Home Security Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt

Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt

Disclosure of the Meltdown and Spectre vulnerabilities, which affect mainly Intel CPUs, was handled "in an incredibly bad way" by both Intel and Google, the leader of the OpenBSD project Theo de Raadt claims.

"Only Tier-1 companies received advance information, and that is not responsible disclosure – it is selective disclosure," De Raadt (below, right) told iTWire in response to queries. "Everyone below Tier-1 has just gotten screwed."

Details of the bugs were published on the Web on 3 January though there had been an understanding that disclosure would only take place on 9 January, that being the day when Microsoft is scheduled to release its monthly security updates.

The reason for this is because the bugs mainly affect Intel CPUs and Windows is the operating system that has the biggest share of such processors.

Google justified breaking the embargo, saying: "We are posting before an originally coordinated disclosure date of January 9, 2018 because of existing public reports and growing speculation in the press and security research community about the issue, which raises the risk of exploitation."

theo de raadt vert 2018The reason why such bugs had come about was put down by De Raadt to Intel's desire to stay far ahead of the competition; hence it had played "fast and loose".

Meltdown removes the barrier between user applications and sensitive parts of the operating system while Spectre, which is also reportedly found in some AMD and ARM processors, can trick vulnerable applications into leaking the contents of their memory.

"There are papers about the risky side-effects of speculative loads – people knew, and as a result no other vendor's chips does speculative loads (Meltdown – Intel Only) in a significant way," said de Raadt who heads a project that has an enviable reputation in that it has had just two remotely exploitable bugs in its default install since it started in 1996.

"Intel engineers attended the same conferences as other company engineers, and read the same papers about performance enhancing strategies – so it is hard to believe they ignored the risky aspects. I bet they were instructed to ignore the risk," he said.

"It is a scandal, and I want repaired processors for free. I don't care if they are 30% slower, as long as they work to spec. Intel has been exceedingly clever to mix Meltdown (speculative loads) with a separate issue (Spectre). This is pulling the wool over the public's eyes."

De Raadt found an analogy with the Volkswagen emission issue. "Some VW executives probably wish a problem with their brake controller software has been discovered at the same time," he quipped.

OpenBSD has a good reputation for security and runs some of the public servers with the longest uptimes. De Raadt himself is obsessed with security, and has as his aim the provision of an operating system which has a secure default install.

Given that, his barely suppressed anger at the security snafus revealed last week was understandable. "I am terrified of where this leads. Intel architecture is already very inconsistent, complex, and difficult to deal with," he said.

"Suddenly the trickiest parts of a kernel need to do backflips to cope with problems deep in the micro-architecture. This tricky component of kernel software is now becoming more complicated than it was in the past. We are used to hardware hiding the complexity and providing a uniform safe view."

De Raadt said there would be a "big price to pay for the complexity of handling exposure to the micro-architecture down the road, mark my words".

"Decades old trap/fault software is being replaced by 10-20 operating systems, and there are going to be mistakes made."

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications