Intel CPU design flaw |Meltdown, Spectre a ine|
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
https://www.phoronix.com/scan.php?page= ... or-No-Loss
**** NOTE: ****
This series is in active development and is not intended to be merged to mainline in its current form. The intent of the RFC is simply to outline the strategy for the mitigation, as a focus for active discussion, and to openly share progress. There has been only minimal attention paid to performance thus far, as the focus is on robustness. It is not anticipated that there will be any measurable performance impact in the final version.
**** END NOTE ****
Takze klasika. Prvni mereni desitky procent v nekterych benchmarcich, v praxi vsechny patche dohromady 5%.
**** NOTE: ****
This series is in active development and is not intended to be merged to mainline in its current form. The intent of the RFC is simply to outline the strategy for the mitigation, as a focus for active discussion, and to openly share progress. There has been only minimal attention paid to performance thus far, as the focus is on robustness. It is not anticipated that there will be any measurable performance impact in the final version.
**** END NOTE ****
Takze klasika. Prvni mereni desitky procent v nekterych benchmarcich, v praxi vsechny patche dohromady 5%.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Additionally, the following specifically states that physical admin access(authenticated local access) is required;
https://blogs.intel.com/technology/2020 ... -sa-00329/
An attack to exploit this vulnerability can not be rendered remotely, IE through a network share or web browser.
https://blogs.intel.com/technology/2020 ... -sa-00329/
An attack to exploit this vulnerability can not be rendered remotely, IE through a network share or web browser.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- killerek
- Začátečník
-
- Registrován: 09. pro 2003
- Bydliště: Praha
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
https://arstechnica.com/information-tec ... unfixable/
Exploiting the vulnerability—particularly reading the chipset key—would be a major technical feat that would require specialized gear and years of experience with firmware.
a potential exploit for this issue appears to be fairly complicated, involving multi-stage chain compromising ISH or other firmware [and] then mounting a DMA [direct memory access] attack against CSME
Takze potrebujeme fyzicky pristup k PC, experta na firmware, specialni vybaveni a zda se jeste trochu stesti. Praktickou vyuzitelnost v dobe, kdy se hacker dostane do jakychkoliv desitek behem 17ti minut (ted mel probehnout nejaky contest ci co), ponechavam k volne fantazii.
Exploiting the vulnerability—particularly reading the chipset key—would be a major technical feat that would require specialized gear and years of experience with firmware.
a potential exploit for this issue appears to be fairly complicated, involving multi-stage chain compromising ISH or other firmware [and] then mounting a DMA [direct memory access] attack against CSME
Takze potrebujeme fyzicky pristup k PC, experta na firmware, specialni vybaveni a zda se jeste trochu stesti. Praktickou vyuzitelnost v dobe, kdy se hacker dostane do jakychkoliv desitek behem 17ti minut (ted mel probehnout nejaky contest ci co), ponechavam k volne fantazii.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Včera konkurence, dnes opět Intel a tentokrát v pořádným gardu
Load Value Injection (LVI) is being disclosed today as a new class of transient-execution attacks and the researchers claim can defeat all existing mitigations around Meltdown, Foreshadow, Zombieload, RIDL and Fallout. The researchers say LVI can affect virtually any access to memory and compiler-based mitigations can be expensive.
LVI mitigations amount to inserting lfence barriers before every vulnerable load instruction. The researchers also believe that certain instructions need to be blacklisted. The researchers found the prototype compiler-based mitigations have an Intel SGX performance hit of 2x to 19x but the actual real-world impact may differ
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
No a já doplním další podstatnou věc, která ti jako obvykle vypadla
Intel has published a full analysis of the LVI flaw, stating that "Due to the numerous, complex requirements that must be satisfied to implement the LVI method successfully, LVI is not a practical exploit in real-world environments where the OS and VMM are trusted[..] Accordingly, system administrators and application developers should carefully consider the particular threat model applicable to their systems when deciding whether and where to mitigate LVI."
Čili nejen že se to týká jen datacenter a sgx zároveň, ale ještě jen na teoretické úrovni.
EDIT:
The difficulty in carrying out LVI attacks isn’t the only limitation. The data the attacks can acquire is also restricted to that stored at the time the malicious code is executed. That makes exploits either a game of luck or further adds to the rigorous requirements for exploitation. For those reasons, many researchers say they’re unsure exploits will ever be used in active malicious attacks.
https://arstechnica.com/information-tec ... e-enclave/
Intel has published a full analysis of the LVI flaw, stating that "Due to the numerous, complex requirements that must be satisfied to implement the LVI method successfully, LVI is not a practical exploit in real-world environments where the OS and VMM are trusted[..] Accordingly, system administrators and application developers should carefully consider the particular threat model applicable to their systems when deciding whether and where to mitigate LVI."
Čili nejen že se to týká jen datacenter a sgx zároveň, ale ještě jen na teoretické úrovni.
EDIT:
The difficulty in carrying out LVI attacks isn’t the only limitation. The data the attacks can acquire is also restricted to that stored at the time the malicious code is executed. That makes exploits either a game of luck or further adds to the rigorous requirements for exploitation. For those reasons, many researchers say they’re unsure exploits will ever be used in active malicious attacks.
https://arstechnica.com/information-tec ... e-enclave/
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
A další nálož publikovaná včera společně s LVI
- INTEL-SA-00315 (CVE rating 8.4)
- INTEL-SA-00343 (CVE rating 7.8)
- INTEL-SA-00354 (CVE rating 8.6)
- CB.de - Intel-Produkte: Dutzende Sicherheitslücken von CPUs über Grafik bis NUC
- fobos
- Začátečník
- Registrován: 26. zář 2006
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
V CPU Intelu nalezena další bezpečnostní chyba: Load Value Injection
/sry som slepy, ale tak aspon to mate po ceskyNalézání bezpečnostních chyb v procesorech je už téměř na denním pořádku a nyní tu máme další objevenou chybu. Jde opět o procesory Intelu a chyba Load Value Injection postihuje zejména Software Guard Extensions (SGX).
Naposledy upravil(a) fobos dne čtv 12. bře 2020, 09:02, celkem upraveno 1 x.
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
krtku, mas to vazne zapotrebi?
LVI cannot be transparently mitigated in existing processors and necessitates expensive software patches, which may slow down Intel SGX enclave computations 2 up to 19 times.
https://arstechnica.com/information-tec ... e-enclave/
Na jinem miste vyzkumnici upozornuji, ze po uprave kompileru a po zahrnuti doporuceni intelu se muze postih zmirnit.
LVI cannot be transparently mitigated in existing processors and necessitates expensive software patches, which may slow down Intel SGX enclave computations 2 up to 19 times.
https://arstechnica.com/information-tec ... e-enclave/
Na jinem miste vyzkumnici upozornuji, ze po uprave kompileru a po zahrnuti doporuceni intelu se muze postih zmirnit.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
IT-News: Data centre storage performance hurt by Meltdown-Spectre patchesBenchmarks measuring integer and floating point throughput, as well as LINpack runs and STREAM memory performance tests and server-side Java, showed negligible difference between patched and unpatched systems, Intel noted. The difference was between zero and two percent.
The story was different with I/O loads, however.
With the FlexibleIO benchmarks, stressing the CPU fully during writes saw an 18 percent decrease in performance, because there was no headroom for processor utilisation, Intel said.
With low processor stress, there was no performance impact with patched systems, but CPU utilisation increased compared to unpatched servers.
Testing with storage performance development kit (SPDK) tools revealed a 25 percent performance hit when using the internet protocol-based iSCSI benchmark, using a single processor core.
"Generally speaking, the workloads that incorporate a larger number of user/kernel privilege changes and spend a significant amount of time in privileged mode will be more adversely impacted," Intel's data centre group head Navin Shenoy said.
