Re: [qubes-users] rc04

2018-01-10 Thread Foppe de Haan
On Wednesday, January 10, 2018 at 9:35:41 AM UTC+1, Tim W wrote:
> On Tuesday, January 9, 2018 at 2:35:28 PM UTC-5, Chris Laprise wrote:
> > On 01/09/2018 05:17 AM, Roy Bernat wrote:
> > > On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com  wrote:
> > >> On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote:
> > >>> On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:
> >  -BEGIN PGP SIGNED MESSAGE-
> >  Hash: SHA256
> > 
> >  On 01/09/2018 12:07 AM, Roy Bernat wrote:
> > 
> > > What about release rc04? it should be release at 8/1 that  was
> > > yesterday .
> > 
> >  Delayed until the devs have a good workaround for SP1/SP2/Spectre.
> > 
> >  /Sven
> >  -BEGIN PGP SIGNATURE-
> > 
> >  iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
> >  H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
> >  hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
> >  lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
> >  aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
> >  VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
> >  X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
> >  u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
> >  h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
> >  2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
> >  54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
> >  k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
> >  =59oT
> >  -END PGP SIGNATURE-
> > >>>
> > >>> Great time to be using a AMD chipset as they are not effected.
> > >>> Wonder if something like this would have been caught years ago if the 
> > >>> microcode was open?
> > >>>
> > >>> This is a big one in terms of the effects it has when mitigated at the 
> > >>> software level.  I wonder what the performance hit will be from 
> > >>> application of whatever patch route Qubes takes?  Projections of 5-30% 
> > >>> hit.
> > >>>
> > >>> As I said Great day for AMD stock LOL
> > >>
> > >> AMD is affected by the SP1/SP2/Spectre as well as Intel and ARM.
> > > 
> > > So he can not dance :)
> > > 
> > 
> >  From my recollection of AMD statements:
> > 
> > SP1: Very hard to exploit on any CPU
> > 
> > SP2: Much harder to exploit on AMD than Intel
> > 
> > SP3/Meltdown: AMD not affected
> > 
> > -- 
> > 
> > Chris Laprise, tas...@posteo.net
> > https://github.com/tasket
> > https://twitter.com/ttaskett
> > PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> that sounds correct based on what I have read.  At first AMD claimed it was 
> not effected but it seems as time went on and it was looked at more carefully 
> that has changed.  Still I will take more difficult.  As AMD has such a small 
> share of processor space it makes it a lower target sort of how Apple use to 
> be to windows and linux still is although not like it use to be.  So really 
> with a qubes WS the main issue would be SP2 mitigation.
> 
> Amazing this has been an issue for 10yrs.

Even funnier: Intel (as the primary actor) was warned against this back in 
1995: 
https://pdfs.semanticscholar.org/2209/42809262c17b6631c0f6536c91aaf7756857.pdf

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/277f3501-fbc9-479e-bed2-65d155fbecf1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-10 Thread Tim W
On Tuesday, January 9, 2018 at 2:35:28 PM UTC-5, Chris Laprise wrote:
> On 01/09/2018 05:17 AM, Roy Bernat wrote:
> > On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com  wrote:
> >> On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote:
> >>> On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:
>  -BEGIN PGP SIGNED MESSAGE-
>  Hash: SHA256
> 
>  On 01/09/2018 12:07 AM, Roy Bernat wrote:
> 
> > What about release rc04? it should be release at 8/1 that  was
> > yesterday .
> 
>  Delayed until the devs have a good workaround for SP1/SP2/Spectre.
> 
>  /Sven
>  -BEGIN PGP SIGNATURE-
> 
>  iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
>  H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
>  hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
>  lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
>  aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
>  VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
>  X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
>  u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
>  h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
>  2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
>  54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
>  k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
>  =59oT
>  -END PGP SIGNATURE-
> >>>
> >>> Great time to be using a AMD chipset as they are not effected.Wonder 
> >>> if something like this would have been caught years ago if the microcode 
> >>> was open?
> >>>
> >>> This is a big one in terms of the effects it has when mitigated at the 
> >>> software level.  I wonder what the performance hit will be from 
> >>> application of whatever patch route Qubes takes?  Projections of 5-30% 
> >>> hit.
> >>>
> >>> As I said Great day for AMD stock LOL
> >>
> >> AMD is affected by the SP1/SP2/Spectre as well as Intel and ARM.
> > 
> > So he can not dance :)
> > 
> 
>  From my recollection of AMD statements:
> 
> SP1: Very hard to exploit on any CPU
> 
> SP2: Much harder to exploit on AMD than Intel
> 
> SP3/Meltdown: AMD not affected
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

that sounds correct based on what I have read.  At first AMD claimed it was not 
effected but it seems as time went on and it was looked at more carefully that 
has changed.  Still I will take more difficult.  As AMD has such a small share 
of processor space it makes it a lower target sort of how Apple use to be to 
windows and linux still is although not like it use to be.  So really with a 
qubes WS the main issue would be SP2 mitigation.

