I haven’t done any in-depth research on this, but from what I have read, I 
cannot really see how anything running in a virtualized or interpreted 
environment, or something that doesn’t have direct access to the physical 
machine, would be a potential threat.

The 286 chip had a "protected mode” built into it. IBM and Microsoft spent a 
huge amount of money writing an OS that was designed to run in protected mode. 
But it turned out that one of the chip designers at Intel decided to save a few 
bytes of microcode and created a situation where the processing of the 
interrupt vector that pushed the current IP onto the stack was not an “atomic” 
operation — it could be interrupted. And this affected context switches into 
protected mode.

I was working at Intel at the time and there was quite a bit of discussion 
about this, mostly a lot of jokes about the probability of lightning striking 
the same person twice on the same golf course on a cloudless day. That is to 
say, the statistical likelihood of that happening during “normal” operation was 
absurdly low.

Needless to day, a protected OS was never released for the 286. But while they 
were busy fixing this bit of microcode to make the 386 work properly, there was 
enough pressure from customers that they added a new memory model option that 
disabled the “segmented memory model” that the 286 used and allowed it to run 
in a “virtual” mode that flattened the entire address space.

They still had a couple of protected areas that were carried over from the 286 
(the GOT and GDT, amongh others) that could only be accessed when the chip was 
put into a special mode that only the OS kernal was supposed to do.

But there were rumors that there were other ways of triggering faults on the 
chip to gain access to some of the protected memory areas. These areas were 
protected by virtue of the fact that they required a base segment register to 
be loaded that pointed to an area of memory that was outside of the normal 
memory space. To access them, you generally had to put the chip into what 
amounts to “admin” mode (I forget what it’s called), load the registered and 
trigger a fault (or sw interrupt). As I recall, this required some assistance 
from the memory chip interfaces because they used an address bit that wasn’t 
part of the regular  32-bit address space.

(Motorola advocates argued that their chips didn’t require this special chip 
between the CPU and system RAM, but it was simply a dynamic RAM controller. I 
suspect it took on additional security roles over time because it WAS 
independent of the CPU.)

During normal operation, it’s virtually impossible to trigger these modes. It 
used to be that you had to put the chip into “single-user mode” briefly, just 
like in a Unix environment when you need to perform certain low-level OS 
operations. (Windows doesn’t do that, which is why you have to reboot the damn 
thing every time you install a new device driver, for instance.)

It would be necessary to overwrite some kernal code that executes when the chip 
is in this “admin” mode, and that code would have to execute some 
protected-mode instructions in a very specific order. Most other things are 
locked-out while that’s going on, so it’s not a mode that’s usually enabled for 
very long.

They could have changed things since then, but from what I’ve read this 
particular “hairline fracture" has been around forever, and isn’t even rooted 
in a specific CPU or CPU family, but possibly due to interactions between the 
CPU and (external) memory controllers.

The moral of the story is … if this is something that java or javascript or 
anything running in a web browser can trigger, then there’s absolutely no way 
to protect any aspect of the hardware whatsoever.

Said another way, it would allow the web browser to install a device driver in 
Windows and activate it without having to reboot the machine. I for one would 
welcome a standalone app that would do that! Not so much something that runs in 
a web browser, tho.

People would be patching the kernel, switching into protected mode, fiddling 
within things any time they like, reprogramming the hardware … I mean. there 
would be no limits to what could be done by code running anywhere.

In 30 years we haven’t seen any evidence that this is the case, even though 
this has apparently been around forever.

Have there even been any reports of any code “in the wild” triggering this 
exploit from a web browser?

The articles I’ve seen only said it was discovered “in a lab” and they were 
able to trigger it “in the lab”.

I’m not much of a conspiracy theorist, but I’m far more inclined to think this 
is something that the engineers who work at chip and hardware vendors have 
known about for decades, only never talked about, and somebody with a lot of 
money caught wind of it and decided to use it to win his own lottery by 
shorting a bunch of tech stocks before announcing this “shocking hack” to the 
world.

-David Schwartz



> On Jan 8, 2018, at 8:09 PM, [email protected] wrote:
> 
> Hi,
> 
> I'm looking for more info or ideas on how one might protect them self given 
> Meltdown and Spectre.
> 
> Now that it has come to light that computer memory is not completely 
> segregated or kept private by the CPU hardware... a failure in design 
> allowing a hacker access to even the CPU Kernel memory.  This is 
> catastrophic.  
> 
> I'm reading the initial solution is for the O/S manufactures to patch their 
> Kernel to secure the memory at its boundaries.  In and of itself this seems 
> to be a weak approach, however probably the only one at this point.
> 
> I am reading that the real solution is a new bread of CPU that does not have 
> this vulnerability. It would seem even modifying the existing CPUs and 
> manufacturing them would take months if not a year or so.  In the meantime we 
> have to survive with hardware patched with software.  
> 
> I read that desktops are the most vulnerable. Maybe that should be any devise 
> that runs a browser.  The browser is the point of failure.  Introduce some 
> rogue JavaScript and your memory is compromised.  
> 
> This article says 
> <https://u2206659.ct.sendgrid.net/wf/click?upn=tzJbcg2o-2FNh3kfIF32sRUZ8NnknvQ7-2Bf6wkzOMZJ5l35vJQdR4eO1tqNkrT8g5JyjrDLC3ldM5JJdYP00A0te3bNsb8S-2FwM-2FGJBVS0BNvTQ9Wey3QjFPOff5WpHec9nAKs6Di9WPpNsBr1OIQpLPQBywUm8PtRT-2BnFqDoIIoxBo-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBe90ZrKPsPNFnspMLdRsopRWr34lrm7E5auB-2Bd42WLL4gjhi0N5AXxx4GNVTkstXmaDq1gRoCDt54XKMmsixSEF8m1Vdm0TD8q7fRHCDxBI8YDpUL3waOtKelhRNUN1LumERHBWzYmfTSW21bKr0NN2FhkmZk4WNOOABPilEMm1Gw-3D>
>  one should enable site isolation using Chrome.
> 
> At this point my preventative steps are:
> 
> 1) flush all browsers of any usernames, passwords and history.
> 
> 2) Only run the latest version of Chrome and only Chrome.
> 
> 3) Configure Chrome to run in isolation mode. 
> 
> Anyone have any other thoughts?
> 
> Thank you in advance. 
> 
> Keith  
> 
> 
> 
> 
> 
> 
> 
> 
> 
> ---------------------------------------------------
> PLUG-discuss mailing list - [email protected]
> To subscribe, unsubscribe, or to change your mail settings:
> https://u2206659.ct.sendgrid.net/wf/click?upn=5DvWGaZUY8Sh5aRLWfQTKYiRLVzunonVk948p8WIzMe-2FXlJ9Cta8w8U9xoku9LrUSHNMJbSd3ZEwH-2BqnW2UHlA-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBe90ZrKPsPNFnspMLdRsopRX4crQPuckE4-2B6zwIXxAW5M2r42hOKBtLdXJePdtL67bmK1QedZaakn-2BOrQ7kZLqZlYp4hikzsXzyT-2FMK4gTkECu2VNnjuvvQze4x5nFm-2FYC1LllAGz0HFhHNmGswJwHpWpmvAX3dQZ5uWd0qY-2BF06s-3D

---------------------------------------------------
PLUG-discuss mailing list - [email protected]
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss

Reply via email to