rigoletto@
Developer
- Thread Starter
- #126
For reference:
https://lists.freebsd.org/pipermail/freebsd-security/2018-January/009719.html
Edit: and https://reviews.freebsd.org/D13797 (linked to from the above message.)
More Meltdown fixes
If you’re on the bleeding edge of DragonFly and already updated for Meltdown fixes, there’s a few more commits you’ll want to get.
Matthew Dillon wrote a summary of the current status, noting there’s not much you can do for Spectre beyond new hardware. There is an update to the “defensive browser setup” plan for DragonFly (using –site-per-process) that can help at least with Javascript versions of Spectre.
Is it only DragonFly that has a fix currently?
https://www.reddit.com/r/freebsd/co...ade_aware_of_meltdown_and_spectre_in/ds9tf3s/
Nothing yet from Net or Open either?
For reference:
https://lists.freebsd.org/pipermail/freebsd-security/2018-January/009719.html
Edit: and https://reviews.freebsd.org/D13797 (linked to from the above message.)
Edit 2: Fixed link
Interesting explaination why the Raspberry Pi isn't vulnerable (and why others are):
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
In short: "The lack of speculation in the ARM1176, Cortex-A7, and Cortex-A53 cores used in Raspberry Pi render us immune to attacks of the sort."
I think you are right. But:Greetings all,
this may be a naive question, but I am no computer science expert.
As I understand it, an illicit software still must be installed to take advantage of the bugs, er, features. So, if an individual is careful about the attack channels, i.e., does not visit shady web-sites, has java-script turned off, is careful with opening strange files and attachments, etc., how big the risk really is?
Or am I completely missing an important concept?
Kindest regards,
M
Absolutely correct. To exploit these bugs, an exploit must be running on your machine. The best protection against these bugs is to only allow trusted users to access your machine (which is easy for a single-user desktop/laptop, a bit harder for a shared server), and then ask those users to only install or run trusted software.As I understand it, an illicit software still must be installed to take advantage of the bugs, er, features. So, if an individual is careful about the attack channels, i.e., does not visit shady web-sites, has java-script turned off, is careful with opening strange files and attachments, etc., how big the risk really is?
And as you point out, the big gap in this is the web browser. We have gotten into the bad habit of allowing any arbitrary Java and Javascript to run in our browser windows. And in their implementation, these languages allow people to perform arbitrary memory accesses and arbitrary instructions.
Common/widespread poor web page design nowadays more often leaves no option other than 1. enable scripts or 2. search/use elsewhere. The new version of NoScript for Firefox 57.0.4 (that is patched for exploits) is also pretty poor IMO.One more reason to use the NoScript extension and only allow select scripts to run.
uMatrix is really nice.Common/widespread poor web page design nowadays more often leaves no option other than 1. enable scripts or 2. search/use elsewhere. The new version of NoScript for Firefox 57.0.4 (that is patched for exploits) is also pretty poor IMO.
Thanks. I'll keep that in mind. Still using firefox-esr 52.5.2 as my general use browser in which NoScript works great, and on my BSD boot I don't install any addons anyway.uMatrix is really nice.
How do you set defensive settings? Generally I have a anti add /etc/hosts file (lots of entries), I also have NoScript, and Ublock Origin installed, but I've never changed it from its default settings (seems to work fine with that, but if there is a more defensive option I'd like to try that out). I have looked through the dashboard options, but didn't see anything obvious about changing the settings to being even more secure.uBlock Origin with defensive settings: all is blocked except what I selectively allow.
Nothing yet from Net or Open either?
Yes, confirmed, I've been layely looking for a security update on pkgsrc.se, and today found it had just been submitted sysutils/intel-microcode-netbsdTechnically the NetBSD users can use the sysutils/intel-microcode-netbsd to update the latest cpu firmware from Intel.
Log message: Update Intel microcode with newest version which, hopefully, has more fixes for Meltdown and Spectre vulnerabilites
Update Intel microcode to 20180108
MFH: 2018Q1
Microcode updates on DragonFly
One side effect of Meltdown/Spectre are CPU microcode (firmware) updates. For future needs: sysutils/devcpu-data is the port that has the updates for Intel, and cpucontrol(8) is the program you run on DragonFly to add them.
I haven’t used this myself, yet, so I can’t tell you how necessary an immediate update could be – but you will probably want to use it soon.
Update: Newer CPUs might require this sizing change.
Not sure if it was mentioned this already, but here's the microcode from Intel: https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=122139
What I'm confused about is -- what does the microcode fixes ? Does it mean OS doesn't need to be patched ?