Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Hardware best for post Meltdown

    Official Netgate® Hardware
    2
    3
    1.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      FranciscoFranco
      last edited by

      I see two boxes that all of a sudden I am interested in.
      SG1000
      SG3100
      These are both Arm and it seems they have no Predictive Logic in the CPU and should be OK
      Is that a fair reading?

      Looking at Intels Micro Code Updates(MCU) they are not going back very far generationally and much hardware is SOL. They released an MCU batch in November so maybe there is going to be more coming. I doubt it.  I see someone asking about MCU for the C2xxx series and this is something I doubt will get updated.

      1 Reply Last reply Reply Quote 0
      • S
        silentcreek
        last edited by

        If you are solely referring to Meltdown, then your reading is correct. But that would be shortsighted because there is also Spectre.

        The SG1000 uses a Cortex-A8 SoC and the SG3100 is based on a Cortex-A9 SoC. Both are affected by the Spectre attack variants 1 and 2, according to ARM. They aren't vulnerable to Meltdown. But then again, there will be a fix for Meltdown coming to FreeBSD soon and pfSense will get updated when that's available (and tested), according to Netgate.

        Nevertheless, on a router, I don't think you need to worry about Meltdown or Spectre. The attacks require malicious and specially crafted code to be executed. That is scary when you look at browsers through which any website can execute JavaScript code on your computer (unless you block JavaScript) or a multi-user environment where you can't be certain that another user on the system executes malicious code. But on a router you usually don't do that. Possbible attack vectors are quite limited there: Unless the web interface would be prone to cross-site scripting attacks or you giving SSH access to untrusted users, there should be no third-party code executed.

        1 Reply Last reply Reply Quote 0
        • F
          FranciscoFranco
          last edited by

          Thanks for your input. What I worry about is that the POC was done with JavaScript but that does not mean other vectors are not available.

          I do get your point about executables not running on a firewall. Attack vectors are limited. Agreed.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.