hah! with my ears, I don't care how bloody silent they make the things, I can 
still hear those blades slicing the air at 5 miles.

-eric
from the central offices of the Technomage Guild, Sensors Dept.

On Jan 12, 2018, at 3:53 AM, Aaron Jones wrote:

> https://www.airspacemag.com/military-aviation/air-americas-black-helicopter-24960500/
> 
> This article says they flew Laos to NV. But I swear the first time I heard 
> this story the teller said Cambodia. The pilot on this did a really cool 
> writeup I can’t find any more about his experience. 
> 
> I would like to have a decibel comparison between the new silent blackhawk 
> and the loach-p. Silent being relative.
> 
> On Jan 12, 2018, at 12:29 AM, Stephen Partington <cryptwo...@gmail.com> wrote:
> 
>> Yes. There were a couple of details I wanted but was not finding. Thank you. 
>> 
>> On Jan 11, 2018 7:24 PM, "Aaron Jones" <retro64...@gmail.com> wrote:
>> Thanks Joe.
>> 
>> You should blog an article about this cuz that was the best explanation for 
>> the issue I have read so far.
>> 
>> > On Jan 11, 2018, at 6:42 PM, Joseph Sinclair <plug-discuss...@stcaz.net> 
>> > wrote:
>> >
>> > There seems to be a lot of confusion surrounding the recently disclosed 
>> > CPU hardware issues...
>> > A few points to consider:
>> > 1) This is a cache timing attack using speculative execution (a key 
>> > performance feature in the hardware) that exposes data (i.e. it's not an 
>> > exploit to "take over" a system); it can only read memory, and only VERY 
>> > slowly, while thrashing the heck out of the CPU.
>> > 2) Abusing speculative execution is literally something nobody thought of 
>> > doing until a few years ago.
>> > 3) The researchers spent an immense amount of time figuring out tactics 
>> > that worked, time no hardware design engineer would ever have had 
>> > available, assuming that engineer even had the knowledge to do the coding 
>> > required (hint: they don't).
>> > 4) Exploiting these flaws is HARD.  It requires native code execution, 
>> > careful and highly skilled coding, specific targeting of the memory to be 
>> > read, and a lot of time on the target machine without tripping alarms due 
>> > to CPU use.
>> > 5) The major concern here is things like VM farms because this allows 
>> > untrusted code in a guest to (very slowly) read memory from the host or 
>> > other guests.  It's possible to use in other contexts, but the 
>> > cost/benefit balance is pretty bad; desktops and other targets are far 
>> > easier to exploit with well-known and widely used "social" hacks.
>> >
>> > Lacking the full detail, I would venture that this *type* of exploit is 
>> > possible (in some form) for every Intel CPU since the original Pentium PRO 
>> > which introduced speculative execution to the Intel architecture.
>> > We don't need to replace hardware, fortunately, this specific set of 
>> > tactics can be mitigated by having the Kernel (along with microcode, aka 
>> > firmware) set flags in the CPU to force a full context switch in the 
>> > specific situations identified by the researchers.
>> > Yes, mitigation slows down execution a bit; basically the IPC for Intel 
>> > chips now roughly matches the IPC for AMD chips which always forced the 
>> > context switch (due to a different design balance).
>> > I would venture that this flaw is actually caused by Intel having such a 
>> > heavy focus to achieve (and maintain) higher IPC levels than AMD, and 
>> > cutting a (seemingly benign) corner to accomplish that.
>> >
>> > A bit of inside-baseball here:
>> > Every digital design engineer looks for what we call "don't cares"  
>> > segments of the boolean map where the logic value has no impact on the 
>> > "correctness" of the result.
>> > Those are places where we can cut gate count or speed up execution.
>> > Avoiding a context switch in a CPU with the Intel design for 3 layer 
>> > caching is one of those areas where "don't cares" can show up.
>> > My gut feel is that the Intel engineers saw an opportunity to retain 
>> > "correct" execution of code while speeding up speculative execution by 
>> > skipping the context switch until it was actually necessary (e.g. the 
>> > speculative branch became "live").
>> > It is exactly the kind of thing I can see a really smart engineer doing 
>> > because, without future knowledge, it's actually the right thing to do.
