Added inital blogpost
This commit is contained in:
parent
0939401b25
commit
4ae48518db
143
src/_posts/2018-01-11-spectre-and-meltdown.md
Normal file
143
src/_posts/2018-01-11-spectre-and-meltdown.md
Normal file
@ -0,0 +1,143 @@
|
||||
---
|
||||
layout: post
|
||||
title: Spectre and Meltdown
|
||||
description: Our response to the Intel/ARM proccesor mess
|
||||
image: pic01.jpg
|
||||
category: values
|
||||
date: 2018-01-11
|
||||
---
|
||||
|
||||
Autonomic have now completed the process of applying patches to to all
|
||||
of our servers in response to the so called Spectre and Meltdown
|
||||
vunrebilities. Our upstream providers have also confirmed that they have
|
||||
patched their infrastructure also.
|
||||
|
||||
We are currently super busy with clients so we decided to repost the
|
||||
excellent security buliten from out friends over at Rise Up. All credit
|
||||
to them for the rest of this blog post :)
|
||||
|
||||
As you have probably read, there are three related security problems in
|
||||
contemporary CPUs. These vulnerabilities open the potential for a
|
||||
nefarious program to steal passwords, secrets, and personal information
|
||||
from you computer, even if the program is just Javascript loaded from a
|
||||
web site you visit. These vulnerabilities are as serious as they sound,
|
||||
and you should take action to upgrade your software.
|
||||
|
||||
* The first flaw, called "Meltdown," affects nearly all Intel CPUs and
|
||||
has been fixed with updates to most operating systems.
|
||||
|
||||
* The two other flaws, called "Spectre," apply to nearly all CPUs built
|
||||
in the last 20 years, not just Intel, although they are more difficult
|
||||
to exploit. There are no permanent fixes for Spectre available at this
|
||||
time, although if you update your software you will make these attacks
|
||||
much less likely.
|
||||
|
||||
You should take *both* these steps now, for all your devices:
|
||||
|
||||
1. Upgrade your web browser (see below). These fixes make the new
|
||||
attacks against CPUs more much difficult.
|
||||
|
||||
2. Upgrade your operating system. There are updates available for
|
||||
Windows, macOS, and GNU/Linux that fix the Meltdown vulnerability for
|
||||
Intel CPUs and provide some mitigations for Spectre. Additionally, new
|
||||
releases of iOS and Android have mitigations for Spectre.
|
||||
|
||||
Better fixes will continue to arrive in the next weeks/months for your
|
||||
operating system and software. Please keep your system up to date!
|
||||
|
||||
## Browsers
|
||||
By updating your browser, you can make it significantly harder for an
|
||||
attacker to steal secrets off your computer using Javascript loaded from
|
||||
a web site you visit.
|
||||
|
||||
Firefox version 57.0.4 and later includes mitigation measures [against
|
||||
Spectre attack] [1].
|
||||
|
||||
Edge has been updated to include Spectre migitations. When you apply the
|
||||
latest Windows update, you will get the new version of Edge.
|
||||
|
||||
Safari will be updated very soon, according to Apple. Check the App
|
||||
Store updates.
|
||||
|
||||
Chrome will include Spectre mitigations starting with version 64, to be
|
||||
released Jan 23. In the mean time, you can change your configuration to
|
||||
greatly mitigate against the Spectre vulnerability by enabling "site
|
||||
isolation" [https://support.google.com/chrome/answer/7623121?hl=en]
|
||||
|
||||
Additionally, please see [https://riseup.net/en/better-web-browsing] for
|
||||
instructions on best practices for securing your web experience (which
|
||||
will also help mitigate against these new attacks).
|
||||
|
||||
## Windows
|
||||
For Windows 10, you must first upgrade any anti-virus software before
|
||||
upgrading Windows. Failure to do so may make your computer stop working.
|
||||
[2]
|
||||
|
||||
To upgrade Windows 10:
|
||||
|
||||
> Select the Start button, and then go to Settings > Update & security > Windows Update, and select Check for updates.
|
||||
|
||||
Now is a good time to enable automatic updates:
|
||||
|
||||
> Select the "Start" button, then select "Settings" > "Update & security" > "Windows Update" > "Advanced options" and then under "Choose how updates are installed", select "Automatic (recommended)".
|
||||
|
||||
If you are running Windows 7 or 8, an update is also available.
|
||||
|
||||
## macOS
|
||||
If you already have macOS version 10.13.2 then you are [protected against
|
||||
Meltdown] [3]. Otherwise, to upgrade macOS:
|
||||
|
||||
> Open the App Store app on your Mac. Click "Updates" in the App Store toolbar, then use the "Update" buttons to download and install any updates listed.
|
||||
|
||||
Now is a good time to check enable automatic updates:
|
||||
|
||||
> Select the Apple menu, then select "System Preferences" > "App Store" > "Automatically check for updates".
|
||||
|
||||
Apple plans to soon release an update to Safari browser to provide some
|
||||
mitigation against Spectre.
|
||||
|
||||
## iOS
|
||||
Apple has said that iOS is affected by Spectre, and an update to
|
||||
mitigate against most of the new attacks has been released. If you have
|
||||
iOS version 11.2 or later, [then you are good] [3].
|
||||
|
||||
To check for new updates, go to Settings > General > Software Update.
|
||||
|
||||
## Android
|
||||
The bad news is that Android is vulnerable to Spectre and unless you
|
||||
have a Google-branded phone or run a custom firmware you might not get
|
||||
an update for months, if ever. However, the consensus among security
|
||||
researchers at the moment is that the Spectre attack is difficult enough
|
||||
that there are probably easier ways to compromise an Android device.
|
||||
Yeah?
|
||||
|
||||
There is one thing you can do now to make your Android device more safe
|
||||
against these new CPU attacks:
|
||||
|
||||
* Turn on "site isolation" in Chrome:
|
||||
https://support.google.com/chrome/answer/7623121?hl=en
|
||||
* Upgrade Chrome Browser after Jan 23.
|
||||
* Alternately, use Firefox for Android.
|
||||
|
||||
## Debian/Ubuntu GNU/Linux
|
||||
Run "Software Center" or "Software Updater."
|
||||
|
||||
Alternately, open a terminal and type:
|
||||
|
||||
```
|
||||
sudo apt update
|
||||
sudo apt upgrade
|
||||
sudo reboot
|
||||
```
|
||||
|
||||
## Fedora GNU/Linux
|
||||
Open a terminal and type:
|
||||
|
||||
```
|
||||
sudo dnf --refresh update kernel
|
||||
sudo reboot
|
||||
```
|
||||
|
||||
[1] [https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/]
|
||||
[2] [http://www.theregister.co.uk/2018/01/04/microsoft_windows_patch_meltdown/]
|
||||
[3] [https://support.apple.com/en-us/HT208394]
|
Reference in New Issue
Block a user