Windows 10: Windows Client Guidance against speculative execution vulnerabilities

Discus and support Windows Client Guidance against speculative execution vulnerabilities in Windows 10 News to solve the problem; Not of CPU, only microcode and FW. I know, but since the microcode is delivered by Intel... What is FW? Discussion in 'Windows 10 News' started by Brink, Jan 4, 2018.

  1. axe0 New Member

    Windows Client Guidance against speculative execution vulnerabilities


    I know, but since the microcode is delivered by Intel...

    What is FW?
     
  2. clam1952 Win User

    FW I presume is firmware.
     
    clam1952, Jan 6, 2018
    #92
  3. VBF
    VBF Win User
    I checked the ASUS Global
    link and I'm assuming that they won't provide updates for the "Asus Z87-A Motherboard - Haswell CPU only" which despite being 2013 "vintage" is my main PC and is still as powerful as i need, what with the 16GB memory and SSD.
    If anyone knows differently please respond
     
  4. Windows Client Guidance against speculative execution vulnerabilities

    Thank you. *Thumbs @ Intel *Haha I know, its not funny, but I couldn't resist. Please don't take offense. In a way they do deserve it some what.
     
    alphanumeric, Jan 6, 2018
    #94
  5. johngalt Win User
    Uh, no they were not. See my more full report below.

    Software is the majority pat of the problem - because of the software that was written to make use of capabilities provided by the CPU without forethought that such an exploit could ever be developed.

    ____

    Now, in the defense of the chip manufacturers as well as the software developers, this is a very new set of exploits.

    First off, some heavy technical background reading: https://meltdownattack.com/meltdown.pdf and https://spectreattack.com/spectre.pdf (and for some easier to understand but no less technical reading, also see https://www.renditioninfosec.com/fil...nd_Spectre.pdf )

    Now from the Meltdown PDF:

    These bugs were not discovered In Jan 2018. They were first theorized at BlackHat USA 2016 (July-August 2016) and further at BlackHat Europe (Nov 2016). Meltdown was disclosed to Intel in June 2017. The other chip manufacturers were told about the exploits also a while back, and they have been working with hardware partners for a long while to push out fixes. Microsoft worked on the NT kernel, as we saw with the Intel only IP build, and the Linux community patched the Linux kernel, and many software vendors like Mozilla and Google have patched their software (with Google, the final version of Chrome with the patches, v64, goes live in a couple of weeks for regular channel users, but Chrome Dev and Chrome Canary are already patched), and Google has rolled out a series of patches to its servers that show the performance hit is much, much lower than originally speculated.

    So, all your OEM hardware manufacturers that are putting out FW and BIOS patches now are not fast at all - they're actually behind already. Thees patches should have already been deployed to mitigate the effects of the exploits before they were made public so that the end users would already be safe from any newly developed malware looking to make use of the exploits.
     
    johngalt, Jan 6, 2018
    #95
  6. Tony K Win User
    I'm still in a quandary. Here I sit with this...


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]


    And a statement from AMD: An Update on AMD Processor Security | AMD with a questionable explanation of one exploit: "Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date." "Near zero" is not an absolute to me.

    With nothing from ASUS so far as my board with an AMD chip.

    So am I secure or not?
     
    Tony K, Jan 7, 2018
    #96
  7. johngalt Win User
    Bottom line:

    Meltdown can be secured, but thus far, no one has found a way to secure against Spectre.
     
    johngalt, Jan 7, 2018
    #97
  8. Tony K Win User

    Windows Client Guidance against speculative execution vulnerabilities

    Ok, thanks. Will that take a complete chip redesign?
     
    Tony K, Jan 7, 2018
    #98
  9. johngalt Win User
    More so than just a chip redesign.

    The idea here is that memory isolation is foolproof - like MD5 was foolproof. Only they're not.

    If you take out the speculative loading of information, then the info is only loaded when called, which means it takes time (CPU cycles) to load the information at call time. But that is not good enough - after being used, you have to clear the registers so that the info is no longer present, taking yet more CPU time. And therein lies the real problem with respect to performance issues. You're now using a lot more CPU cycles for every secure transaction call than you were previously.

    A good, simplistic analogy for this goes like this: You use your browser for online banking. So, you typically load the webpage, fill in your credentials and do your banking. It takes X amount of time to do so.