-------------------------
SecurityWeek - Intel Tests Performance Impact of CPU Patches on Data Centers
-------------------------
Podobné dopady jsme měli na našem VDI prostředí (cca. 5K VMs) - od času 29:11
Login VSI - Intel MDS Patches and VDI Density Performance [Webinar - July 2019] / YouTube
//Baneshee - promaz OT. Držte se faktů, není zde volná diskuze na téma "co si myslíte o chybách v CPU a tak vůbec"
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Tak ani Comet Lake není ušetřen i když má některé flaws fixnuté přímo v HW
Phoronix - The Ongoing CPU Security Mitigation Impact On The Core i9 10900K Comet Lake
Phoronix - The Ongoing CPU Security Mitigation Impact On The Core i9 10900K Comet Lake
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Další do řady
CrossTalk (INTEL-SA-00320 / CVE-2020-0543)
CrossTalk (INTEL-SA-00320 / CVE-2020-0543)
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Výkonostní propady po aplikaci firmwaru s fixem
Phoronix.com - Benchmarking The Updated Intel CPU Microcode For SRBDS / CrossTalk Mitigation
SQL dostává další ránu a cokoliv co používá instrukce pro generování náhodných čísel RDRAND, RDSEED a EGETKEY je kvůli izolaci naprosto nepoužitelné
Phoronix.com - Benchmarking The Updated Intel CPU Microcode For SRBDS / CrossTalk Mitigation
SQL dostává další ránu a cokoliv co používá instrukce pro generování náhodných čísel RDRAND, RDSEED a EGETKEY je kvůli izolaci naprosto nepoužitelné
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Naposto nepouzitelne, prelozeno do reality:
The "good" news is that RdRand isn't used prolificily by real-world workloads. So when stressing a wide range of server-ish workloads, the overall impact from the SRBDS mitigation was not impacted to within a few percent the original performance as a worst case. It was just in a few cases the SRBDS mitigated microcode slightly lowered performance while for most tests the performance was fortunately stable.
The "good" news is that RdRand isn't used prolificily by real-world workloads. So when stressing a wide range of server-ish workloads, the overall impact from the SRBDS mitigation was not impacted to within a few percent the original performance as a worst case. It was just in a few cases the SRBDS mitigated microcode slightly lowered performance while for most tests the performance was fortunately stable.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
- Krteq
- Čestný člen
-
- Registrován: 22. dub 2005
- Bydliště: Brno
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Tak určitě
Málem bych zapomněl na další nově uveřejněnou chybu, ale spadající pod CacheOut
SGAxe
Málem bych zapomněl na další nově uveřejněnou chybu, ale spadající pod CacheOut
SGAxe
- hnizdo
- Začátečník
- Registrován: 29. bře 2007
- Kontaktovat uživatele:
Re: Intel CPU design flaw |Meltdown, Spectre a ine|
Ano, zcela urcite.
When it came to evaluating different desktop workloads on the Core i5 8400, the RdRand performance was impacted as expected but given that RdRand / RDSEED is not used prolifically especially by desktop workloads, for the other benchmarks the performance was basically unchanged.
When it came to evaluating different desktop workloads on the Core i5 8400, the RdRand performance was impacted as expected but given that RdRand / RDSEED is not used prolifically especially by desktop workloads, for the other benchmarks the performance was basically unchanged.
MB: Asrock Z690 Extreme CPU: Core i9-12900K cooler: Be quiet! Dark Rock PRO 4 RAM: 32GB 2x16 DDR4-3600 CL16 Kingston Renegade, VGA: MSI 4090 Suprim Liquid SSD: Samsung 960Pro 1TB + EK-M.2 HS HDD: 3TB Toshiba, 18TB WD DC HC550, 8TB Seagate SMR, 2x12TB HGST DC HC520 - RAID1, Optical: LG BH16NS55 BR-RW , Mouse: Roccat Kone XTD Keyb.: Logitech G15+G13+F710, Case: BQ Dark Base PRO 900 r2 PSU: Seasonic Platinum 860W SS-860XP2, Monitor: Asus PG27UQ, Repro: Logitech Z-5500, Headset: Turtle Beach Stealth 700X Gen 2 MAX, OS: Win11/64 Pro
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<
>>>>Fórum pro much VRAM much doge věrozvěsty otevřeno! Vstup ZDARMA<<<<