On 1/8/18, Ray_Net <[email protected]> wrote:
> Lee wrote on 08-01-18 23:19:
>> On 1/8/18, Ray_Net <[email protected]> wrote:
>>> Lee wrote on 08-01-18 01:06:
>>>> On 1/7/18, Ray_Net <[email protected]> wrote:
>>>>> Lee wrote on 07-01-18 22:44:
>>>>>> summary: The vuln. mitigation is to install noscript + request policy
>>>>>> continued or uMatrix + uBlock Origin or whatever other addon combo
>>>>>> that allows javascript from only whitelisted sites.
>>>>>>
>>>>>> On 1/7/18, Ray_Net <[email protected]> wrote:
>>>>>>> WaltS48 wrote on 06-01-18 18:05:
>>>>>>>> On 1/6/18 2:36 AM, Ray_Net wrote:
>>>>>>>>> I have read:
>>>>>>>>>
>>>>>>>>> "Disable Javascript until browser company comes out with patch for
>>>>>>>>> vulnerable Javascript."
>>>>>>>>>
>>>>>>>>> So, will SM issue a patch against the Spectre exploit ?
>>>>>> Mozilla needs to come up with a patch first.  What they have now only
>>>>>> blocks the obvious timing attack methods.
>>>>>>
>>>>>>>> SeaMonkey 2.49.1 is based on Firefox 52 ESR code, and Firefox 52 ESR
>>>>>>>> doesn't have SharedBufferArray enabled.
>>>>>>>> ||
>>>>>>>> ||SharedArrayBuffer| is already disabled in Firefox 52 ESR.
>>>>>>>> ||
>>>>>>>> |REF: https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
>>>>>>>>
>>>>>>> Would it mean that we are protected ?
>>>>>> No.
>>>>>>
>>>>>> Look at the FF advisory
>>>>>>      The precision of performance.now() has been reduced from 5μs to
>>>>>> 20μs, and the SharedArrayBuffer feature has been disabled because it
>>>>>> can be used to construct a high-resolution timer.
>>>>>>
>>>>>> SeaMonkey doesn't implement the SharedArrayBuffer feature but I'm
>>>>>> guessing it's performance.now() function still has the 5μs resolution
>>>>>> and that will take a patch to fix.
>>>>>>
>>>>>> But changing the performance.now() resolution is not sufficient.  Take
>>>>>> a
>>>>>> look at
>>>>>> https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
>>>>>>      Furthermore, other timing sources and time-fuzzing techniques are
>>>>>> being worked on.
>>>>>>
>>>>>> Which is like saying we've locked the front door so nobody can walk
>>>>>> right in anymore but the ground floor windows are still wide open.
>>>>>>
>>>>>> Follow the "other timing sources and time-fuzzing techniques" link to
>>>>>> https://gruss.cc/files/fantastictimers.pdf
>>>>>>      Abstract. Research showed that microarchitectural attacks like
>>>>>> cache
>>>>>> attacks can be performed through websites using JavaScript. These
>>>>>> timing attacks allow an adversary to spy on users secrets such as
>>>>>> their keystrokes,leveraging fine-grained timers. However, the W3C and
>>>>>> browser vendors responded to this significant threat by eliminating
>>>>>> fine-grained timers from JavaScript. This renders previous
>>>>>> high-resolution microarchitectural attacks non-applicable.
>>>>>>
>>>>>>      >>We demonstrate the inefficacy of this mitigation<< by finding
>>>>>> and
>>>>>> evaluating a wide range of new sources of timing information. We
>>>>>> develop measurement methods that exceed the resolution of official
>>>>>> timing sources by to orders of magnitude on all major browsers, and
>>>>>> even more on Tor browser. Our timing measurements do not only
>>>>>> re-enable previous attacks to their full extent but also allow
>>>>>> implementing new attacks. We demonstrate a new DRAM-based covert
>>>>>> channel between a website and an unprivileged app in a virtual machine
>>>>>> without network hardware. Our results emphasize that quick-fix
>>>>>> mitigations can establish a dangerous false sense of security.
>>>>>>
>>>>>>
>>>>>> In short, performance.now() and SharedBufferArray are the easy/obvious
>>>>>> ways to get a high resolution timer in javascript but they're not the
>>>>>> only possible methods.
>>>>>>
>>>>>> So... what to do?  The exploit mitigation is to install noscript +
>>>>>> request policy continued or uMatrix + uBlock Origin or whatever other
>>>>>> addon combo that allows javascript from only whitelisted sites.
>>>>>>
>>>>>> Regards,
>>>>>> Lee
>>>>> For "Request Policy" we have for all versions:
>>>>> This add-on is not compatible with your version of SeaMonkey.
>>>> "Request Policy" was the original - you want "RequestPolicy Continued"
>>>> which is easier to use:
>>>> https://addons.mozilla.org/en-US/firefox/addon/requestpolicy-continued/
>>>>
>>>> which links to
>>>> https://addons.mozilla.org/firefox/downloads/file/747484/requestpolicy_continued-1.0.beta13.2-fx+sm.xpi
>>>>
>>>>> For "NoScript Security Suite" we have:
>>>>> Only with FireFox.
>>>> yeah.. you need to scroll down to 'version history' & click on 'see
>>>> all versions'
>>>> It looks like 5.1.8.3 is the last one that will work w/ SM
>>>>     Works with Firefox 45.0 - 56.0, SeaMonkey 2.42 - *
>>>> https://addons.mozilla.org/firefox/downloads/file/806790/noscript_security_suite-5.1.8.3-fx+sm.xpi
>>>>
>>>> Regards
>>>> Lee
>>> Anyway, it's better that SM solve problems instead of a need to install
>>> a myriad of extensions.
>> agreed.  But I like having more control over what's allowed than the
>> javascript.enabled on/off switch & extensions are the only way I know
>> of to get that.
>>
>> Regards
>> Lee
>
> I think that Microsoft had installed yesterday an emergency patch for
> adressing meltdown and spectre.
> https://blog.trendmicro.com/fixing-meltdown-spectre-vulnerabilities/
> and ....
> Microsoft yesterday released an emergency patch for Windows 10 to
> address this prior to Patch Tuesday, which incorporates KAISER in KB4056892

I haven't forced an update yet; my last windows update was 12/28, so
I'm still unprotected.

https://gallery.technet.microsoft.com/scriptcenter/Speculation-Control-e36f0050
  This zip file contains a PowerShell module that can be used to
confirm whether a system has enabled the protections needed to
validate that the speculation control vulnerability.

I just tried it and everything is false.. which agrees w/ my not
getting any updates yet.

Regards,
Lee
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to