is by design.
 

Offline timb

  • Super Contributor
  • ***
  • Posts: 2536
  • Country: us
  • Pretentiously Posting Polysyllabic Prose
    • timb.us
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #316 on: January 16, 2018, 12:40:57 am »
The system is broken.

The BIOS’s closed.
The can’o’worms open.
Hackers ain’t got nothing to lose, they rollin’.
So good night cruel world, I’ll see you in the morning.
Any sufficiently advanced technology is indistinguishable from magic; e.g., Cheez Whiz, Hot Dogs and RF.
 
The following users thanked this post: Richard Crowley

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #317 on: January 16, 2018, 08:11:06 am »
This may sound like paranoia but trust me it's not.  Governments have been building covert snooping backdoors into teleco hardware for years.  Why not domestic hardware.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
 

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #319 on: January 16, 2018, 09:06:17 am »
There are cloud managed routers by Cicso. They don't even need to intercept the package.
 

Online Marco

  • Super Contributor
  • ***
  • Posts: 6721
  • Country: nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #320 on: January 16, 2018, 09:13:53 am »
If you don't have your own industry to manufacture your own telecom equipment you don't have security.

China has it right ... hell, as an European company scared of industrial espionage I'd trust Huawei over Cisco, they are more desperate for approval. The US is just so blatant in it's total disregard for its "allies", especially the non 5 eyes ones.
 

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #321 on: January 16, 2018, 09:45:37 am »
There are a few European network gear companies though, Nokia, Mikrotik, AVM... Not enough.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #322 on: January 16, 2018, 09:51:25 am »
I certainly wouldn't trust Huawei. NSA are targeting their hardware for implants.

Best approach for security is dumb switching, intelligent nodes, TLS with PFS or SSH between all nodes and assume that your entire network is insecure. Hardware encrypted disks with keys stored in TPM slows physical attacks down. Cold booting with a TPM is difficult if not impossible. Also some thermite filled plant pots and numerous tamper switches in the rack  :-+

Any black box closed source appliance and you're SOL already otherwise. Can't win this battle with any closed source appliances. It's hard enough dealing with shit like ME / AMT.

Gonna get me a Z80 based X25 / TNC and use packet radio. That'll not have any implants in it :D
 

Offline paulca

  • Super Contributor
  • ***
  • Posts: 4051
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #323 on: January 16, 2018, 09:57:13 am »
Indeed. Cisco implants for example:

https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/

That seems a targetted intercept and bug approach.

What I am talking about is "out of the factory" fitted with a covert channel.  Not mentioning the company, but while programming a front end management tool for a domestic broadband optical "OLT" 'head end' we were told there was one more interface, but we can't see it and not even the OS developers are allowed to see it or make it's presence known in diagnostics.  It is installed in hardware and the binary component that allows control over the link is provided to them.  The OS is not even allowed to show it's existence never mind if it's in use, but all units shipped must have it and it must be connected to a special link while in service.

All very cloak and dagger and the designers of the system didn't know much about what it actually did, except it was expected it could tap any of the optical interfaces and thus receive all data sent and received to all 64 or so connected premises on that port.

This was circa 2015.  A US company.
"What could possibly go wrong?"
Current Open Projects:  STM32F411RE+ESP32+TFT for home IoT (NoT) projects.  Child's advent xmas countdown toy.  Digital audio routing board.
 

Online bd139

  • Super Contributor
  • ***
  • Posts: 23024
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #324 on: January 16, 2018, 10:12:35 am »
Oh nice. I'd be shitposting that all over the Internet if I got my hands on it.

Every nefarious fucker out there doing this sort of shit needs to watch their companies burn.
 

Online Marco

  • Super Contributor
  • ***
  • Posts: 6721
  • Country: nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #325 on: January 16, 2018, 01:40:04 pm »
These implants still need information from the manufacturers, they need to be indistuingishable after all and they don't want to spend months after each new model without intercept capability.

Really the interception is mostly to remove liability from Cisco.
 

Offline MT

  • Super Contributor
  • ***
  • Posts: 1616
  • Country: aq
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #326 on: January 16, 2018, 07:32:20 pm »
 Libtards; Russians infiltrated the election! Trumptards; No it was NSA! :blah:

NSA dont even have to do implants, just do speculative branching!

My Huawai smartpone is doing smart things , not for me but for Chinese GOV and NSA!

My bank says i have zero money on my account, i show then my draft there was a million yesterday, i accuse them for fraud they deny, i sue, then what? banks and NSA in conspiracy with US and Russian Oligarchs. :scared:
« Last Edit: January 16, 2018, 07:34:21 pm by MT »
 

Offline cdev

  • Super Contributor
  • ***
  • !
  • Posts: 7350
  • Country: 00
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #327 on: January 16, 2018, 08:11:21 pm »
Performance isn't that important in the grand scheme of things, so what, the 10-30% performance hit is basically a few months worth of progress..

OTOH, people's privacy and security is really important.
Lots of really sleazy people out there.

"What the large print giveth, the small print taketh away."
 

Offline TerraHertz

  • Super Contributor
  • ***
  • Posts: 3958
  • Country: au
  • Why shouldn't we question everything?
    • It's not really a Blog
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #328 on: January 24, 2018, 07:01:09 am »
https://www.rt.com/news/416712-intel-bug-fix-problems/
‘WTF is going on?!’ Linux creator attacks Intel as it retracts ‘garbage’ fix for critical bug

Quote
"As it is, the patches are COMPLETE AND UTTER GARBAGE," Torvalds said in a message posted to the Linux kernel mailing list on Sunday.

 "All of this is pure garbage. Is Intel really planning on making this sh*t architectural?" he asked. "Has anybody talked to them and told them they are f*cking insane? Please, any Intel engineers here - talk to your managers."]

 Torvalds said that the best possible solutions for the company would be to recall two decades worth of products and to give everyone free CPUs. But instead, Intel is trying to avoid huge losses and further damage to its reputation, and intends to continue shipping flawed hardware with software protection which will be turned off by default, he explained.

Actually it's about 15 years, not two decades. But who's counting?

I'm loving this drama. I've long felt that CPUs were getting far too complex, and all the out of order and speculative  execution, combined with multi-level caches, exploding combinatorial complexity, would eventually bite back. Not to mention enjoying seeing Karma finally come to a company that spends so much of it's time embedding entire hidden system architectures (the IME, running Minix, with full access to TCP/IP) that were always obviously intended as intelligence/gov backdoors invisible to users. And are now _known_ to be for that, with other justifications just shallow excuses. Burn, Intel, burn.
Collecting old scopes, logic analyzers, and unfinished projects. http://everist.org
 

Offline nfmax

  • Super Contributor
  • ***
  • Posts: 1560
  • Country: gb
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #329 on: January 24, 2018, 09:51:59 am »
Breaking news!
Forty years of steadily increasing processor power come to a sudden halt - Moore later
 
The following users thanked this post: cdev, Jeroen3, GeorgeOfTheJungle, Mr.B, Jacon, paulca

Offline Jeroen3

  • Super Contributor
  • ***
  • Posts: 4078
  • Country: nl
  • Embedded Engineer
    • jeroen3.nl
Re: Memory management bug in Intel CPUs threatens massive performance hits.
« Reply #330 on: September 28, 2018, 08:45:21 am »
You found a memory leak in firefox? Exciting... or not...  :P

What did you expect a "free unused memory" addon was going to do? Free memory means you've paid too much.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf