Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
SoftNum
Mar 31, 2011

Craptacular! posted:

Same thing with cloud providers and any other data-driven business where there's enough employees that you couldn't tell if someone in the hall works here everyday or is an NSA employee installing an exploit and giving the system's administrator a gag order under threat of treason and aiding terrorism.

I mean I really have to point out that if you're actually this paranoid about this happening you should already assume AWS has installed the backdoors already without needing to patch the bios. There is no functional difference between your scenario and mine.

Also traffic analysis (that does happen at all these places) will catch back doors. or are they gag ordered too?

Sure, people will need to flash their bios. It's a vunerability. One that shouldn't have made a blip on anyone's radar except in this modern era of celebrity exploiting.

Adbot
ADBOT LOVES YOU

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



BangersInMyKnickers posted:

The kind of changes in firmware these vulns allow shouldn't be permitted short of cracking the hardware open and attempting to re-flash by soldering on to the serial pins and even that should be protected by some mechanism.

Requiring physical access to update the TPM is a decent idea, but IDK how that'd go over with anyone who runs a decent sized DC. These things are going to have issues because humans are dumb, so you have to be able to update them and a workflow of 'push BIOS update' is a lot cheaper than 'open every server, plug in a USB stick and wait' so I know which one will be more popular.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE
There's no problem with allowing software updates of TPM as long as you, y'know, actually check the signatures before you flash it. Otherwise, on top of the whole "trivial to backdoor" thing, you've just opened up another failure case where humans are dumb and now you have a processor that's permanently bricked because you've hosed up the processor's bootstrap code.

edit: really this is an academic discussion anyway, because as long as the processor is physically capable of reflashing the PSP then if it's exploited it can do it, it's not sufficient to have things limited to an external source under normal operation because this isn't normal operation. To really make it secure the PSP would have to only be flashable from an external controller, which would add cost on every board for reduced functionality that nobody wants and some customers would actively dislike. You could build that functionality into the chipset... but oh wait that was broken too. Reactive countermeasures here won't help, there is really no problem with allowing the TPM to flash itself as long as it validates the signatures properly. That's the weakness here, not software BIOS flashing.

Paul MaudDib fucked around with this message at 22:59 on Mar 21, 2018

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Alpha Mayo posted:

~~FOR IMMEDIATE RELEASE~~

An attacker with physical access to systems running AMD based processors, including Ryzen and Epyc, may be vulnerable to permanent damage.
In out proof of concept, an attacker was able to remove the CPU, and scratch up the motherboard with a car key they had on hand.
The system was rendered permanently unbootable.

ALL AMD CHIPS, RELEASED FROM 1982 AND ON, ARE EFFECTED! AMD has yet to provide resolution to this matter but are investigating the attack vector.

-company totally not set up overnight by stock market manipulators hoping computer algorithms read "negative AMD news story" and drop the price

shut up you colossal dipshit

AARP LARPer
Feb 19, 2005

THE DARK SIDE OF SCIENCE BREEDS A WEAPON OF WAR

Buglord
mad about exploits

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~

BangersInMyKnickers posted:

shut up you colossal dipshit
rofl.

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
i gave a crackhead the key to my house and they stole my TV. can't believe the lock on my door was exploited so bad

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
PC had a locked password protected BIOS with secure boot enabled. expoited the gently caress out of it and booted a linux liveCD anyway. Just used the 'password' to access the BIOS written on a sticky note nearby, then turned off secure boot :smug:. BIOS vendors need to patch this massive vulnerabiltiy. cant believe how easy it was to run unsigned code when all i had was admin access at the metal.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE
lmao that there are still people doing the "root password lets you do root things!" after AMD confirmed that this is not intended behavior and will be patched out. Because AMD issues PSP patches for "root passwords letting you do root things", right?

this one has been remarkable, you can literally click back through someone's history and see their claims of "fake news!" only a day or two before, and watch the abrupt turnaround to "real but not a big deal!", and then come down to earth with a "OK maybe a serious escalation exploit but CTS is pretty shady guys!"

Paul MaudDib fucked around with this message at 09:31 on Mar 22, 2018

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
“When was the last time you saw a security advisory that was basically “if you replace the BIOS or the CPU microcode with an evil version, you might have a security problem”? Yeah,” he said in the same thread."

-linus torvalds, a shameful man who doesn't "get" security

orcane
Jun 13, 2012

Fun Shoe
They're vulnerabilities and they need fixing but what is really funny are the idiots who act like this is almost on par with Meltdown/Spectre.

"See, AMD has their huge crippling security issues too, nothing is secure, might as well keep your Intel things!" -a dumbass who keeps blowing everything out of proportion every time it gives him an opportunity to poo poo on AMD.

And, oh yeah. STATE LEVEL ACTORS.

orcane fucked around with this message at 10:12 on Mar 22, 2018

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Alpha Mayo posted:

“When was the last time you saw a security advisory that was basically “if you replace the BIOS or the CPU microcode with an evil version, you might have a security problem”? Yeah,” he said in the same thread."

Now that I bother to look it up: November 2017.

https://www.blackhat.com/docs/eu-17...t-Engine-wp.pdf

Yeah, bypassing signature validation is actually considered an exploit. Again, lol if you think that's intended behavior, they sign it for a reason, dumbshit.

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
Lol. You are so loving retarded. You called this a "serious escalation exploit" when this involves no exploit allowing for escalation, considering root access at metal level is a prerequisite to even attempting it.

You have no idea what you are talking about.. And your linked vulnerabilities were vulnerabilities because they worked in conjunction with vulnerabilities with AMT allowing for bypassing authorization.

(USER WAS PUT ON PROBATION FOR THIS POST)

Alpha Mayo
Jan 15, 2007
hi how are you?
there was this racist piece of shit in your av so I fixed it
you're welcome
pay it forward~
Bypassing authorization means unauthorized attackers had access, FYI. That is what is known as an "serious escalation vulnerability" you stupid man.

Anarchist Mae
Nov 5, 2009

by Reene
Lipstick Apathy

Paul MaudDib posted:

Now that I bother to look it up: November 2017.

https://www.blackhat.com/docs/eu-17...t-Engine-wp.pdf

Yeah, bypassing signature validation is actually considered an exploit. Again, lol if you think that's intended behavior, they sign it for a reason, dumbshit.

Looks like you've caused a meltdown in this thread. Maybe he'll get so mad that his heart gives out, and then his spectre will haunt the thread forever.

Wiggly Wayne DDS
Sep 11, 2010



Alpha Mayo posted:

Lol. You are so loving retarded. You called this a "serious escalation exploit" when this involves no exploit allowing for escalation, considering root access at metal level is a prerequisite to even attempting it.

You have no idea what you are talking about.. And your linked vulnerabilities were vulnerabilities because they worked in conjunction with vulnerabilities with AMT allowing for bypassing authorization.
there are more layers of access at 'bare metal' than you're willing to acknowledge or you're just unaware, it's hard to tell at this stage.

chaining vulnerabilities exists, but context is key to defining the risk and there are very constrained privilege escalation issues mentioned. that the prereq is higher than a regular user doesn't stop these from being escalation issues to address

Potato Salad
Oct 23, 2014

nobody cares


Do you guys freak the gently caress out like this every time an exploit on some vendor's product is found?


actually I already know the answer, this isn't a question asked in good faith

Point, laugh and AMD for loving up sig validation, patch in a few weeks. Make sure your siem is alarming on unplanned firmware updates.

Potato Salad
Oct 23, 2014

nobody cares


And most importantly, continue to ridicule Intel for continuing to bungle Spectre patches while their PR handles the situation almost as poorly as TeamViewer :mensch:

Then go buy Intel chips :eng99:

Stanley Pain
Jun 16, 2001

by Fluffdaddy

Measly Twerp posted:

Looks like you've caused a meltdown in this thread. Maybe he'll get so mad that his heart gives out, and then his spectre will haunt the thread forever.

:golfclap:

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



'you have no idea what your talking about' shitposts the shitposter in between hilariously ignorant shitposts

e: actually they're not that funny but whatever

PerrineClostermann
Dec 15, 2012

by FactsAreUseless
... Did we conveniently forget that Chimera isn't even an AMD exploit? It's an ASMedia exploit, and is on Intel motherboards from the past 6 years.

orcane
Jun 13, 2012

Fun Shoe

PerrineClostermann posted:

... Did we conveniently forget that Chimera isn't even an AMD exploit? It's an ASMedia exploit, and is on Intel motherboards from the past 6 years.

Umm excuse me the website said "AMD VULNERABILITIES CATCHY NAMES, status: really loving bad*" so of course it's an AMD exploit.


* please sell all your stocks

Kazinsal
Dec 13, 2011



I'm still not concerned about the exploit that requires already having methods to completely pwn the machine.

