From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-lf0-x233.google.com (mail-lf0-x233.google.com [IPv6:2a00:1450:4010:c07::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id A956C3B2A4 for ; Thu, 4 Jan 2018 07:09:34 -0500 (EST) Received: by mail-lf0-x233.google.com with SMTP id h137so1537358lfe.8 for ; Thu, 04 Jan 2018 04:09:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DEr7lhqO/wsZ3+jV7k5HvePQPewhoUW/dMnzwSnsVI0=; b=G7q14/p64iBC9hj4k1TM5Nfh5qcBf2WPyoywiZmMigT+bUiRcrrwaY2NHQeKQyw5pp e0y3WppFka5AKfatXo8IQcNP9zneCa5efnIMMkE3/LSbdm/WblGJefsPEy3QSodW5KY8 0I9s/knvfX+G+vQDL1IvEBwegfgUJQRbDcobWMEcaqx6n0g9wC6RVi84n9gR6zd9qEb4 9pFTCUD4VCs7QU9x1FmtTi6+ZJdSkIj2fRt/QFtSlLVcs+Wxoh7Hp3TKvTkpjbromv4d HIM+nwdifrmhrSqcb+R4Xx7rcdUyaD5iUyIOdOxk1Nb2Ptp4+UQJcKy/yQI/uJPMeQcI HipA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DEr7lhqO/wsZ3+jV7k5HvePQPewhoUW/dMnzwSnsVI0=; b=jLZFJmaDNRNN5vlpH9OYG+qifKRncIOCrTVvCIXaWzzk78QTm4HJ4RfYcLd9ESkRY/ SXmk12dKd9yc60YP30hzC/82cA7iRR442es/GJM25a1MR4VaXq7RpVy1ceqSO07ZmVjS EShvjgsAlYNHG52TR5CBkDpnkx5wMAmmSuqTsrS/KFBYRRmLH0buw3OztJYiGU7tKabj 3HIKrIVsCZQE17COwzN3NCw6AZFvpxY2dL3LCby0UcNnlSk/aoSt5H20CC1I4IY4C9hs Uoucdjp/CgLKqNGcopg+MWrFV4H8F7fVE69SxrgWdWchYTznUvklyHsS2dm+LvllvMMe gueQ== X-Gm-Message-State: AKGB3mIAxCVKI06tTSgSisGhrg7N14fiDxreO4Hd7pZsfSw1YVppseQz 3E5WG4SFgYwI9GLrWuNdNdE= X-Google-Smtp-Source: ACJfBouC2GyF2wUuXgp/cmweBmx6S/1YtTsm7/aR23hUOnJVr6w1YR8W4p7MXhJcCz1BrahYByaksw== X-Received: by 10.25.198.85 with SMTP id w82mr2730522lff.46.1515067773608; Thu, 04 Jan 2018 04:09:33 -0800 (PST) Received: from [192.168.239.216] (mobile-access-bceee7-52.dhcp.inet.fi. [188.238.231.52]) by smtp.gmail.com with ESMTPSA id i72sm608609lfe.54.2018.01.04.04.09.31 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 04 Jan 2018 04:09:32 -0800 (PST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\)) From: Jonathan Morton In-Reply-To: Date: Thu, 4 Jan 2018 14:09:30 +0200 Cc: cerowrt-devel@lists.bufferbloat.net Content-Transfer-Encoding: quoted-printable Message-Id: References: To: Dave Taht X-Mailer: Apple Mail (2.3445.5.20) Subject: Re: [Cerowrt-devel] KASLR: Do we have to worry about other arches than x86? X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Jan 2018 12:09:35 -0000 Okay, it's a little bit more nuanced than I thought. In fact there are = *three* different CPU hardware vulnerabilities just disclosed. I've = summarised the impact in this Reddit post: = https://www.reddit.com/r/Amd/comments/7o2i91/technical_analysis_of_spectre= _meltdown/ The TL;DR version is: - Spectre v1 affects pretty much any modern out-of-order CPU, but is = relatively low impact. It could potentially be exploited using JIT = compilation of untrusted eBPF or Javascript, but can only exfiltrate = data from the local process. - Spectre v2 affects most recent Intel CPUs and some recent, = high-performance ARM CPU cores, but not AMD to any significant degree. = On vulnerable CPUs, it allows a local attacker to exfiltrate data from = privileged address space. - Meltdown is the nasty one which Linux kernel devs have been scrambling = to mitigate. So far, it is known to affect only Intel x86 CPUs, due to = their unusually aggressive speculative behaviour regarding L1 cache = hits. On vulnerable CPUs, it allows a local attacker to exfiltrate data = from privileged address space. I don't think we need to worry about it too much in a router context. = Virtual server folks, OTOH... - Jonathan Morton