code logs -> 2017 -> Tue, 02 May 2017< code.20170501.log - code.20170503.log >
--- Log opened Tue May 02 00:00:50 2017
00:01 Jessikat` [Jessica@Nightstar-bt5k4h.81.in-addr.arpa] has quit [Connection closed]
00:09 Jessikat [Jessikat@Nightstar-st0.tcr.132.82.IP] has joined #code
00:14 RchrdB [RchrdB@Nightstar-qe9.aug.187.81.IP] has quit [Operation timed out]
00:19 RchrdB [RchrdB@Nightstar-qe9.aug.187.81.IP] has joined #code
00:20 RchrdB [RchrdB@Nightstar-qe9.aug.187.81.IP] has quit [Connection closed]
00:21 RchrdB [RchrdB@Nightstar-qe9.aug.187.81.IP] has joined #code
00:22 Derakon_ is now known as Derakon
00:23 mode/#code [+ao Derakon Derakon] by ChanServ
00:46 Jessikat` [Jessikat@Nightstar-sln.jtr.132.82.IP] has joined #code
00:48 Jessikat [Jessikat@Nightstar-st0.tcr.132.82.IP] has quit [Ping timeout: 121 seconds]
01:30 * McMartin checks the stats on his network-facing Intel chip
01:30
<&McMartin>
It appears to not have the dangerous feature in it.
01:30
<&McMartin>
It's also, apparently, classified by Intel as a Mobile Processor!
01:37
<&McMartin>
... and my Windows machine might be so old that the feature didn't exist yet
01:38 * Alek snickers.
01:38
<&ToxicFrog>
What counts as "network facing" here? Is "the ability to send it TCP packets on any port" sufficient?
01:38
<&McMartin>
It's the same generation, but it's from very early in that generation and the feature was introduced partway through.
01:39
<&ToxicFrog>
I can't seem to find technical details on the exploit >.<
01:39
<&McMartin>
This has not been reported in detail, no.
01:39
<&McMartin>
But in this case, "network facing" means "portscanning my IP will hit this computer at least once"
01:40
<&ToxicFrog>
based on amt-howto(7), AMT listens on tcp:16992
01:41
<&ToxicFrog>
With a serial terminal on 16994
01:41
<&McMartin>
Ports I happen to know are closed, anyway, but I'm curious about the local exploit possibility
01:41 * ToxicFrog nods
01:42
<&McMartin>
It seems Xenon's Celeron N2830 isn't vulnerable, and Astatine's a Core i7 with a three-digit product code in the Nehelem era, but I don't recall the exact one offhand - I merely notice that some of the spec sheets don't even include AMT/vPro on their spec sheets because it didn't exist yet
01:42
<&ToxicFrog>
In my case I take the stance that if someone has local access to these machines I've already lost, because there's nothing stopping them from just walking away with them.
01:42
<&McMartin>
Yeah, the remaining two systems are laptops~
01:43
<&ToxicFrog>
(including the server, which is a laptop with two external drive arrays; you can comfortably fit the whole thing in a backpack if you leave the UPS behind)
01:43
<&McMartin>
Osmium (and thus Thoth) are BIOS-based and can be checked there; I'm pretty sure the chips are Sandy Bridge Core i7s and probably have the tech present but disabled in BIOS.
01:44
<&McMartin>
And then there's the MBP, and god only knows what that has enabled
02:36 macdjord|slep [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has joined #code
02:36 mode/#code [+o macdjord|slep] by ChanServ
02:39 mac [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
02:54 Turaiel[Offline] is now known as Turaiel
03:58 Turaiel is now known as Turaiel[Offline]
04:03
<&McMartin>
Osmium/Thoth is an i7-3610QM and thus also doesn't have the feature
04:13
<@Alek>
Pentium E5400 here, how do I check?
04:13
<&McMartin>
Use these search terms: Ark intel Pentium E5400
04:14
<&McMartin>
And look for whether it supports "Intel vPro" technology
04:14
<&McMartin>
If it doesn't then the exploitable system doesn't even exist
04:14
<&McMartin>
If it does then it exists but (if it's consumer-level) is probably disabled by default
04:16
<&McMartin>
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languagei d=en-fr
04:16
<&McMartin>
All four of my systems end with no action required at step 1
05:03 Derakon is now known as Derakon[AFK]
05:35 Jessikat` is now known as Jessikat
05:43 Alek [Alek@Nightstar-7or629.il.comcast.net] has quit [Ping timeout: 121 seconds]
05:47 Alek [Alek@Nightstar-7or629.il.comcast.net] has joined #code
05:47 mode/#code [+o Alek] by ChanServ
--- Log closed Tue May 02 06:18:23 2017
--- Log opened Tue May 02 06:25:39 2017
06:25 TheWatcher [chris@GlobalOperator.Nightstar.Net] has joined #code
06:25 Irssi: #code: Total of 39 nicks [28 ops, 0 halfops, 0 voices, 11 normal]
06:25 mode/#code [+o TheWatcher] by ChanServ
06:26 Irssi: Join to #code was synced in 56 secs
06:28 macdjord|slep [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
06:30 NSGuest41471 [RchrdB@Nightstar-qe9.aug.187.81.IP] has quit [[NS] Quit: Leaving]
06:30 RchrdB [RchrdB@Nightstar-qe9.aug.187.81.IP] has joined #code
06:43 Kindamoody[zZz] is now known as Kindamoody|afk
07:16 Jessikat` [Jessikat@Nightstar-ahi0b1.dab.02.net] has joined #code
07:19 Jessikat [Jessikat@Nightstar-sln.jtr.132.82.IP] has quit [Ping timeout: 121 seconds]
07:23 Jessikat` is now known as Jessikat
07:25 mac [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has quit [[NS] Quit: Subject 10: Developed dental hypertrophy, ocular luminescence, & extreme behavioural changes. Killed & partially consumed 2 graduate students. Euthanized with sustained automatic weapons fire.]
07:29 macdjord [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has joined #code
07:29 mode/#code [+o macdjord] by ChanServ
09:31 celticminstrel is now known as celmin|sleep
11:12 Vornotron [Vorn@ServerAdministrator.Nightstar.Net] has quit [Ping timeout: 121 seconds]
13:46 Jessikat` [Jessikat@Nightstar-9n6id4.dab.02.net] has joined #code
13:50 Jessikat [Jessikat@Nightstar-ahi0b1.dab.02.net] has quit [Ping timeout: 121 seconds]
13:57 Jessikat` is now known as Jessikat
14:06
<&ToxicFrog>
McMartin: if Osmium is the S76gazp7, it's ancilla now; thoth is a Lenovo T550.
14:28 gnolam_ [lenin@Nightstar-09nsce.cust.bahnhof.se] has joined #code
14:31 gnolam [lenin@Nightstar-09nsce.cust.bahnhof.se] has quit [Ping timeout: 121 seconds]
14:51 You're now known as TheWatcher[d00m]
15:19 macdjord [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has quit [Ping timeout: 121 seconds]
15:21 macdjord [macdjord@Nightstar-a1fj2k.mc.videotron.ca] has joined #code
15:21 mode/#code [+o macdjord] by ChanServ
15:40 gnolam_ [lenin@Nightstar-09nsce.cust.bahnhof.se] has quit [Connection reset by peer]
15:42 gnolam [lenin@Nightstar-09nsce.cust.bahnhof.se] has joined #code
15:42 mode/#code [+o gnolam] by ChanServ
15:43 Namegduf [namegduf@Nightstar-lcgn9d.beshir.org] has quit [Ping timeout: 121 seconds]
15:45 sshine [simon@Nightstar-c7dik3.monoid.co] has quit [Ping timeout: 121 seconds]
15:46 sshine [simon@Nightstar-c7dik3.monoid.co] has joined #code
15:48 Kindamoody|afk [Kindamoody@Nightstar-0lgkcs.tbcn.telia.com] has quit [Ping timeout: 121 seconds]
15:57 Kindamoody|afk [Kindamoody@Nightstar-0lgkcs.tbcn.telia.com] has joined #code
15:57 mode/#code [+o Kindamoody|afk] by ChanServ
16:22
<@gnolam>
Argh.
16:22
<@gnolam>
I have "Still Alive" stuck in my head now.
16:23 * gnolam is literally doing Aperture Science right now.
16:24
<@ErikMesoy>
Is it the study of fjords, bays and other beach apertures?
16:25 You're now known as TheWatcher
16:27
<@gnolam>
... no
16:27
<@gnolam>
Handling different aperture sizes in spectrophotometry.
16:33
<@ErikMesoy>
So not littoral aperture science.
16:34 * gnolam smacks ErikMesoy with a farmed salmon.
16:34
<@ErikMesoy>
Eep.
16:35
<&[R]>
Nooo!
16:35
<&[R]>
You'll infect him with GMOs!
17:18 Namegduf [namegduf@Nightstar-lcgn9d.beshir.org] has joined #code
17:18 mode/#code [+o Namegduf] by ChanServ
18:57
<@Alek>
well. the ark intel page for my processor doesn't even mention vpro so I assume that means it's safe.
18:58 celmin|sleep is now known as celticminstrel
19:03 Vornotron [Vorn@ServerAdministrator.Nightstar.Net] has joined #code
19:09 Jessikat [Jessikat@Nightstar-9n6id4.dab.02.net] has quit [[NS] Quit: Bye]
22:20 macdjord is now known as macdjord|slep
23:20 Kindamoody|afk is now known as Kindamoody
23:36 Jessikat [Jessica@Nightstar-bt5k4h.81.in-addr.arpa] has joined #code
23:59 Kindamoody is now known as Kindamoody[zZz]
--- Log closed Wed May 03 00:00:52 2017
code logs -> 2017 -> Tue, 02 May 2017< code.20170501.log - code.20170503.log >

[ Latest log file ]