Caporegime
This is just ad hominem. Play with your own straw man.
I get the impression you're battling with the Intel PR machine here.
Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.
This is just ad hominem. Play with your own straw man.
I get the impression you're battling with the Intel PR machine here.
It's okay he's testing my belief and sticking to his guns. The thing is that I get the feeling that it's pointless anyway, as a 3800x with tight ram timings is just as fast as the 9900k. I guess AMD will be next for security if their market share increases. Intel are getting all the focus at the moment. Anyway the current intel security hole suck.
I get the impression you're battling with the Intel PR machine here.
It's not though buddy, I've made my position clear and have invested in Zen in a big way. What you are getting here is not Intel apologists, it's a realistic summary of the feasibility of some of the attacks. It doesn't take away from the fact that their processors are unsecure and a bit crap. People are just pointing out that at this time, as in right now, it's not easy to exploit. It's clearly not just a bit of java script in a browser and you have all the secrets you need and to argue that it is shows significant holes in knowledge when it comes to the finer details of these exploits.
The zen architecture and specifically epyc is impressive from a security point of view and id be surprised if we see any major vulnerabilities in the immediate future regardless of market share. It's immediately clear to anybody in the industry who knows what they are talking about and those that don't. The problem here is that those who know what they are talking about at any sort of reasonable level are being targeted by the AMD machine when in reality this is nothing at all to do with AMD and has 0 bearing on AMD. Comments like "3800x with tight ram timings is just as fast as the 9900k" has 0 relevance in context of Intel security.
It's all about the stance of the reader, for me I run several DC's, I am a gamer, a programmer, and tech enthusiast. Yea I love making fun of the current Intel position as much as the next man but really the only thing relevant in here is how much performance hit, how bad is it, who should be worried and what can we do to mitigate. How AMD compare at this point is actually pretty irrelevant.
That's a pretty fair comment, i don't pretend to understand it which is why i read this thread much more than i participate.
Having said that i don't trust the agenda of a minority of others in here nearly as much as i trust yours.
Give your straw man a break, the guy is dying. The RIDL does not steal the password, just the hash. It takes 24 hours as per the video I posted about. The filter part is in the slide I posted above.
You did not read the synchronize section.
Our approach involves repeatedly invoking the privileged passwd program from an unprivileged user. As a result the privileged process opens and reads the/etc/shadow file, that ordinary users cannot access otherwise. Since we cannot modify the victim to introduce a synchronization point, we repeatedly run the program and try to leak the LFB while the program reads the/etc/shadowfile. By applying our previously discussed technique, with the ad-ditional heuristic that the leaked byte must be a printable ASCII character, we are able to leak the contents of the file even with the induced noise from creating processes.
This is just the beginning I am sure, we aren't done with these yet and until Intel pull their finger out and make something happen we will keep seeing threads exactly like this one and you can bet your bottom dollar that as time pushes on and people understand more and more the finer workings of the skylake arch and that sketchy looking management engine, that we might, in the not to distant future genuinely have a scenario where quite frankly the best thing to do is throw the intel server and chip in the bin. It is almost inevitable at this point, I'm just making my move early. So far I cant fault my EPYC chips they are genuinely EPYC.
This is just the beginning I am sure, we aren't done with these yet and until Intel pull their finger out and make something happen we will keep seeing threads exactly like this one and you can bet your bottom dollar that as time pushes on and people understand more and more the finer workings of the skylake arch and that sketchy looking management engine, that we might, in the not to distant future genuinely have a scenario where quite frankly the best thing to do is throw the intel server and chip in the bin. It is almost inevitable at this point, I'm just making my move early. So far I cant fault my EPYC chips they are genuinely EPYC.
Exactly this. These security vulnerabilities are a concern in the right scenario. I don't think anyone in this thread is denying that or trying to gloss over the issue as part of some Intel PR stunt. I don't have a pro Intel agenda, I'm just pro truth. So I have to take issue when someone starts claiming that all home users with Intel processors have to disable HT otherwise their secrets will be stolen whilst browsing the web. My gaming PC does have an Intel CPU, but it doesn't have HT, so why would I care? Like some others in this thread I work in the IT industry and manage servers with a mix of Intel and AMD processors. Believe me, I'm no Intel fanboy after the extra work these vulnerabilities have created for me.What you are getting here is not Intel apologists, it's a realistic summary of the feasibility of some of the attacks. It doesn't take away from the fact that their processors are unsecure and a bit crap. People are just pointing out that at this time, as in right now, it's not easy to exploit. It's clearly not just a bit of java script in a browser and you have all the secrets you need and to argue that it is shows significant holes in knowledge when it comes to the finer details of these exploits.
