Re: [9fans] goodbye cruel world

2018-01-10 Thread Peter Hull
On Sat, Jan 6, 2018 at 11:21 PM, Jules Merit
 wrote:
I suppose it's one of those "If you have to ask..." things but can
anyone explain (any of) Jules Merit's posts for me?
Cheers,
Pete



Re: [9fans] Spectre and Meltdown

2018-01-10 Thread cinap_lenrek
wait and see if all these scrambled together mitigations actually work.

9front is not in the business of selling shared computing environments
(or sell executable javascript ads) to untrusted strangers.

that was never really safe to begin with. there will be bugs in software
and hardware. and there will be side channels.

if you are concerned about security and leaks then run your authentication
server on a dedicated box and applications on your own terminal. 

--
cinap



Re: [9fans] goodbye cruel world

2018-01-10 Thread fgergo
mark v shaney

On Wed, Jan 10, 2018 at 3:51 PM, Peter Hull  wrote:
> On Sat, Jan 6, 2018 at 11:21 PM, Jules Merit
>  wrote:
> I suppose it's one of those "If you have to ask..." things but can
> anyone explain (any of) Jules Merit's posts for me?
> Cheers,
> Pete
>



Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
good advice. i agree with the wait-and-see. i'm not convinced that this
issue is solvable.

using pip, npm and all the other ways of importing random code from
who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.
having dedicated auth and fs servers (don't allow cpu'ing) and using
terminals for each user is a good practice.
a terminal on an affected processor can still compromise your factotum data
in memory. rpi3 is a safe choice and, for plan9, probably the best choice.



On Wed, Jan 10, 2018 at 8:59 AM,  wrote:

> wait and see if all these scrambled together mitigations actually work.
>
> 9front is not in the business of selling shared computing environments
> (or sell executable javascript ads) to untrusted strangers.
>
> that was never really safe to begin with. there will be bugs in software
> and hardware. and there will be side channels.
>
> if you are concerned about security and leaks then run your authentication
> server on a dedicated box and applications on your own terminal.
>
> --
> cinap
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Erik Quanstrom
this is different.  the side channel attack is easy and completes in milliseconds.  it is not related to the expressiveness of js.- erik

Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
i think "javascript in the browser" is implied here. and that is a HUGE
gate to close.

fortunately, we don't have such browsers in plan9 :)

On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstrom 
wrote:

> to be fair, this vulnerability can be exploited with plain old JavaScript.
>
> On Jan 10, 2018 11:32, Skip Tavakkolian 
> wrote:
>
> good advice. i agree with the wait-and-see. i'm not convinced that this
> issue is solvable.
>
> using pip, npm and all the other ways of importing random code from
> who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.
> having dedicated auth and fs servers (don't allow cpu'ing) and using
> terminals for each user is a good practice.
> a terminal on an affected processor can still compromise your factotum
> data in memory. rpi3 is a safe choice and, for plan9, probably the best
> choice.
>
>
>
> On Wed, Jan 10, 2018 at 8:59 AM,  wrote:
>
> wait and see if all these scrambled together mitigations actually work.
>
> 9front is not in the business of selling shared computing environments
> (or sell executable javascript ads) to untrusted strangers.
>
> that was never really safe to begin with. there will be bugs in software
> and hardware. and there will be side channels.
>
> if you are concerned about security and leaks then run your authentication
> server on a dedicated box and applications on your own terminal.
>
> --
> cinap
>
>
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on
faith to be safe; but it applies there too.
does anyone read all the various rc scripts carefully?


On Wed, Jan 10, 2018 at 12:30 PM,  wrote:

> yeah, and javascript was NEVER dangerous before. like it never
> would steal your passwords or exploit bugs in the monstrosity
> called a webbrowser. or ave bugs in the jit. all was perfectly
> safe until now :-) we can perfectly trust the dozens of megabytes
> injected from whoever pays the advertisement delivery network.
> 3d ads that is, because gpu drivers are bugfree.
>
> i can't wait for javacript crypto implementations that will
> totally be free of timing side channels...
>
> --
> cinap
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Erik Quanstrom
to be fair, this vulnerability can be exploited with plain old _javascript_.On Jan 10, 2018 11:32, Skip Tavakkolian  wrote:good advice. i agree with the wait-and-see. i'm not convinced that this issue is solvable.using pip, npm and all the other ways of importing random code from who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.having dedicated auth and fs servers (don't allow cpu'ing) and using terminals for each user is a good practice.a terminal on an affected processor can still compromise your factotum data in memory. rpi3 is a safe choice and, for plan9, probably the best choice.On Wed, Jan 10, 2018 at 8:59 AM,   wrote:wait and see if all these scrambled together mitigations actually work.

