Re: 32 bit fix? (Was Re: Meltdown – Spectre)
kraduk at gmail.com
Wed Jan 10 13:47:00 UTC 2018
Ideally no, but most do have the capability these days, as they are multi
use systems. Eg freenas can run jails, and vms, unraid doing docker stuff
On 10 January 2018 at 11:36, Dave B via freebsd-questions <
freebsd-questions at freebsd.org> wrote:
> Hi again.
> When I have more info (re the early CPU's etc) I'll come back here with
> Agreed re "appliance" NAS devices, "shouldn’t be running arbitrary
> code". But see the recent news re most WD MyCloud devices!Hard coded
> back door's etc, so "some malicious bar steward" could probably plant
> such if they wished.
> Do you know about the "Shodan" search engine? That makes it all too
> easy to find web facing appliances. Cameras, drives, printers, PVR's,
> light bulbs and other IoT "things"... https://www.shodan.io/ Enjoy!
> Thanks for now.
> Dave B
> On 10/01/18 11:23, Arthur Chance wrote:
> > On 10/01/2018 09:41, Dave B via freebsd-questions wrote:
> >> Hi Ed.
> >> Understood. There's "a lot" of FreeBSD based kit out there, running on
> >> 32 bit hardware. A lot of NAS's for one. (I don’t suppose any of
> >> those commercial "appliances" will ever be updated though.)
> > An attack requires running code exploiting the vulnerability on the
> > target machine. NAS type appliances shouldn't allow arbitrary code to be
> > run. (Emphasis on shouldn't, a lot of appliances seem not to care about
> > security.)
> >> But from my understanding, this problem has probably been present since
> >> 1995, and maybe even earlier. There is a paper published somewhere that
> >> documents such issues, dated around 1992! Awaiting for the SN645 show
> >> notes to be published, for that info.
> > I can't find the article I was reading right now, but it said Intel
> > chips became vulnerable when the Westmere architecture (the 32 nm
> > version of Nehalem) was introduced back in 2010. That was the early days
> > of the Core i CPUs, so Core and Core 2 CPUs are probably too old to
> > be affected.
> >> (Keep an eye on https://www.grc.com/securitynow.htm )
> >> The conclusion then, was that it was probably not a problem as would be
> >> "too difficult" to manipulate for any gain.
> >> The machines I have, are ex Win'2000 boxes, so are probably affected.
> >> One of them was web facing. It's not now!
> >> Best Regards.
> >> Dave B.
> >> (G0WBX)
> >> On 10/01/18 03:29, Ed Maste wrote:
> >>> On 9 January 2018 at 07:23, Dave B via freebsd-questions
> >>> <freebsd-questions at freebsd.org> wrote:
> >>>> When is a patch for i386 (32 bit) versions likely to be available?
> >>>> Regards.
> >>>> Dave B.
> >>>> (I only run non GUI 32 bit instances of FreeBSD, on older hardware,
> >>>> NTP machines etc.)
> >>> Similar techniques can be applied to i386, but they are a lower
> >>> priority and we don't yet have a timeline. I expect that i386 patches
> >>> will follow after the full set of mitigations have been applied to
> >>> amd64.
> >>> Note that if the "older hardware" is old enough it may predate these
> >> _______________________________________________
> >> freebsd-questions at freebsd.org mailing list
> >> https://lists.freebsd.org/mailman/listinfo/freebsd-questions
> >> To unsubscribe, send any mail to "freebsd-questions-
> unsubscribe at freebsd.org"
> freebsd-questions at freebsd.org mailing list
> To unsubscribe, send any mail to "freebsd-questions-
> unsubscribe at freebsd.org"
More information about the freebsd-questions