>> > You get faster execution without any added cost and without breaking 
>> > existing code.
>> > That, in retrospect, was a mistake that allowed a very sophisticated 
>> > attacker to read a few bits of unauthorized memory in a very sneaky manner.
>> > That someone, a decade or two after the design arose, discovered a way to 
>> > misuse that design isn't a sign of malice or malpractice; it's a sign that 
>> > security researchers are getting REALLY good at finding unexpected ways to 
>> > use hardware design against security.
>> >
>> >
>> > P.S.
>> > That reddit article is utter garbage.
>> > Yes, there is, on some motherboards, a Management Engine which is a 
>> > *separate* CPU, is mostly present only on "business" and server 
>> > motherboards, and has NOTHING TO DO WITH the recent exploits.  The FSF and 
>> > others have been warning about that particular bit of hardware for a long 
>> > time.
>> > The ME has valuable functionality that makes sense for servers especially, 
>> > and for business-owned machines in general (mostly remote system 
>> > management, particularly lights-out management).
>> > The ME was added to the system at the request of business customers so 
>> > they could remotely access machines owned by the business (even if turned 
>> > off) and either manage their servers or ensure the main O/S and 
>> > applications were kept in compliance with policy on desktops.
>> > Every motherboard I've seen with an ME (and only some have one) can 
>> > disable the ME; usually with a jumper or switch on the board.
>> > As I understand things it was actually government buyers who demanded the 
>> > ability to disable the ME (originally it couldn't be disabled), because 
>> > government agencies are targets far more often than they are attackers.
>> >
>> >> On 2018-01-11 10:36 AM, techli...@phpcoderusa.com wrote:
>> >> This is basic stuff.  Kernel memory must be segregated and each
>> >> application's memory must be segregated.  These are the basics of CPU
>> >> functionality.  That is why I find theses issues perplexing. And it
>> >> leads me to one basic question.  If these problems persisted since 1995,
>> >> how could these issue go undetected until recently when multiple
>> >> separate groups discovered these flows?  AND is it possible others have
>> >> found and used these flaws for their own gain?
>> >>
>> >> No matter what happened, politics, accident... etc We have a HUGE
>> >> problem.  Even if there were CPUs that were not vulnerable, it would
>> >> take years to replace all computers that are publicly facing.  In the
>> >> mean time there are some seriously evil people / groups / countries that
>> >> will be looking into how they can use theses chip bugs / vulnerabilities
>> >> / features... to further their goals.
>> >>
>> >>> From what I can tell the solution is to use software - the kernel to fix
>> >> or patch the shortcomings of these CPUs.  A software patch to fix
>> >> hardware.  This is very scary.  A software patch can be removed and / or
>> >> replaced, leaving the host vulnerable.
>> >>
>> >>> On 2018-01-11 10:10, Mark Phillips wrote:
>> >>>
>> >>> No, I don't work at Intel. I am, however, not a believer in all the 
>> >>> government conspiracy theories floating around the Internet.
>> >>>
>> >>> Mark
>> >>>
>> >>> On Thu, Jan 11, 2018 at 9:25 AM, Aaron Jones <retro64...@gmail.com> 
>> >>> wrote:
>> >>>
>> >>> Signals intelligence is believed to have been birthed in 1904.
>> >>>
>> >>> But exploiting hardware isn't new. For military, police, or criminal 
>> >>> intentions.
>> >>>
>> >>> You work at Intel Mark? Lol
>> >>>
>> >>> On Jan 11, 2018, at 9:11 AM, Mark Phillips <m...@phillipsmarketing.biz> 
>> >>> wrote:
>> >>>
>> >>> There is no conspiracy here. 23 years ago no one thought about attack 
>> >>> vectors and how to take over machines. It is only recently that we are 
>> >>> all sensitized to this problem. Even though the tech world is sensitized 
>> >>> to the nature of exploits, companies still ship brand new products (e.g. 
>> >>> Nest, cars, etc.) that can be exploited by almost anyone. It was only 
>> >>> recently that router and switch companies stopped using admin and admin 
>> >>> as login credentials!
>> >>>
>> >>> Your argument that these new CPU exploits are a government conspiracy 
>> >>> can be applied to any potential exploit discovered today in a piece of 