Amazing this has been an issue for 10yrs.  
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d30b510-7df0-44cc-8930-adb1883cc208%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-09 Thread Chris Laprise

On 01/09/2018 05:17 AM, Roy Bernat wrote:

On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com  wrote:

On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote:

On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 01/09/2018 12:07 AM, Roy Bernat wrote:


What about release rc04? it should be release at 8/1 that  was
yesterday .


Delayed until the devs have a good workaround for SP1/SP2/Spectre.

/Sven
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
=59oT
-END PGP SIGNATURE-


Great time to be using a AMD chipset as they are not effected.Wonder if 
something like this would have been caught years ago if the microcode was open?

This is a big one in terms of the effects it has when mitigated at the software 
level.  I wonder what the performance hit will be from application of whatever 
patch route Qubes takes?  Projections of 5-30% hit.

As I said Great day for AMD stock LOL


AMD is affected by the SP1/SP2/Spectre as well as Intel and ARM.


So he can not dance :)



From my recollection of AMD statements:

SP1: Very hard to exploit on any CPU

SP2: Much harder to exploit on AMD than Intel

SP3/Meltdown: AMD not affected

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20ffecb9-4bf5-edf3-ee97-da363e94bf6d%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-09 Thread Steve Coleman

On 01/09/2018 02:11 AM, Tim W wrote:

On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:



Great time to be using a AMD chipset as they are not effected.


Just got back from a small seminar on the topic. All modern processors 
with speculative execution units are likely effected by this.



Wonder if something like this would have been caught years ago if the microcode 
was open?


It would not make any difference, as a microcode patch is not able to 
fix the underlying problems in the architecture. The problem lies in the 
kernel memory cache system vs the speculative branch prediction portions 
of the CPU, and microcode does not generally coordinate these separate 
hardware units.


When you have multiple branches of code independently executing in a 
given CPU core the kernel can be tricked into loading kernel memory into 
cache, which is then able to be accessed/hammered to copy that data back 
out into userspace. I heard one quote that the kernel data can be read 
at up to 5 kbits/sec by a carefully constructed application.


Since it takes a locally running application to do this trick the flaw 
is disastrous for cloud services. Thus allowing anyone to execute 
arbitrary code in your virtualization system could be giving away all 
the other VM's secrets.  Probably not a problem if you trust the code 
you are running on a single user system like Qubes, but even signed code 
from your repo should be considered suspect for data exfiltration 
purposes with this issue unpatched.



This is a big one in terms of the effects it has when mitigated at the software 
level.  I wonder what the performance hit will be from application of whatever 
patch route Qubes takes?  Projections of 5-30% hit.

As I said Great day for AMD stock LOL


Not a good day for any CPU vendor as far as I can see, because anything 
advanced enough to give good performance via speculative execution now 
needs to pull back on the reigns until there is a architectural 
solution. Likely the next-gen processors will actually fix it, but that 
could take years given the modern development cycle time frames.


There are all kinds of patches being worked on to get around this, but 
they all show poor performance.  We may see patches with better 
performance as time goes on in specific instances, but for right now 
"slow", by actually defeating speculative execution, seems to be the 
solution.






--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ba19c63-c3a1-afb1-da9a-155507263978%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-09 Thread Roy Bernat
On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com  wrote:
> On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote:
> > On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > > 
> > > On 01/09/2018 12:07 AM, Roy Bernat wrote:
> > > 
> > > > What about release rc04? it should be release at 8/1 that  was 
> > > > yesterday .
> > > 
> > > Delayed until the devs have a good workaround for SP1/SP2/Spectre.
> > > 
> > > /Sven
> > > -BEGIN PGP SIGNATURE-
> > > 
> > > iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
> > > H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
> > > hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
> > > lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
> > > aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
> > > VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
> > > X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
> > > u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
> > > h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
> > > 2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
> > > 54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
> > > k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
> > > =59oT
> > > -END PGP SIGNATURE-
> > 
> > Great time to be using a AMD chipset as they are not effected.Wonder if 
> > something like this would have been caught years ago if the microcode was 
> > open?
> > 
> > This is a big one in terms of the effects it has when mitigated at the 
> > software level.  I wonder what the performance hit will be from application 
> > of whatever patch route Qubes takes?  Projections of 5-30% hit.
> > 
> > As I said Great day for AMD stock LOL
> 
> AMD is affected by the SP1/SP2/Spectre as well as Intel and ARM.