    Now imagine that, because of a new exploit, this is the manner you have to conduct online banking:

    You load your browser, and load the webpage. In order to log in, you have to authenticate yourself to the server, which requires a passcode of some type that you have to hash out (manually) on the fly.

    Now you can conduct your business - but every time you perform a transaction, you have to rehash out your password, over and over again, because the system doesn't cache your information, and you have to call it repeatedly. This is because once the info you requested has been given to you, it erases itself from memory, so effectively, you have to log back in to your bank each and every time.

    See how this becomes cumbersome even for 5 simple transactions?

    Now imagine expanding that to millions of transactions per second.

    Mind you, as I said this is a simplistic view of things - but it gets the point across very, very well.

    Just imagine if you will how long it would take if you had to log in each time you wanted to post a reply here at 10F *Tongue
     
    johngalt, Jan 7, 2018
    #99
  10. Tony K Win User
    Thanks. That explains it well. How about somehow "firewalling" the memory? Stop someone from coding to "pull the data out of the pipe" as you explained earlier. Or how about using multiple CPUs? That would be quite expensive, though. *Shock

    And come to think of it, where does encryption fit in with all this? Why would it make any difference if the data is encrypted?
     
    Tony K, Jan 7, 2018
  11. johngalt Win User
    Well, if you really think about it, the way that the CPU is set to make use of memory isolation is, in a sense, a type of firewalling to begin with. Right now you cannot access that information in those registers directly - they're effectively firewalled from active processes, except those that have the correct credentials to allow access to the information in those specific registers. But the exploit breaks the access chain, and then allows a dump of what's there, providing indirect access.

    As far as encryption goes, though, from my (albeit limited) understanding, is that when you encrypt something, you need a key to decrypt. Guess where decryption keys are stored?

    All in all, it's basically the idea that this was developed as a system to increase performance because, at the time of development, no one thought outside the box and realized that this sort of exploit would ever work, or could ever be leveraged against the CPU.

    Now, of course, we know differently.

    Mind you, though I've been trying to explain all of this, I'm also actually still trying to wrap my noodle around it all. A lot of this is way above my knowledgeset, and I'm learning a lot of new things here that I, more than likely, would never have been exposed to. So, I apologize in advance if I am misrepresenting this in any way.

    Still, though, from what I have thus far gleaned in all the reading I've done (and it is a tremendous volume of stuff I have been reading, minus all the media hype - I stopped all those types of links a while back, as I kept getting the same spin without any real, hard, substantive facts) and it is quite ingenious the way the system is supposed to work in the first place.
     
    johngalt, Jan 7, 2018
  12. CountMike New Member
    Is there an example of it being exploited in malicious manner ?
     
    CountMike, Apr 4, 2018
Thema:

Windows Client Guidance against speculative execution vulnerabilities

Loading...
  1. Windows Client Guidance against speculative execution vulnerabilities - Similar Threads - Client Guidance against

  2. Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...

    in AntiVirus, Firewalls and System Security
    Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...: Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5753: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5754: Guidance to mitigate speculative execution side-channel...
  3. Manage Speculative Execution Settings Script for Windows

    in Windows 10 News
    Manage Speculative Execution Settings Script for Windows: Manage Speculative Execution Settings Script is a batch file for Microsoft Windows devices to check and manage the Speculative Execution Protection status on the system. Speculative Execution side-channel attacks are a new class of vulnerabilities that started to make waves...
  4. Windows client guidance for IT Pros to protect against speculative

    in Windows 10 News
    Windows client guidance for IT Pros to protect against speculative: Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities Applies to: Windows Server 2016 Version 1709, Windows Server 2012 R2 Standard, Windows Server 2012 Standard, Windows Server 2008 R2 Service Pack 1, Windows Server 2008...
  5. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  6. Surface Guidance for speculative execution side-channel vulnerability

    in Windows 10 News
    Surface Guidance for speculative execution side-channel vulnerability: Surface Guidance to protect against speculative execution side-channel vulnerabilities Applies to: Surface Pro 4, Surface Book, Surface Studio, Surface Pro (latest), Surface Laptop, Surface Pro with LTE Advanced, Surface Book 2 - 13 inch, Surface Book 2 - 15 inch...
  7. SQL Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    SQL Server Guidance against speculative execution vulnerabilities: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and...
  8. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...
  9. Azure Stack Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Azure Stack Guidance against speculative execution vulnerabilities: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern...
  10. Windows Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Windows Server Guidance against speculative execution vulnerabilities: Windows Server guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern...