That is specious reasoning at best.  The jit option requires that you allow 
mixed instructions/data in memory, which leaves you open to a lot more than 
spectre.  The problem is you've (Red Hat) sold people a bill of goods with java 
jit, the solution is for people to write proper code and corporations to not 
tolerate bad code that ignores everything that's been learned about security.

Besides, there's no reason to think, particularly given it's sloppy, sloppy 
coding that the jit option has fewer security holes in general.

This is the same type of CRAP that has led to systemD (for Dumb Ass) and other 
bloat wear like gnome3.  If i wanted bad security, unreliability, bloatware and 
the destruction of the illusion of "high speed data processing" i'd use 
winblows.

seriously, can we try to keep these corporate schills the hell off the list?

Yes, i hate red hat, google, chrome, and now firefox.  

It's not so much that we've produced a generation of bad coders who don't know 
better, the problem is no one cares about anything other than $$$ in america 
any more.  I'm ashamed of my fellow "citizens".

If you are going to blatently lie and obfuscate please do it on fox news!

mad.scientist.at.large (a good madscientist)
--
God bless the rich, the greedy and the corrupt politicians they have put into 
office.   God bless them for helping me do the right thing by giving the rich 
my little pile of cash.  After all, the rich know what to do with money.


13. Feb 2018 02:48 by michaelkintz...@gmail.com:


> On Tuesday, 13 February 2018 02:18:33 GMT Nikos Chantziaras wrote:
>> On 13/02/18 03:31, Ian Zimmerman wrote:
>> > On 2018-02-13 03:13, Nikos Chantziaras wrote:
>> >> Apparently, and contrary to what people (me included) wrote here in
>> >> the past, BPF JIT is the secure option, and the interpreter is the
>> >> insecure one.
>> > 
>> > Do you have a reference for this?  It sounds strange indeed.
>>
>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i
>> d=290af86629b25ffd1ed6232c4e9107da031705cb
>>
>> "The BPF interpreter has been used as part of the spectre 2 attack
>> CVE-2017-5715.
>> [...]
>> To make attacker job harder introduce BPF_JIT_ALWAYS_ON config
>> option that removes interpreter from the kernel in favor of JIT-only mode."
>
> Thanks for sharing this Nikos.
>
> Perhaps I'm reading the referenced post wrong.  If the BPF interpreter has 
> been used for spectre2, then disabling CONFIG_BPF_SYSCALL does away with it 
> altogether, rather than turning it on and then setting BPF_JIT_ALWAYS_ON to 
> guard against its inherent vulnerability by using JIT-only mode?  Is there 
> some overriding benefit of having BPF enabled at all in the first place?
>
> PS. I don't remotely assume I properly understand the BPF mechanism, I just 
> want to test my understanding above.
> -- 
> Regards,
> Mick

Reply via email to