Re: [9fans] goodbye cruel world
On Sat, Jan 6, 2018 at 11:21 PM, Jules Meritwrote: I suppose it's one of those "If you have to ask..." things but can anyone explain (any of) Jules Merit's posts for me? Cheers, Pete
Re: [9fans] Spectre and Meltdown
wait and see if all these scrambled together mitigations actually work. 9front is not in the business of selling shared computing environments (or sell executable javascript ads) to untrusted strangers. that was never really safe to begin with. there will be bugs in software and hardware. and there will be side channels. if you are concerned about security and leaks then run your authentication server on a dedicated box and applications on your own terminal. -- cinap
Re: [9fans] goodbye cruel world
mark v shaney On Wed, Jan 10, 2018 at 3:51 PM, Peter Hullwrote: > On Sat, Jan 6, 2018 at 11:21 PM, Jules Merit > wrote: > I suppose it's one of those "If you have to ask..." things but can > anyone explain (any of) Jules Merit's posts for me? > Cheers, > Pete >
Re: [9fans] Spectre and Meltdown
good advice. i agree with the wait-and-see. i'm not convinced that this issue is solvable. using pip, npm and all the other ways of importing random code from who-knows-where is insanity and plan9 systems (mostly?) avoid this practice. having dedicated auth and fs servers (don't allow cpu'ing) and using terminals for each user is a good practice. a terminal on an affected processor can still compromise your factotum data in memory. rpi3 is a safe choice and, for plan9, probably the best choice. On Wed, Jan 10, 2018 at 8:59 AM,wrote: > wait and see if all these scrambled together mitigations actually work. > > 9front is not in the business of selling shared computing environments > (or sell executable javascript ads) to untrusted strangers. > > that was never really safe to begin with. there will be bugs in software > and hardware. and there will be side channels. > > if you are concerned about security and leaks then run your authentication > server on a dedicated box and applications on your own terminal. > > -- > cinap > >
Re: [9fans] Spectre and Meltdown
this is different. the side channel attack is easy and completes in milliseconds. it is not related to the expressiveness of js.- erik
Re: [9fans] Spectre and Meltdown
i think "javascript in the browser" is implied here. and that is a HUGE gate to close. fortunately, we don't have such browsers in plan9 :) On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstromwrote: > to be fair, this vulnerability can be exploited with plain old JavaScript. > > On Jan 10, 2018 11:32, Skip Tavakkolian > wrote: > > good advice. i agree with the wait-and-see. i'm not convinced that this > issue is solvable. > > using pip, npm and all the other ways of importing random code from > who-knows-where is insanity and plan9 systems (mostly?) avoid this practice. > having dedicated auth and fs servers (don't allow cpu'ing) and using > terminals for each user is a good practice. > a terminal on an affected processor can still compromise your factotum > data in memory. rpi3 is a safe choice and, for plan9, probably the best > choice. > > > > On Wed, Jan 10, 2018 at 8:59 AM, wrote: > > wait and see if all these scrambled together mitigations actually work. > > 9front is not in the business of selling shared computing environments > (or sell executable javascript ads) to untrusted strangers. > > that was never really safe to begin with. there will be bugs in software > and hardware. and there will be side channels. > > if you are concerned about security and leaks then run your authentication > server on a dedicated box and applications on your own terminal. > > -- > cinap > > > >
Re: [9fans] Spectre and Meltdown
all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on faith to be safe; but it applies there too. does anyone read all the various rc scripts carefully? On Wed, Jan 10, 2018 at 12:30 PM,wrote: > yeah, and javascript was NEVER dangerous before. like it never > would steal your passwords or exploit bugs in the monstrosity > called a webbrowser. or ave bugs in the jit. all was perfectly > safe until now :-) we can perfectly trust the dozens of megabytes > injected from whoever pays the advertisement delivery network. > 3d ads that is, because gpu drivers are bugfree. > > i can't wait for javacript crypto implementations that will > totally be free of timing side channels... > > -- > cinap > >
Re: [9fans] Spectre and Meltdown
to be fair, this vulnerability can be exploited with plain old _javascript_.On Jan 10, 2018 11:32, Skip Tavakkolianwrote:good advice. i agree with the wait-and-see. i'm not convinced that this issue is solvable.using pip, npm and all the other ways of importing random code from who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.having dedicated auth and fs servers (don't allow cpu'ing) and using terminals for each user is a good practice.a terminal on an affected processor can still compromise your factotum data in memory. rpi3 is a safe choice and, for plan9, probably the best choice.On Wed, Jan 10, 2018 at 8:59 AM, wrote:wait and see if all these scrambled together mitigations actually work. 9front is not in the business of selling shared computing environments (or sell executable _javascript_ ads) to untrusted strangers. that was never really safe to begin with. there will be bugs in software and hardware. and there will be side channels. if you are concerned about security and leaks then run your authentication server on a dedicated box and applications on your own terminal. -- cinap
Re: [9fans] Spectre and Meltdown
yeah, and javascript was NEVER dangerous before. like it never would steal your passwords or exploit bugs in the monstrosity called a webbrowser. or ave bugs in the jit. all was perfectly safe until now :-) we can perfectly trust the dozens of megabytes injected from whoever pays the advertisement delivery network. 3d ads that is, because gpu drivers are bugfree. i can't wait for javacript crypto implementations that will totally be free of timing side channels... -- cinap
Re: [9fans] goodbye cruel world
Yea, TRUE story. Sorry for noise. 2018-01-07 2:21 GMT+03:00 Jules Merit: > AM, > molly pot, Hollywood 666 > James Thomas Inferno plan9 doom > E3M8 .dis > > On Dec 31, 2017 3:20 AM, "Andrew Wingorodov" wrote: > >> True story >> https://goo.gl/r2ueQC >> >> Sorry for offtop >> hope to see you soon >> -- >> http://andr.ru >> >> -- С наилучшими пожеланиями Жилкин Сергей With best regards Zhilkin Sergey
Re: [9fans] Spectre and Meltdown
If your processor isn't affected, microcode patching and os work-around is not needed. For example, intel atom d525, amd athlon 64 x2, arm7 (rpi's), mips are fine. On Jan 4, 2018 5:50 AM, "G B"wrote: With the release of information about Spectre and Meltdown, and that Microsoft and Linux have released patches for Meltdown and Apple soon to release a patch, I am wondering how Meltdown, or even Spectre, would or wouldn't affect Plan 9 and/or 9front given the use of namespaces.
Re: [9fans] Spectre and Meltdown
yep. i mentioned npm, but there are a few more. On Wed, Jan 10, 2018 at 12:56 PM, Erik Quanstromwrote: > it is also exploitable in node.js. > > On Jan 10, 2018 12:52, Skip Tavakkolian > wrote: > > i think "javascript in the browser" is implied here. and that is a HUGE > gate to close. > > fortunately, we don't have such browsers in plan9 :) > > On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstrom > wrote: > > to be fair, this vulnerability can be exploited with plain old JavaScript. > > On Jan 10, 2018 11:32, Skip Tavakkolian > wrote: > > good advice. i agree with the wait-and-see. i'm not convinced that this > issue is solvable. > > using pip, npm and all the other ways of importing random code from > who-knows-where is insanity and plan9 systems (mostly?) avoid this practice. > having dedicated auth and fs servers (don't allow cpu'ing) and using > terminals for each user is a good practice. > a terminal on an affected processor can still compromise your factotum > data in memory. rpi3 is a safe choice and, for plan9, probably the best > choice. > > > > On Wed, Jan 10, 2018 at 8:59 AM, wrote: > > wait and see if all these scrambled together mitigations actually work. > > 9front is not in the business of selling shared computing environments > (or sell executable javascript ads) to untrusted strangers. > > that was never really safe to begin with. there will be bugs in software > and hardware. and there will be side channels. > > if you are concerned about security and leaks then run your authentication > server on a dedicated box and applications on your own terminal. > > -- > cinap > > > > > >
Re: [9fans] Spectre and Meltdown
it is also exploitable in node.js.On Jan 10, 2018 12:52, Skip Tavakkolianwrote:i think "_javascript_ in the browser" is implied here. and that is a HUGE gate to close.fortunately, we don't have such browsers in plan9 :)On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstrom wrote:to be fair, this vulnerability can be exploited with plain old _javascript_.On Jan 10, 2018 11:32, Skip Tavakkolian wrote:good advice. i agree with the wait-and-see. i'm not convinced that this issue is solvable.using pip, npm and all the other ways of importing random code from who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.having dedicated auth and fs servers (don't allow cpu'ing) and using terminals for each user is a good practice.a terminal on an affected processor can still compromise your factotum data in memory. rpi3 is a safe choice and, for plan9, probably the best choice.On Wed, Jan 10, 2018 at 8:59 AM, wrote:wait and see if all these scrambled together mitigations actually work. 9front is not in the business of selling shared computing environments (or sell executable _javascript_ ads) to untrusted strangers. that was never really safe to begin with. there will be bugs in software and hardware. and there will be side channels. if you are concerned about security and leaks then run your authentication server on a dedicated box and applications on your own terminal. -- cinap
Re: [9fans] Spectre and Meltdown
> all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on > faith to be safe; but it applies there too. > does anyone read all the various rc scripts carefully? how's that comparable? the broken promise is that web code will be contained in the browser tab so nobody needs to trust that code. and we can just run it. that assumption is proven over and over again to not be true due to bugs in the interpreter and bugs in the massive libraries exposed to it and now theres a case where its broken even if there is no obvious flaw in the interpreter. nobody promised, or tried to do that with a plan9 process. code running in plan9 can do whatever you can do. and easily crash the whole system. so you obviouly need to be cautous about what you run. and yes, you should read the code. -- cinap
Re: [9fans] Spectre and Meltdown
> rpi3 is a safe choice Safe against spectre perhaps, but there are interesting remote attacks against the firmware in the bcm43xx wifi engine. I wouldn't want to bet on plan 9's immunity to some variant of broadpwn.