So he can not dance :) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7fa88e1c-18f1-4b92-bd48-b88b2fa4751c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-08 Thread Roy Bernat
On Tuesday, 9 January 2018 09:11:06 UTC+2, Tim W  wrote:
> On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On 01/09/2018 12:07 AM, Roy Bernat wrote:
> > 
> > > What about release rc04? it should be release at 8/1 that  was 
> > > yesterday .
> > 
> > Delayed until the devs have a good workaround for SP1/SP2/Spectre.
> > 
> > /Sven
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
> > H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
> > hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
> > lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
> > aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
> > VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
> > X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
> > u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
> > h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
> > 2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
> > 54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
> > k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
> > =59oT
> > -END PGP SIGNATURE-
> 
> Great time to be using a AMD chipset as they are not effected.Wonder if 
> something like this would have been caught years ago if the microcode was 
> open?
> 
> This is a big one in terms of the effects it has when mitigated at the 
> software level.  I wonder what the performance hit will be from application 
> of whatever patch route Qubes takes?  Projections of 5-30% hit.
> 
> As I said Great day for AMD stock LOL

Dont dance on dead bodies ,

:) 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01ff8061-3353-4f4a-b904-9bd4d167010c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-08 Thread Tim W
On Tuesday, January 9, 2018 at 1:16:10 AM UTC-5, Sven Semmler wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On 01/09/2018 12:07 AM, Roy Bernat wrote:
> 
> > What about release rc04? it should be release at 8/1 that  was 
> > yesterday .
> 
> Delayed until the devs have a good workaround for SP1/SP2/Spectre.
> 
> /Sven
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
> H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
> hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
> lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
> aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
> VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
> X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
> u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
> h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
> 2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
> 54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
> k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
> =59oT
> -END PGP SIGNATURE-

Great time to be using a AMD chipset as they are not effected.Wonder if 
something like this would have been caught years ago if the microcode was open?

This is a big one in terms of the effects it has when mitigated at the software 
level.  I wonder what the performance hit will be from application of whatever 
patch route Qubes takes?  Projections of 5-30% hit.

As I said Great day for AMD stock LOL

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cbbf5444-be4a-4f76-b313-8218b6bd765b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] rc04

2018-01-08 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 01/09/2018 12:07 AM, Roy Bernat wrote:

> What about release rc04? it should be release at 8/1 that  was 
> yesterday .

Delayed until the devs have a good workaround for SP1/SP2/Spectre.

/Sven
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlpUXggACgkQ2m4We49U
H7b7cQ/9EC8aSC9vSuTNl0rVHQtK040eZIrg5sKbsXXLjQbOLkwcpXjvWCiukzj1
hXvUgWvJs2JHTPd9s8Yu/8KlE9Maf+UcbKGvwTPVG6c4tNOHGFLt7C0bRjYVeCp5
lW7pnb1e4rYX99aoeX5/SdWaScv6XLbx9CnRSazgBIYJ0WqfseUR8tcAE9HqKCau
aVrBlbSKLMGgWDx3rRGxJaBv6wf70zGi4SPMeCPQOg2vOJIRyDVGDTEz7LDp/NlA
VfU+xy6q7FlKeKfecftygpgqYmpgI4OOtsRE4OA8KQRAe9RTq+M+2/nebB8/I8tv
X6kXe23s/BtD8Me958har4Wd0quioRbS/dIyhmgDpCkrrg7Afzwk+AokqBTqyFhs
u2WZwoZiqRvRhlBqYp8dR076hx9zDNKSijkCcX5hPdLyX5+B39FGRuEJwz0a7G2F
h3dgxdRDIM/hxf5Sp2Y9E+O0GZaeERWo1fBdjxdbSZV/5CJTTdHBJfMhQ4RUt4sv
2v7/hlgFAhgSvzfXRxemH8elPERHISQ9j3nlKMsa73pnYWpUqeALVfOINbZE8DrU
54j5NPZOdhSrDaTtoS8hm2bF4+KFFjAw19B8s/HvHlwZ9B5PgFwV3et7fYYDjGrS
k0o3nVqKmsooD+yeR+oU/32qz4E0sOq0AxAS1PplU5Y3aMNiZBY=
=59oT
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2499c72a-30da-d969-4fe1-d6c00e08404f%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.