Originally posted by Pawlerson
View Post
Announcement
Collapse
No announcement yet.
OpenBSD Gets Mitigated For Meltdown CPU Vulnerability
Collapse
X
-
Guest repliedOriginally posted by boxie View Post
So.... according to https://en.wikipedia.org/wiki/Meltdo..._vulnerability)
So everyone else gets 5 months and we are still getting mitigation fixes from Windows/Intel/Linux for this - If the OpenBSD team got their heads at the same time - then they are roughly on par with everyone else. If they got their heads up late in December/early Jan then they have done a fucking awesome job at getting this fixed.
Leave a comment:
-
Originally posted by Pawlerson View Post
Quickly? Everyone else already fixed it. Maybe except haiku and so on. The truth is BSD don't have enough manpower to even fix simple bugs. There are dozens of bugs in FreeBSD nobody cares about and they're not even reported. The result is very low code quality.
- Likes 1
Leave a comment:
-
I did consulting for a company that only use OpenBSD on their most secure routers that serves millions of customers. I can confirm that meltdown is not a problem for them. Heartbleed was (and still is for some companies) a big issue.
Leave a comment:
-
Originally posted by nslay View PostEven if you had physical access to the network, the low level chips that handle communication don't have anything like instruction-level parallelism or speculative execution that would make them vulnerable to Specter or Meltdown. They're too simple.
I even asked Adrian Chadd, net80211 BSD guy, if Wi-Fi chips were somehow vulnerable and he basically said the same thing about those chips too.
Which is still not an attack vector at all unless there are some pretty serious software issues in the device in question, like using shell scripts to process the packets or somesuch.
Of course the actual switch hardware chips or the network controller themselves are far too dumb to even care.
Leave a comment:
-
Originally posted by torsionbar28 View PostYes, there is lots. And none of it matters. There is no vector to exploit meltdown/spectre on a networking device like those from Cisco, etc. Think about it, these are privilege escalation vulnerabilities, but everything on a LAN switch or router runs as root. There are no other users logging in. And there's no way to exploit any of this from the data plane. You can maybe send a malformed ethernet frame (which requires you already have physical access to the local area network), and then what? Gain access to a portion of the mac address table? Whoop-dee-doo. No way to exploit it from the management plane of these devices either, as they all run signed code and will not run random code, even it were possible to inject it somehow. Sorry, but meltdown/spectre are a total non-issue on networking equipment. Yawn, nothing to see here.
I even asked Adrian Chadd, net80211 BSD guy, if Wi-Fi chips were somehow vulnerable and he basically said the same thing about those chips too.
- Likes 2
Leave a comment:
-
Originally posted by yoshi314 View Postwe don't know that. From what i've heard there is a lot of networking hardware still running unpatched.
Most networking equipment aren't really supposed to do that so it has a low footprint to begin with. So yeah it might theoretically help in some cases, but in most cases they get pwned well before someone even resorts to high-complexity attacks like Meltdown/Spectre.
Their ssh is ancient, their remote management API might be sketchy, their web interface might be running as root and is vulnerable to code injection, and so on and so forth.
Leave a comment:
-
Originally posted by yoshi314 View PostFrom what i've heard there is a lot of networking hardware still running unpatched.
- Likes 1
Leave a comment:
-
Originally posted by Pawlerson View Post
Quickly? Everyone else already fixed it. Maybe except haiku and so on. The truth is BSD don't have enough manpower to even fix simple bugs. There are dozens of bugs in FreeBSD nobody cares about and they're not even reported. The result is very low code quality.
After affected hardware and software vendors had been made aware of the issue on July 28, 2017,[45] the two vulnerabilities were made public jointly, on January 3, 2018, several days ahead of the coordinated release date of January 9, 2018 as news sites started reporting about commits to the Linux kernel and mails to its mailing list.[8] As a result, patches were not available for some platforms, such as Ubuntu,[46] when the vulnerabilities were disclosed.
- Likes 5
Leave a comment:
-
Originally posted by cen1 View PostWho cares really? It's not like OpenBSD boxes around the world have been actively exploited with meltdown and spectre.
Unless you want to make a very snide remark about OpenBSD not being used in places where they could be exploited, akin to saying that OpenBSD is not used at all.
- Likes 1
Leave a comment:
Leave a comment: