Announcement

Collapse
No announcement yet.

OpenBSD Gets Mitigated For Meltdown CPU Vulnerability

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #11
    Originally posted by yoshi314 View Post
    we don't know that. From what i've heard there is a lot of networking hardware still running unpatched.
    Privilege escalation vulnerabilities are an issue only on systems where you are running relatively untrusted code (or code that can and will be exploited because it is shit, like PHP).

    Most networking equipment aren't really supposed to do that so it has a low footprint to begin with. So yeah it might theoretically help in some cases, but in most cases they get pwned well before someone even resorts to high-complexity attacks like Meltdown/Spectre.
    Their ssh is ancient, their remote management API might be sketchy, their web interface might be running as root and is vulnerable to code injection, and so on and so forth.

    Comment


    • #12
      Originally posted by torsionbar28 View Post
      Yes, there is lots. And none of it matters. There is no vector to exploit meltdown/spectre on a networking device like those from Cisco, etc. Think about it, these are privilege escalation vulnerabilities, but everything on a LAN switch or router runs as root. There are no other users logging in. And there's no way to exploit any of this from the data plane. You can maybe send a malformed ethernet frame (which requires you already have physical access to the local area network), and then what? Gain access to a portion of the mac address table? Whoop-dee-doo. No way to exploit it from the management plane of these devices either, as they all run signed code and will not run random code, even it were possible to inject it somehow. Sorry, but meltdown/spectre are a total non-issue on networking equipment. Yawn, nothing to see here.
      Even if you had physical access to the network, the low level chips that handle communication don't have anything like instruction-level parallelism or speculative execution that would make them vulnerable to Specter or Meltdown. They're too simple.

      I even asked Adrian Chadd, net80211 BSD guy, if Wi-Fi chips were somehow vulnerable and he basically said the same thing about those chips too.

      Comment


      • #13
        Originally posted by nslay View Post
        Even if you had physical access to the network, the low level chips that handle communication don't have anything like instruction-level parallelism or speculative execution that would make them vulnerable to Specter or Meltdown. They're too simple.

        I even asked Adrian Chadd, net80211 BSD guy, if Wi-Fi chips were somehow vulnerable and he basically said the same thing about those chips too.
        Here we are talking of network equipment running an OS, so (very) smart switches, firewalls, routers that do packet inspection and other things that require them to pull the packets in the OS to process them somehow.

        Which is still not an attack vector at all unless there are some pretty serious software issues in the device in question, like using shell scripts to process the packets or somesuch.

        Of course the actual switch hardware chips or the network controller themselves are far too dumb to even care.

        Comment


        • #14
          I did consulting for a company that only use OpenBSD on their most secure routers that serves millions of customers. I can confirm that meltdown is not a problem for them. Heartbleed was (and still is for some companies) a big issue.

          Comment


          • #15
            Originally posted by Pawlerson View Post

            Quickly? Everyone else already fixed it. Maybe except haiku and so on. The truth is BSD don't have enough manpower to even fix simple bugs. There are dozens of bugs in FreeBSD nobody cares about and they're not even reported. The result is very low code quality.
            "Everyone else" got bunch of months advance warning. They didn't. Matthew Dillon & DragonFly was probably the fastest of all, doubt he also had any foreknowledge..

            Comment


            • #16
              Originally posted by boxie View Post

              So.... according to https://en.wikipedia.org/wiki/Meltdo..._vulnerability)


              So everyone else gets 5 months and we are still getting mitigation fixes from Windows/Intel/Linux for this - If the OpenBSD team got their heads at the same time - then they are roughly on par with everyone else. If they got their heads up late in December/early Jan then they have done a fucking awesome job at getting this fixed.
              Except their implementation must hurt performance badly. Like in DragonflyBSD case.

              Comment


              • #17
                Originally posted by Pawlerson View Post

                Except their implementation must hurt performance badly. Like in DragonflyBSD case.
                why must it? the OpenBSD team are nothing but careful

                Comment

                Working...
                X