9front is not in the business of selling shared computing environments
(or sell executable _javascript_ ads) to untrusted strangers.

that was never really safe to begin with. there will be bugs in software
and hardware. and there will be side channels.

if you are concerned about security and leaks then run your authentication
server on a dedicated box and applications on your own terminal.

--
cinap





Re: [9fans] Spectre and Meltdown

2018-01-10 Thread cinap_lenrek
yeah, and javascript was NEVER dangerous before. like it never
would steal your passwords or exploit bugs in the monstrosity
called a webbrowser. or ave bugs in the jit. all was perfectly
safe until now :-) we can perfectly trust the dozens of megabytes
injected from whoever pays the advertisement delivery network.
3d ads that is, because gpu drivers are bugfree.

i can't wait for javacript crypto implementations that will
totally be free of timing side channels...

--
cinap



Re: [9fans] goodbye cruel world

2018-01-10 Thread Sergey Zhilkin
Yea, TRUE story.

Sorry for noise.

2018-01-07 2:21 GMT+03:00 Jules Merit :

> AM,
> molly pot, Hollywood 666
> James Thomas Inferno plan9 doom
> E3M8 .dis
>
> On Dec 31, 2017 3:20 AM, "Andrew Wingorodov"  wrote:
>
>> True story
>> https://goo.gl/r2ueQC
>>
>> Sorry for offtop
>> hope to see you soon
>> --
>> http://andr.ru
>>
>>


-- 
С наилучшими пожеланиями
Жилкин Сергей
With best regards
Zhilkin Sergey


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
If your processor isn't affected, microcode patching and os work-around is
not needed. For example, intel atom d525, amd athlon 64 x2, arm7 (rpi's),
mips are fine.

On Jan 4, 2018 5:50 AM, "G B"  wrote:

With the release of information about Spectre and Meltdown, and that
Microsoft and Linux have released patches for Meltdown and Apple soon to
release a patch, I am wondering how Meltdown, or even Spectre, would or
wouldn't affect Plan 9 and/or 9front given the use of namespaces.


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
yep. i mentioned npm, but there are a few more.

On Wed, Jan 10, 2018 at 12:56 PM, Erik Quanstrom 
wrote:

> it is also exploitable in node.js.
>
> On Jan 10, 2018 12:52, Skip Tavakkolian 
> wrote:
>
> i think "javascript in the browser" is implied here. and that is a HUGE
> gate to close.
>
> fortunately, we don't have such browsers in plan9 :)
>
> On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstrom 
> wrote:
>
> to be fair, this vulnerability can be exploited with plain old JavaScript.
>
> On Jan 10, 2018 11:32, Skip Tavakkolian 
> wrote:
>
> good advice. i agree with the wait-and-see. i'm not convinced that this
> issue is solvable.
>
> using pip, npm and all the other ways of importing random code from
> who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.
> having dedicated auth and fs servers (don't allow cpu'ing) and using
> terminals for each user is a good practice.
> a terminal on an affected processor can still compromise your factotum
> data in memory. rpi3 is a safe choice and, for plan9, probably the best
> choice.
>
>
>
> On Wed, Jan 10, 2018 at 8:59 AM,  wrote:
>
> wait and see if all these scrambled together mitigations actually work.
>
> 9front is not in the business of selling shared computing environments
> (or sell executable javascript ads) to untrusted strangers.
>
> that was never really safe to begin with. there will be bugs in software
> and hardware. and there will be side channels.
>
> if you are concerned about security and leaks then run your authentication
> server on a dedicated box and applications on your own terminal.
>
> --
> cinap
>
>
>
>
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Erik Quanstrom
it is also exploitable in node.js.On Jan 10, 2018 12:52, Skip Tavakkolian  wrote:i think "_javascript_ in the browser" is implied here. and that is a HUGE gate to close.fortunately, we don't have such browsers in plan9 :)On Wed, Jan 10, 2018 at 11:41 AM, Erik Quanstrom  wrote:to be fair, this vulnerability can be exploited with plain old _javascript_.On Jan 10, 2018 11:32, Skip Tavakkolian  wrote:good advice. i agree with the wait-and-see. i'm not convinced that this issue is solvable.using pip, npm and all the other ways of importing random code from who-knows-where is insanity and plan9 systems (mostly?) avoid this practice.having dedicated auth and fs servers (don't allow cpu'ing) and using terminals for each user is a good practice.a terminal on an affected processor can still compromise your factotum data in memory. rpi3 is a safe choice and, for plan9, probably the best choice.On Wed, Jan 10, 2018 at 8:59 AM,   wrote:wait and see if all these scrambled together mitigations actually work.