>> >>> code written yesterday.
>> >>>
>> >>> Mark
>> >>>
>> >>> On Thu, Jan 11, 2018 at 9:02 AM, Carruth, Rusty 
>> >>> <rusty.carr...@smartm.com> wrote:
>> >>> As mentioned earlier, I've done my share of ... um, looking for flaws in 
>> >>> design of operating systems back when I was in college.  (What, 1976?)
>> >>>
>> >>> We discovered some bad flaws in the design of the <redacted>.  How long 
>> >>> had the Univac been around?  I don't know, but a while.  Unless someone 
>> >>> with WAY too much time on their hands is actively seeking ways around 
>> >>> stuff, there's only so much 'bug' you can find. (and, actually, you 
>> >>> really need more than one person involved (partially so someone can ask 
>> >>> the 'right' stupid question :-))
>> >>>
>> >>> Doesn't take malice or sloppiness, and I will say being a 
>> >>> publicly-traded company makes it very hard to spend the time required to 
>> >>> even start on the hacking required (Being publically-traded makes your 
>> >>> owner effectively insane, since your owner is actually many people, all 
>> >>> with different and often diametrically opposing goals for the company).
>> >>>
>> >>> Anyway, tell you what - go read the Intel hardware docs and see if you 
>> >>> can find the info needed to put together to see the bug.  And this with 
>> >>> prior knowledge of where to look.
>> >>>
>> >>> I will say that this doesn't excuse much, but realize that being a 
>> >>> public company drives you insane ;-)
>> >>>
>> >>> Rusty
>> >>>
>> >>> -----Original Message-----
>> >>> From: PLUG-discuss [mailto:plug-discuss-boun...@lists.phxlinux.org] On 
>> >>> Behalf Of techli...@phpcoderusa.com
>> >>> Sent: Thursday, January 11, 2018 8:42 AM
>> >>> To: Main PLUG discussion list
>> >>> Subject: Re: Post : INTEL'S SECURITY FLAW IS NO FLAW
>> >>>
>> >>> ...
>> >>>
>> >>> I've read these issues may have persisted as far back as 1995.  How does
>> >>> that happen?  How does an army of engineers miss this for 23 years?  How
>> >>> do you explain that?
>> >>>
>> >>> That means lots of people came and went.  There should have been lots of
>> >>> QA... for 23 years.
>> >>>
>> >>> How does this happen?  Only two ways I can see 1) sloppy work, or 2)
>> >>> intentionally.
>> >>>
>> >>> ---------------------------------------------------
>> >>> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> >>> To subscribe, unsubscribe, or to change your mail settings:
>> >>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss [1]
>> >>
>> >>> ---------------------------------------------------
>> >>> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> >>> To subscribe, unsubscribe, or to change your mail settings:
>> >>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss [1]
>> >>
>> >> ---------------------------------------------------
>> >> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> >> To subscribe, unsubscribe, or to change your mail settings:
>> >> http://lists.phxlinux.org/mailman/listinfo/plug-discuss [1]
>> >> ---------------------------------------------------
>> >> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> >> To subscribe, unsubscribe, or to change your mail settings:
>> >> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>> >>
>> >> Links:
>> >> ------
>> >> [1] http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>> >>
>> >>
>> >>
>> >> ---------------------------------------------------
>> >> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> >> To subscribe, unsubscribe, or to change your mail settings:
>> >> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>> >>
>> >
>> > ---------------------------------------------------
>> > PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> > To subscribe, unsubscribe, or to change your mail settings:
>> > http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>> ---------------------------------------------------
>> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> To subscribe, unsubscribe, or to change your mail settings:
>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>> 
>> ---------------------------------------------------
>> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
>> To subscribe, unsubscribe, or to change your mail settings:
>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss

---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss

Reply via email to