You really should re-read my post - spamming stuff like information about SUDO demonstrates you haven't understood how this attack works or what I said.
The attack relies on repeatedly invoking passwd over and over very fast so as to force it to leak information the attack can use to gain the encrypted password - what do you think happens in a real environment when you make multiple attempts to login with invalid credentials? so after awhile security measures kick in locking you out of being able to invoke passwd long before you've gathered enough information to piece together the encrypted password/hash. A factor that isn't mentioned in the whitepaper but important to understanding the application of the attack and my point being these kind of factors exist and need to be understood for the other variants of how you can use RIDL as well.
I am not dismissing this attack but like with the JS one you have to understand factors that are glossed over in the whitepaper to understand what the proof of concept is demonstrating and the important bits of the theory to understand their application - you can't use the RIDL passwd attack to steal a hash in most real scenarios - but neither should you be able even theoretically be able to leak credentials past the boundaries in that scenario which makes it potentially useful for a hands on attacker who can test a machine for other areas that might be weak to that kind of attack.
Your post is attacking your own straw man, no one will respond. I don't even have to write why. Your straw man is that the vulnerability has to be your concept of world world really. That's not how security works.
In security you don't wait until the world is full of attacks or wait and see. Your position is a load of complete unrealistic non-sense. Even so most ssh connections are not locked down after three tries because that would cause a £400 engineer visit every time someone got locked out. I know this because I am a network engineer (windows server, cisco and electrical&electronic engineer). ssh normal only run over out of band networks not accessible anywhere else but the Network Operations Centre or teams that need access. Security people like me think of these things.
Even so most ssh connections are not locked down after three tries because that would cause a £400 engineer visit every time someone got locked out.
Your post is attacking your own straw man, no one will respond. I don't even have to write why. Your straw man is that the vulnerability has to be your concept of world world really. That's not how security works.
In security you don't wait until the world is full of attacks or wait and see. Your position is a load of complete unrealistic non-sense. Even so most ssh connections are not locked down after three tries because that would cause a £400 engineer visit every time someone got locked out. I know this because I am a network engineer (windows server, cisco and electrical&electronic engineer). ssh normal only run over out of band networks not accessible anywhere else but the Network Operations Centre or teams that need access. Security people like me think of these things.
OK so tell me - in the real world can you just hammer passwd or an SSH connection with invalid credentials for 24 hours in a properly setup environment?
What relevance does SSH normally running over out of band networks have? you are just throwing things in that sound vaguely like they are related to muddy the waters.
No a normal implementation would be something along the lines of after X number of tries throttle the connection so you have to wait say 15 minutes before trying again and after X number of tries after that blacklisting the connection. (Look up how something like fail2ban works - which if you are who you say you are you should be familiar with). Most enterprise type networks will also have a variety of other watchdog/sentinel software in place designed to identify odd patterns, brute force and denial of service type attacks and/or stop them happening in the first place by filtering them before they get to the network perimeter such as geo-regioning.
Like I stated before ssh connection run over out of band networks. You can't connect to them from outside the out of band network. There have been ssh attacks before. If you cannot connect you cannot attack right? Your whole argument is ignorant. You are just slapping together anything you can think of.
We also implemented a cross-VM attack where a co-located attacker leaks the/etc/shadow file from the victim VM by repeatedly trying to authenticate through SSH, confirming that virtual machine isolation does not mitigate this class of vulnerabilities. The attacker repeatedly opens a connection to the victim, trying to authenticate using in-valid credentials. Similarly to the previous passwd attack,this strategy causes the victim to read the/etc/shadow file, allowing us to leak the contents. For our proof-of-concept exploit, we assume we have two co-located VMs running on co-located SMTs. We are able to retrieve 16characters from the passwd file over a period of 24 hours,This is slightly slower than the previous passwd attack,since the execution path when SSH reads the shadow file is significantly longer than for the passwd program.
Are you a child of something? I'm talking to a 13 year old right?Please god tell me you are not solely in charge of security there?
Now I'm confused. Are you now saying RIDL can't be used to attack such a system even with HT turned on? I think you've tied yourself in knots.Like I stated before ssh connection run over out of band networks. You can't connect to them from outside the out of band network. There have been ssh attacks before. If you cannot connect you cannot attack right?
Um how on earth is that relevant to a RIDL attack that is designed to be used to exploit a system it is already running on? it is you who is just slapping anything together you can think of.
Off course you are confused. They call it Defense in depth.Now I'm confused. Are you now saying RIDL can't be used to attack such a system even with HT turned on? I think you've tied yourself in knots.
Are you a child of something? I'm talking to a 13 year old right?