9front is not in the business of selling shared computing environments
(or sell executable _javascript_ ads) to untrusted strangers.

that was never really safe to begin with. there will be bugs in software
and hardware. and there will be side channels.

if you are concerned about security and leaks then run your authentication
server on a dedicated box and applications on your own terminal.

--
cinap







Re: [9fans] Spectre and Meltdown

2018-01-10 Thread cinap_lenrek
> all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on
> faith to be safe; but it applies there too.
> does anyone read all the various rc scripts carefully?

how's that comparable? the broken promise is that web
code will be contained in the browser tab so nobody needs
to trust that code. and we can just run it. that assumption
is proven over and over again to not be true due to bugs
in the interpreter and bugs in the massive libraries exposed
to it and now theres a case where its broken even if there is
no obvious flaw in the interpreter.

nobody promised, or tried to do that with a plan9 process.

code running in plan9 can do whatever you can do. and
easily crash the whole system. so you obviouly need to
be cautous about what you run.

and yes, you should read the code.

--
cinap



Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Richard Miller
> rpi3 is a safe choice

Safe against spectre perhaps, but there are interesting remote attacks
against the firmware in the bcm43xx wifi engine.  I wouldn't want to bet
on plan 9's immunity to some variant of broadpwn.




Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Bakul Shah
On Wed, 10 Jan 2018 23:46:47 + Richard Miller <9f...@hamnavoe.com> wrote:
Richard Miller writes:
> > rpi3 is a safe choice
> 
> Safe against spectre perhaps, but there are interesting remote attacks
> against the firmware in the bcm43xx wifi engine.  I wouldn't want to bet
> on plan 9's immunity to some variant of broadpwn.

CVE-2017-9417.  Poking around the 'net I found

https://github.com/raspberrypi/linux/issues/1342#issuecomment-321221748

Need Linux to run this but does not fix the problem?

Though there seems to be another unrelated problem that seems
not quite fixed.



Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Charles Forsyth
If Intel sells you lemons, make lemonade (ok, ok, at least a whiskey sour).
I myself welcome our new speculative overlords, and look forward to new
interesting predictions, and perhaps even a renewed interest in
single-address space systems, since that's what we've got.

On 10 January 2018 at 21:43,  wrote:

> > all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on
> > faith to be safe; but it applies there too.
> > does anyone read all the various rc scripts carefully?
>
> how's that comparable? the broken promise is that web
> code will be contained in the browser tab so nobody needs
> to trust that code. and we can just run it. that assumption
> is proven over and over again to not be true due to bugs
> in the interpreter and bugs in the massive libraries exposed
> to it and now theres a case where its broken even if there is
> no obvious flaw in the interpreter.
>
> nobody promised, or tried to do that with a plan9 process.
>
> code running in plan9 can do whatever you can do. and
> easily crash the whole system. so you obviouly need to
> be cautous about what you run.
>
> and yes, you should read the code.
>
> --
> cinap
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
we foolishly assumed that intel and other cpu manufacturers would not do
stupid things, out of self interest, if nothing else.
stupid things like put a whole processor hidden inside every cpu since
pentium, running minix that "manages" what you thought was "your" cpu.
stupid things like have (and try to hide) instructions that allow one to
reprogram the microcode.


On Wed, Jan 10, 2018 at 1:43 PM,  wrote:

> > all binaries on any repo (9p.io, 9front.org, bell-labs.com) are taken on
> > faith to be safe; but it applies there too.
> > does anyone read all the various rc scripts carefully?
>
> how's that comparable? the broken promise is that web
> code will be contained in the browser tab so nobody needs
> to trust that code. and we can just run it. that assumption
> is proven over and over again to not be true due to bugs
> in the interpreter and bugs in the massive libraries exposed
> to it and now theres a case where its broken even if there is
> no obvious flaw in the interpreter.
>
> nobody promised, or tried to do that with a plan9 process.
>
> code running in plan9 can do whatever you can do. and
> easily crash the whole system. so you obviouly need to
> be cautous about what you run.
>
> and yes, you should read the code.
>
> --
> cinap
>
>


Re: [9fans] Spectre and Meltdown

2018-01-10 Thread Skip Tavakkolian
yes; i had forgotten about that.  fortunately there's the ethernet port.

https://www.blackhat.com/docs/us-17/thursday/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf



On Wed, Jan 10, 2018 at 3:46 PM, Richard Miller <9f...@hamnavoe.com> wrote:

> > rpi3 is a safe choice
>
> Safe against spectre perhaps, but there are interesting remote attacks
> against the firmware in the bcm43xx wifi engine.  I wouldn't want to bet
> on plan 9's immunity to some variant of broadpwn.
>
>
>