Do you disable the Spectre/Meltdown Security Mitigations?

Discussion in 'polls' started by Spartan, Apr 9, 2022.

?

Do you disable the Spectre/Meltdown Security Mitigations?

  1. I keep them enabled, I am very concerned about security

    76.2%
  2. I disable them, I want the max performance

    23.8%
  1. Spartan

    Spartan Registered Member

    Joined:
    Jun 21, 2016
    Posts:
    1,424
    Location:
    Dubai
    As the title says, do you keep the default setting in Windows or disable the mitigations for more performance?
     
  2. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    On my main windows PC, CPU mitigations are enabled.
    On my old and slow linux laptop (openSUSE) those mitigations are disabled. I also tested with mitigations on (linux), but did not see any noticeable performance impact. Maybe if you use something like Blender or games in linux you might see some boost in performance. Like faster rendering time in Blender etc.
    But in production environments you should enable them i think.
     
  3. Trooper

    Trooper Registered Member

    Joined:
    Jan 26, 2005
    Posts:
    5,508
    They are enabled for me.
     
  4. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,241
    Location:
    Among the gum trees
    Me too.
     
  5. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
  6. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,441
    Location:
    Slovakia
    Disabled, though not sure if it matters, since it is enabled by BIOS anyway. I have never found an example, how this vulnerability is supposed to work IRL, but I assume, you still have to get infected first for it to be exploited?
     
  7. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,557
    Location:
    USA still the best. But barely.
    I want to know these things too.
     
  8. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    There were examples (PoC) in Javascript. You visit malicious website and credentials from browser's built-in password manager may be stolen. There is tuning needed for particular hardware and software configuration, so it is not a easy way to use it.
     
  9. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,441
    Location:
    Slovakia
    https://www.kaspersky.com/blog/spectre-meltdown-in-practice/43525/
     
  10. Spartan

    Spartan Registered Member

    Joined:
    Jun 21, 2016
    Posts:
    1,424
    Location:
    Dubai
    Which is why I have it disabled. It needs a very specific scenario that some site/hacker on this planet to wait for you knowing that you have this vulnerability to attack you. I just rely on my antivirus / windows updates / adblocker and I want nothing touching the performance of my laptop.
     
  11. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    Hi,
    could you insert an image of InSpectre.exe?
    TH.
     
  12. Spartan

    Spartan Registered Member

    Joined:
    Jun 21, 2016
    Posts:
    1,424
    Location:
    Dubai
    image? sure

    2022-04-10_185111.png

    Basically, you disable the protection, then reboot, then run it again, and you will see the same image as above.
     
  13. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
  14. Spartan

    Spartan Registered Member

    Joined:
    Jun 21, 2016
    Posts:
    1,424
    Location:
    Dubai
    What is your CPU? The performance cannot be good if it was an Intel CPU and the Meltdown/Spectre patches are on unless you have an AMD CPU.
     
  15. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    :thumb:
    Correct, the CPU is AMD.
     
  16. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    How can you control performance in a Linux OS?
     
  17. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    mitigations= kernel command-line switch
     
  18. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    890
    Location:
    The Netherlands
    In Debian-based distros, edit ”/etc/default/grub”, find the line with:
    GRUB_CMDLINE_LINUX=""


    Change that to:


    GRUB_CMDLINE_LINUX="mitigations=off"

    If you change this file, run 'sudo update-grub' afterwards to update.

    That's what I did (I have an old Haswell processor...).

    Chances that someone hacks my system this way are practically zero.
    Besides, browsers have protection against this as well.

    https://winaero.com/secure-chrome-meltdown-spectre-vulnerabilities/
    https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
    https://blog.mozilla.org/security/2021/05/18/introducing-site-isolation-in-firefox/
     
    Last edited: Apr 10, 2022
  19. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    Thanks guys :thumb:, what you have written I can do.
    Me, I asked how is possible to measure in the easiest way possible (but not empirically) the difference in performance before/after.
    Like you can do with InSpectre.exe in Windows.
     
  20. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    890
    Location:
    The Netherlands
    Hmm...
    Not that I know of. :(

    Here is a checker tool, but I have no idea how good it is:
    https://github.com/speed47/spectre-meltdown-checker

    Here is a test by Phoronix from January 2018, but it was with older kernels, so things might have improved now:
    https://www.phoronix.com/scan.php?page=article&item=linux-317-415&num=1
     
  21. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    I have all mitigations enabled.

    I used Spectre-meldown-checker. It is a comprehensive tool that checks for a lot of side channel vulnerabilities, unlike InSpectre which checks only Meltdown and Spectre(though Spectre-meltdown-checker hasn't been updated for some time for the latest side channel vulnerabilities). It doesn't check performance though. But neither does InSpectre afaik. InSpectre only checks which CPU you have and if they are known to have a bigger performance hit. Afaik for Intel CPU's below 6th/7th gen(or somewhere around that, don't know for sure) the performance hit was bigger than for newer generations. That is what InSpectre displays. It doesn't do a performance test.
    I also think this was based on the initial Spectre mitigation called IBRS, which was the most performance heavy mitigation. For both Windows and Linux this has been replaced with less performance heavy Retpolines, so I'm not sure which gen CPU you have still makes a difference on how much the performance impact is. (Apart from the most recent gens which some of them are already fixed in hardware.)

    Also note that while the side channel vulnerabilities may be hard and take a long time to exploit, there have been a whole lot of newer variants that are relatively easier to exploit or make the original ones easier to exploit. And since the abuse of these hardware vulnerabilities can't be detected after the fact, it is hard to get a reliable view of how much this is being used in real attacks.

    The BIOS/microcode makes the mitigations available to the OS. If the OS doesn't enable them then it is not enabled.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.