cynicalsecurity is a user on bsd.network. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

cynicalsecurity @cynicalsecurity@bsd.network

This talk contains an interesting idea: emulating Instruction Set Architectures on function-level granularity using NX/execute-disable to trap calls crossing ISA boundaries. The application is using QEMU in UEFI on Aarch64 to run x86_64 Option ROMs. This allows 64-bit ARM code to call x86_64 code, which is emulated, that in turn can call back into Aarch64 code etc.

Video: youtube.com/watch?v=uxvAH1Q4Mx
Slides: linux-kvm.org/images/b/b4/QEMU
Code: github.com/ardbiesheuvel/X86Em
Further info: suse.com/c/revolutionizing-arm

Thank you for disabling HyperThreading on Intel. I could not agree more.

HyperThreading was a mis-guided attempt at improving performance of Java threads by copying the SPARC processors without having the SPARC architecture… as usual with these marketing-driven issues it is coming back to bite Intel (and us…).

I never, literally never, ran a piece of code benefitting from HyperThreading nor ever heard anyone brag about it.

Just renewed my m:tier subscription - Platinum even though it is a huge dent in my budget.

… and GRX got slammed with a big invoice:

"Court Orders Open Source Security, Inc. and Bradley Spengler To Pay $259,900.50 To My Attorneys"

perens.com/2018/06/10/court-or

Oh look, Theo de Raadt seems to confirm my feeling regarding Intel Hyperthreading that I tooted about yesterday:

marc.info/?l=openbsd-tech&m=15

See also this discussion/rant (with @mulander @cynicalsecurity @csirac2) about Hyperthreading from January:

mastodon.social/@Kensan/992990

#Intel #LazyFP vulnerability: Exploiting lazy FPU state switching

Earlier this year, Julian Stecklina (Amazon) and Thomas Prescher (Cyberus Technology) jointly discovered and responsibly disclosed another vulnerability that might be part of these, and we call it LazyFP. LazyFP (CVE-2018-3665) is an attack targeting operating systems that use lazy FPU switching. This article describes what this attack means, outlines how it can be mitigated and how it actually works.

blog.cyberus-technology.de/pos

responsible disclosure Show more

OK, so doing the following fixes the issue:

* syspatch -r 014_ipsecout # to revert the patch
* reboot
* system is fine
* syspatch it again
* reboot
* system is fine

It appears that the first relinking of the kernel had an effect.

Trying to reproduce.

Interesting problem:

Installing 014_ipsecout on an 6.2 machine (Lenovo ThinkPad) causes it to become substantially slower (windowing is sluggish) even though there is no IPsec in use on the system.

Reverting the patch "cures" the problem.

Trying to apply & reboot on a server to see what happens.

The amount of double backflips which are taking place to avoid mentioning the word in the Intel "Lazy FPU" issue is mind-boggling.

What is even more amazing is how this avoidance is taking place despite people like Colin Percival specifically and openly crediting Theo's talk at BSDcon as the source of his knowledge.

The next OpenBSD cover had better be "Puffy the Pirate" to fully support the pariah status enjoys…

Ridiculous.

Colin Percival tweeted a short thread on the “Lazy FPU” vulnerability that was just disclosed (CVE-2018-3665).

Colin credits his learning about it to Theo de Raadt. Took him ~5 hours to come up with working exploit code.

twitter.com/cperciva/status/10

More info on seclists.org and discussion on lobste.rs.

seclists.org/oss-sec/2018/q2/1

lobste.rs/s/qotnxq/confirmed_s

4.1.22 for

Now with accept4(2), which saves us a round trip to the kernel to get non-blocking sockets.

marc.info/?l=openbsd-tech&m=15

(I already had the improved refuse-any option cherry picked for OpenBSD)

@lattera now I need to try and do the same to link-up (via @phessler?)

Is someone from in touch with PINE64 at all?

The most beautiful feeling ever: on the birdsite I linked up @lattera with PINE64 in the vain hope of getting him a device to work on and they replied…

I would have never thought it would happen.

:)

@lattera have you any experience of running FreeBSD (or, better, HardenedBSD) on an HP EliteBook 840 G5? I am probably getting one for work (I have no say in the matter).

Specs here: store.hp.com/us/en/pdp/hp-elit

Does anyone know if, besides the blinkenlichten case by @jjg (see Rain Mk. II,
hackaday.com/2018/03/21/everyo) there are any other cases for the PINE64 ClusterBoard?

I haven't been able to find any nor any good recommendations.

"semi-eager FPU switching" marc.info/?l=openbsd-cvs&m=152 #OpenBSD

"3) post-Spectre rumours suggest that the %cr0 TS flag might not block speculation, permitting leaking of information about FPU state (AES keys?) across protection boundaries."

I am amazed at the amount of centralisation on "other people's machines" which the free/open-source movement blindly supports.

Just one of them going out of business or going Evil and so much would be lost.

How many projects rely on Google in some way? How many on Github? How many on Microsoft?

The PINE64 people have come up with the necessary accessories to the Rock64Pro board which includes a PCI-e slot:

* RockPro64: pine64.org/?page_id=61454
* PCI-e to dual SATA II: pine64.org/?product=rockpro64-
* Prototype NAS case: forum.pine64.org/showthread.ph

things are starting to warm up dramatically. My plan remains to migrate to a ClusterBoard-based design with SOPINE modules "per-machine" but now the NAS feeding them NFS need not be a Synology…