Re: [9fans] Spectre and Meltdown
On Wed, 10 Jan 2018 23:46:47 + Richard Miller <9f...@hamnavoe.com> wrote: Richard Miller writes: > > rpi3 is a safe choice > > Safe against spectre perhaps, but there are interesting remote attacks > against the firmware in the bcm43xx wifi engine. I wouldn't want to bet > on plan 9's immunity to some variant of broadpwn. CVE-2017-9417. Poking around the 'net I found https://github.com/raspberrypi/linux/issues/1342#issuecomment-321221748 Need Linux to run this but does not fix the problem? Though there seems to be another unrelated problem that seems not quite fixed.
Re: [9fans] Spectre and Meltdown
If Intel sells you lemons, make lemonade (ok, ok, at least a whiskey sour). I myself welcome our new speculative overlords, and look forward to new interesting predictions, and perhaps even a renewed interest in single-address space systems, since that's what we've got. On 10 January 2018 at 21:43,wrote: > > all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on > > faith to be safe; but it applies there too. > > does anyone read all the various rc scripts carefully? > > how's that comparable? the broken promise is that web > code will be contained in the browser tab so nobody needs > to trust that code. and we can just run it. that assumption > is proven over and over again to not be true due to bugs > in the interpreter and bugs in the massive libraries exposed > to it and now theres a case where its broken even if there is > no obvious flaw in the interpreter. > > nobody promised, or tried to do that with a plan9 process. > > code running in plan9 can do whatever you can do. and > easily crash the whole system. so you obviouly need to > be cautous about what you run. > > and yes, you should read the code. > > -- > cinap > >
Re: [9fans] Spectre and Meltdown
we foolishly assumed that intel and other cpu manufacturers would not do stupid things, out of self interest, if nothing else. stupid things like put a whole processor hidden inside every cpu since pentium, running minix that "manages" what you thought was "your" cpu. stupid things like have (and try to hide) instructions that allow one to reprogram the microcode. On Wed, Jan 10, 2018 at 1:43 PM,wrote: > > all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on > > faith to be safe; but it applies there too. > > does anyone read all the various rc scripts carefully? > > how's that comparable? the broken promise is that web > code will be contained in the browser tab so nobody needs > to trust that code. and we can just run it. that assumption > is proven over and over again to not be true due to bugs > in the interpreter and bugs in the massive libraries exposed > to it and now theres a case where its broken even if there is > no obvious flaw in the interpreter. > > nobody promised, or tried to do that with a plan9 process. > > code running in plan9 can do whatever you can do. and > easily crash the whole system. so you obviouly need to > be cautous about what you run. > > and yes, you should read the code. > > -- > cinap > >
Re: [9fans] Spectre and Meltdown
yes; i had forgotten about that. fortunately there's the ethernet port. https://www.blackhat.com/docs/us-17/thursday/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf On Wed, Jan 10, 2018 at 3:46 PM, Richard Miller <9f...@hamnavoe.com> wrote: > > rpi3 is a safe choice > > Safe against spectre perhaps, but there are interesting remote attacks > against the firmware in the bcm43xx wifi engine. I wouldn't want to bet > on plan 9's immunity to some variant of broadpwn. > > >