On Thu 2021-02-04 23:51:36, Pavel Machek wrote: > On Thu 2021-02-04 14:17:13, Kees Cook wrote: > > On Thu, Feb 04, 2021 at 11:11:43PM +0100, Pavel Machek wrote: > > > On Thu 2021-02-04 15:59:21, Timur Tabi wrote: > > > > On 2/4/21 3:49 PM, Pavel Machek wrote: > > > > >This machine is insecure. Yet I don't see ascii-art *** all around.. > > > > > > > > > >"Kernel memory addresses are exposed, which is bad for security." > > > > > > > > I'll use whatever wording everyone can agree on, but I really don't see much > > > > difference between "which may compromise security on your system" and "which > > > > is bad for security". "may compromise" doesn't see any more alarmist than > > > > "bad". Frankly, "bad" is a very generic term. > > > > > > Well, I agree that "bad" is vague.... but original wording is simply > > > untrue, as printing addresses decreases robustness but can't introduce > > > security problem on its own. > > > > > > Being alarmist is not my complaint; being untrue is. > > > > It's just semantics. Printing addresses DOES weaken the security of a > > system, especially when we know attackers have and do use stuff from dmesg > > to tune their attacks. How about "reduces the security of your system"? > > "reduces" sounds okay to me. > > You should not have attackers on your system. That reduces your security. > > You should not have users reading dmesg. Again that reduces your > security. > > You should not have bugs in your kernel. That reduces your security. Oh, and you really should not run modern, out-of-order CPU. That significantly reduces your security. Yet we have documentation stating that my machine is secure: The Linux kernel contains a mitigation for this attack vector, PTE inversion, which is permanently enabled and has no performance impact. The kernel ensures that the address bits of PTEs, which are not marked present, never point to cacheable physical memory space. A system with an up to date kernel is protected against attacks from malicious user space applications. when it is not: [ 0.545064] L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. [ 0.545163] L1TF: You may make it effective by booting the kernel with mem=2147483648 parameter. Best regards, Pavel -- http://www.livejournal.com/~pavelmachek
Attachment:
signature.asc
Description: Digital signature