It's a neat exploit, and yes it lets you gently caress with the firmware, but it still requires you to find some way to be on the other side of the airtight hatchway.

At that point you've already lost. This is just a deeper level of "you've lost".

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Potato Salad posted:


Point, laugh and AMD for loving up sig validation, patch in a few weeks. Make sure your siem is alarming on unplanned firmware updates.

And how exactly do you plan on interrogating hardware for firmware modifications when that in itself is a function of the firmware that has been tampered with?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

BangersInMyKnickers posted:

And how exactly do you plan on interrogating hardware for firmware modifications when that in itself is a function of the firmware that has been tampered with?

Force install it, then reimage? There’s still a window (attacker could be interfering with firmware update), but smaller.

The lack of 100% remediation other than hardware replacement is what I don’t like about this.

NewFatMike
Jun 11, 2015

Aww man I thought something cool happened with all the unread posts. Lame.

GRINDCORE MEGGIDO
Feb 28, 1985


So what about rumours of 8 core Intel desktop chips? Hope AMD has an answer to them beyond +200MHz in a year.

EmpyreanFlux
Mar 1, 2013

The AUDACITY! The IMPUDENCE! The unabated NERVE!

GRINDCORE MEGGIDO posted:

So what about rumours of 8 core Intel desktop chips? Hope AMD has an answer to them beyond +200MHz in a year.

Later this year, which means like 6 months for an answer from AMD if 7nm is on time.

GRINDCORE MEGGIDO
Feb 28, 1985


FaustianQ posted:

Later this year, which means like 6 months for an answer from AMD if 7nm is on time.

I just really hope they have something big planned, or it's not going to be pretty at all.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

GRINDCORE MEGGIDO posted:

I just really hope they have something big planned, or it's not going to be pretty at all.

7nm will put AMD at a node advantage. Even with no other changes, they probably close up their clock-speed disadvantage and are pulling significantly less power, plus they will probably also change to a 6-core or 8-core CCX.

Really, unless Intel has something big planned, they're the ones it's not going to be pretty for. They have really, really screwed the pooch on 10nm and they are out of time. They desperately need a post-Skylake uarch, whether that's moving to a CCX layout or if they can pull another rabbit out of the hat on IPC/clocks. Bigger dies aren't going to work forever and will be especially problematic on 10nm.

Paul MaudDib fucked around with this message at 05:33 on Mar 23, 2018

EmpyreanFlux
Mar 1, 2013

The AUDACITY! The IMPUDENCE! The unabated NERVE!
I'm not so sure, I mean on raw performance yes, but then Intel intends on releasing the Z390 boards which are going to be required for the 8C Coffeelakes, so anyone who's already invested in Coffeelake won't switch over and it's going to be a large enough expenditure that unless you're die hard Intel, you'll wait to see what Zen2 is like. Maybe Intel intends to just use Z390 to phase in Icelake as well? So you can flash a Z390 to be compatible, while they release H410, H460, H470 and Z490 to be compatible from the start?

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

FaustianQ posted:

I'm not so sure, I mean on raw performance yes, but then Intel intends on releasing the Z390 boards which are going to be required for the 8C Coffeelakes, so anyone who's already invested in Coffeelake won't switch over and it's going to be a large enough expenditure that unless you're die hard Intel, you'll wait to see what Zen2 is like. Maybe Intel intends to just use Z390 to phase in Icelake as well? So you can flash a Z390 to be compatible, while they release H410, H460, H470 and Z490 to be compatible from the start?

The leaked roadmaps don't show Cascade Lake on the client platform at all. They show it as "Purley Refresh", i.e. HEDT and -SP lineup.

EmpyreanFlux
Mar 1, 2013

The AUDACITY! The IMPUDENCE! The unabated NERVE!

Paul MaudDib posted:

The leaked roadmaps don't show Cascade Lake on the client platform at all. They show it as "Purley Refresh", i.e. HEDT and -SP lineup.

Not talking about Cascade Lake, talking about the rumored 8 core Coffee Lakes https://www.techradar.com/news/intel-coffee-lake-s-8-core-processors-will-land-later-this-year-3dmark-leak-teases

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Oh, I hadn't heard about a Coffee Lake refresh then. Well, back when everyone was whining about Z370, one train of thought was that crappy Z170/270 boards might be marginal for 6-core but that Intel might drop 8-cores at some point, and they wanted to set up that move. On the other hand, Intel is being super dickish about chipset compatibility in general, so who knows, but with a resurgent AMD they may be forced to be a little nicer to their customers. There's lots of ways this could play out.

It still doesn't change the fundamental balance of power here though. In 2019 they are probably going to be going up against 12-core 7nm Ryzen (a true second-gen architecture, not just a stepping) that clocks as high as theirs do. They have dead-ended themselves into extreme clockrates that 10nm can't deliver, they have dead-ended themselves into low-yielding monolithic chips that 10nm can't deliver, and they have dead-ended themselves into an architecture that is tapped out at this point and will probably involve short-term performance losses until stuff gets re-optimized. And they don't even have a functional 10nm process at this point.

Coffee Lake isn't the killing blow here, it's the last gasp of the big monolithic 14nm Sandy Bridge-sequence chips. If Intel is going to remain competitive, at least one of those things is going to have to change. Otherwise, AMD takes the performance crown in 2019, not just value or in MT performance but across the board. In fact, at this point that's probably almost inevitable in the short term, even if they do change course.

It's a loving mystery how Brian Krzanich still has a job, letting GF skip right over them and take a node advantage is straight-up incompetence and now they're going to have to do something drastic to catch up. If they had a working 10nm node they could have had a little more breathing room, but at this rate they've got a year until AMD is on top. They either need to get their 10nm working, or to start begging GF to let them use 7nm.

Paul MaudDib fucked around with this message at 06:20 on Mar 23, 2018

EmpyreanFlux
Mar 1, 2013

The AUDACITY! The IMPUDENCE! The unabated NERVE!
I feel like to really make progress at this time, AMD and Intel both need to work with software companies and specifically Microsoft so they can drop older instruction sets for better ones and regain die space and performance. Can't we just collapse MMX and SSE into a single unified SIMD extension and just emulate the bits still necessary until we migrate?

PC LOAD LETTER
May 23, 2005
WTF?!
There were some rumors a while back that Intel's new upcoming uarch (meant for 2020 or whatever) was essentially going to be attempting to get at least some of its performance improvements by simplifying the hardware by stripping out hardware support for older and now less used portions of the x86 ISA.

Exactly what that would mean (so would anything that was "old" (and what exactly would be considered "old" anyways? pre-IA32?? pre-x86-64???) now just be ran as slow microcode as needed?) and what sort of performance improvement it'd give you I couldn't really say.

Personally I don't think replacing MMX or SSE is going to get anyone much of anything like a improvement. Those older vector processing ISA's have largely been supplanted by SSE2-onwards and are pretty much legacy at this point already. From what (little) I understand dumping or greatly reducing hardware support for the x87 FPU and essentially emulating it via microcode on the CPU through the vector math FPU would probably be of bigger benefit than trying to do some sort of industry standard vector math ISA. Especially since SSE2+ is already the de facto standard.

Methylethylaldehyde
Oct 23, 2004

BAKA BAKA

FaustianQ posted:

I feel like to really make progress at this time, AMD and Intel both need to work with software companies and specifically Microsoft so they can drop older instruction sets for better ones and regain die space and performance. Can't we just collapse MMX and SSE into a single unified SIMD extension and just emulate the bits still necessary until we migrate?

You just tell the OS "lolno, I don't have MMX or SSE 1/2, you want these shiny new AVX functions, right?" Though who knows how much legacy crap has MMX optimizations only, or how much die space on the decode that would actually save.

Paul MaudDib
May 3, 2006

TEAM NVIDIA:
FORUM POLICE

Methylethylaldehyde posted:

You just tell the OS "lolno, I don't have MMX or SSE 1/2, you want these shiny new AVX functions, right?" Though who knows how much legacy crap has MMX optimizations only, or how much die space on the decode that would actually save.

The problem is the stuff that doesn't have fallbacks. There are games that won't run unless you have SSE2 or whatever, and having AVX isn't going to help you if the game doesn't understand that. Maybe that's an acceptable casualty if there's big gains, but I kinda doubt it.

PerrineClostermann
Dec 15, 2012

by FactsAreUseless
...Aren't most instructions broken down into common micro-ops anyway? Would you really save that much silicon by dropping old instruction sets?

Adbot
ADBOT LOVES YOU

Kazinsal
Dec 13, 2011



Yeah, you wouldn't save anything. You wouldn't even free up any pipelines by dropping MMX, since it shares a pipeline and register file with the x87 FPU.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply