Remy Dernat
2018-01-03 12:56:50 UTC
Hi,
I renamed that thread because IMHO there is a another issue related to that threat.
Should we upgrade our system and lost a significant amount of XFlops... ?
What should be consider :  - the risk - your user population (size / type / average "knowledge" of hacking techs...) - the isolation level from the outside (internet)
So here is me question : if this is not confidential, what will you do ?
I would not patch our little local cluster, contrary to all of our other servers.
Indeed, there is another "little" risk. If our strategy is to always upgrade/patch, in this particular case you can loose many users that will complain about perfs...
So another question : what is your global strategy about upgrades on your clusters ? Do you upgrade it as often as you can ? One upgrade every X months (due to the downtime issue) ... ?
Thanks,
Best regardsRémy.
-------- Message d'origine --------De : John Hearns via Beowulf <***@beowulf.org> Date : 03/01/2018 09:48 (GMT+01:00) Ã : Beowulf Mailing List <***@beowulf.org> Objet : Re: [Beowulf] Intel CPU design bug & security flaw - kernel fix imposes performance penalty
Thanks Chris. In the past there have been Intel CPU 'bugs' trumpeted, but generally these are fixed with a microcode update. This looks different, as it is a fundamental part of the chips architecture.However the Register article says: "It allows normal user programs â to discern to some extent the layout or contents of protected kernel memory areas"
I guess the phrase "to some extent" is the vital one here. Are there any security exploits which use this information? I guess it is inevitable that one will be engineered now that this is known about. The question I am really asking is should we worry about this for real world systems. And I guess tha answer is that if the kernel developers are worried enough then yes we should be too. Comments please.
system calls, which HPC programs using networking gear like OmniPath
or Infiniband don't do much of.
-- greg
I renamed that thread because IMHO there is a another issue related to that threat.
Should we upgrade our system and lost a significant amount of XFlops... ?
What should be consider :  - the risk - your user population (size / type / average "knowledge" of hacking techs...) - the isolation level from the outside (internet)
So here is me question : if this is not confidential, what will you do ?
I would not patch our little local cluster, contrary to all of our other servers.
Indeed, there is another "little" risk. If our strategy is to always upgrade/patch, in this particular case you can loose many users that will complain about perfs...
So another question : what is your global strategy about upgrades on your clusters ? Do you upgrade it as often as you can ? One upgrade every X months (due to the downtime issue) ... ?
Thanks,
Best regardsRémy.
-------- Message d'origine --------De : John Hearns via Beowulf <***@beowulf.org> Date : 03/01/2018 09:48 (GMT+01:00) Ã : Beowulf Mailing List <***@beowulf.org> Objet : Re: [Beowulf] Intel CPU design bug & security flaw - kernel fix imposes performance penalty
Thanks Chris. In the past there have been Intel CPU 'bugs' trumpeted, but generally these are fixed with a microcode update. This looks different, as it is a fundamental part of the chips architecture.However the Register article says: "It allows normal user programs â to discern to some extent the layout or contents of protected kernel memory areas"
I guess the phrase "to some extent" is the vital one here. Are there any security exploits which use this information? I guess it is inevitable that one will be engineered now that this is known about. The question I am really asking is should we worry about this for real world systems. And I guess tha answer is that if the kernel developers are worried enough then yes we should be too. Comments please.
There appears to be no microcode fix possible and the kernel fix will
incur a significant performance penalty, people are talking about in the
range of 5%-30% depending on the generation of the CPU. :-(
The performance hit (at least for the current patches) is related toincur a significant performance penalty, people are talking about in the
range of 5%-30% depending on the generation of the CPU. :-(
system calls, which HPC programs using networking gear like OmniPath
or Infiniband don't do much of.
-- greg