geogriffin | 6 years ago | on: Uber made nearly $500M from a 'safe rides fee' – money went to company
geogriffin's comments
geogriffin | 7 years ago | on: Rust 1.34.0
geogriffin | 7 years ago | on: BoringTun, a Userspace WireGuard Implementation in Rust
They also implemented the noise handshake in a non-generic way tightly coupled to wireguard protocol, again written themselves instead of using an external dependency, which I think is also the approach other wireguard implementations have taken.. which is fine, but harder to independently verify. There's a lot of code there.
geogriffin | 7 years ago | on: Kernel RCE in iOS/macOS with ICMP
geogriffin | 7 years ago | on: Kernel RCE in iOS/macOS with ICMP
In this commit a bunch of code was copy-pasted from BSD into ip_icmp.c in icmp_error() to quote IP packet data in icmp error responses. Unfortunately they forgot to copy a line from the BSD source which would prevent the overflow:
icmplen = min(icmplen, M_TRAILINGSPACE(m) - sizeof(struct ip) - ICMP_MINLEN);
m is allocated with a fixed-length buffer (mbuf), which means without that line above we can overrun it: m = m_getcl(M_DONTWAIT, MT_DATA, M_PKTHDR);
Copy-paste programming in core networking code...geogriffin | 7 years ago | on: Meltdown strikes back: the L1 terminal fault vulnerability
geogriffin | 7 years ago | on: Understanding L1 Terminal Fault aka Foreshadow: What You Need to Know
> Only the CPU (silicon or microcode) can assist you in the flushing of L1 when you exit enclave mode.
This seems correct, upon double-checking. The interrupt process within SGX is called Asynchronous Enclave Exit (AEX) and does not give the enclave an opportunity to run any code upon interrupt, though it is possible to run code upon every enclave entry (via code placed at the Asynchronous Entry Pointer). I'm not sure that would help with any speculation-based exploits, however.
geogriffin | 7 years ago | on: Understanding L1 Terminal Fault aka Foreshadow: What You Need to Know
geogriffin | 7 years ago | on: Understanding L1 Terminal Fault aka Foreshadow: What You Need to Know
Also, the more major spectre-related microcode updates have to be applied very early (in the BIOS) probably for technical reasons. For this latest microcode update, for example, Intel didn't even include it in their downloadable microcode package as you linked to. On my v6 Xeons, I was able to get to revision 0x84 with the latest OS microcode package, but 0x8e with a BIOS upgrade.
geogriffin | 7 years ago | on: Understanding L1 Terminal Fault aka Foreshadow: What You Need to Know
If said SGX application wasn't built around this model then it's probably not a valid use case of SGX..
geogriffin | 7 years ago | on: Speculative execution, variant 4: speculative store bypass
$ gcc -o test test.c -Wall -DHIT_THRESHOLD=50 -DNO_INTERRUPTS
$ sudo ./test
I would guess the deadlock is due to a hardware watchdog timer rebooting the system, or some other hardware function that needs to be tended to periodically before it hangs.geogriffin | 8 years ago | on: Towards a Type System for Containers and AWS Lambda to Avoid Failures [pdf]
geogriffin | 8 years ago | on: A 1700-ton telco building that was relocated while running in 1950
geogriffin | 8 years ago | on: I'm Testifying to Congress about Data Breaches – What Should I Say?
geogriffin | 8 years ago | on: 10 years of love for Emacs undone by a week of VSCode
geogriffin | 8 years ago | on: Near Future of Programming Languages [pdf]
geogriffin | 8 years ago | on: How Chrome OS, Termux, YubiKey and Duo Mobile make for great usable security
- persistent state is discouraged, but not disallowed. in fact, when the browser is exploited, any/all internal state necessarily must be be accessable and modifiable. i'm taking an educated guess that persistent browser internal state is less guarded against exploitation than external inputs.
- once pwned, most of your important data can probably be captured and accounts taken over before you ever decide to reboot. it's a PITA to have to reboot before accessing anything sensitive; no one should have to think/remember to do that. (maybe if chromeos were serious about preventing persistent threats, they'd force a reboot every night?)
- yes, it's defense-in-depth, but security is a game of trade-offs, where convenience often trumps technical security mechanisms in terms of increasing security overall.
I enable dev mode, but I appreciate the "stateless" sentiment in terms of encouraging data backup. i think I end up backing up my data (git push, etc.) more often than I would on a non-chromeos laptop, because it "feels" like more a necessity; especially after my 2 yr-old son hit the spacebar during that god-awful dev-mode bootup warning screen, and proceeded to factory-reset my chromebook.
geogriffin | 8 years ago | on: Life Is About to Get Harder for Websites Without HTTPS
geogriffin | 8 years ago | on: How Discord Scaled Elixir to 5M Concurrent Users
geogriffin | 8 years ago | on: Intel Skylake/Kaby Lake processors: broken hyper-threading
Lawsuits in the US about deceptive fees like [1] come to mind.
[1] https://blog.ticketmaster.com/schlesinger-v-ticketmaster/