On Sun, Jan 7, 2018 at 1:59 PM Robert Nelson <robertcnel...@gmail.com> wrote:
> On Sun, Jan 7, 2018 at 12:52 PM, 'Luther Goh Lu Feng' via BeagleBoard > <beagleboard@googlegroups.com> wrote: > > I am under the impression that BBB is affected as it runs AM335x 1GHz > ARMĀ® Cortex-A8. What are the mitigations/recommendations to address this, > if any? > > Well, according to "ARM": > > https://developer.arm.com/support/security-update > > No : indicates not affected by the particular variant. > Yes : indicates affected by the particular variant but has a > mitigation (unless otherwise stated). > > Cortex-A8 > > Variant 1:Yes (under review) > Variant 2: Yes > Variant 3: No > Variant 3a: No > This leaves a lot of questions for me. TI is working on a more formal response that better summarizes our/their position. There are a number of mitigations, but I think more analysis should be performed to determine the confidence-level they provide. GKH has some thoughtful blog material, but also stops short of being conclusive. I've heard some question if VFP or NEON provide additional attack vectors. Fundamentally, I think those of us making embedded systems need to be conscientious of what untrusted code we allow to run on our systems and that there are likely more interesting attack vectors, depending on how we secure our systems. For example, do you disable ssh and evaluate the security of other network-based servers on the system? I just mean that Meltdown and Spectre attacks assume some ability to run userspace code on your system and you should probably already be preventing that. IoT worms/trojans and/or web server overflow bugs are more likely to be a security issue in an embedded system. In yet more other words, security requirements should be considered at a system-design level and a one-size-fits all solution of chasing down the latest issues facing desktop systems isn't likely to address your security needs. Hope this didn't come across as deflective or rude, as I do think a good analysis of the BeagleBone/BeagleBoard risks related to Meltdown/Spectre are necessary. I just don't think the analysis or the mitigations are ready to declare at this time. In addition to Robert's link, you can read http://www.kroah.com/log/blog/2018/01/06/meltdown-status/ as well. The ARM recommended mitigations look a bit complex at this point, but are worth examining if you have concerns about the information that can be recovered using these attack methods and your system is exposed to them. > Regards, > > -- > Robert Nelson > https://rcn-ee.com/ > > -- > For more options, visit http://beagleboard.org/discuss > --- > You received this message because you are subscribed to the Google Groups > "BeagleBoard" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to beagleboard+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/beagleboard/CAOCHtYjY%3DG3nEF7eCYi8tmSdRPdxCRbvaRhfOfDt4n-ak%2BqveA%40mail.gmail.com > . > For more options, visit https://groups.google.com/d/optout. > -- https://beagleboard.org/about -- For more options, visit http://beagleboard.org/discuss --- You received this message because you are subscribed to the Google Groups "BeagleBoard" group. To unsubscribe from this group and stop receiving emails from it, send an email to beagleboard+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/beagleboard/CA%2BT6QP%3DixDcmWjOviCTkOPWfq%3D2iUFYsTZ0Jp7YnZ6GeJpLbOA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.