Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Jan 2018 16:27:29 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        Pete French <petefrench@ingresso.co.uk>, freebsd-stable@freebsd.org
Subject:   Re: Ryzen issues on FreeBSD ?
Message-ID:  <a06cca15-c7b0-8f67-0812-19b6487e39b4@sentex.net>
In-Reply-To: <00875e4d-740f-63f1-496c-6cda82b1a403@ingresso.co.uk>
References:  <8e842dec-ade7-37d1-6bd8-856ea1a827ca@sentex.net> <8dcf6cc8fad788ac8168a4a9f392b02e@foolishgames.com> <23c1d162-dcd8-c422-3114-d70b65b6c271@sentex.net> <e2d004c63e414022ce48b5b50959c302@foolishgames.com> <00875e4d-740f-63f1-496c-6cda82b1a403@ingresso.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
On 1/19/2018 4:14 PM, Pete French wrote:
> To be honest this thread has put me off building my machine, the pile of
> boxes with motherboard, case, cpu and ram is still sitting next to me
> desk at work!

It is quite discouraging, isnt it :(  From my POV however, I really want
a "plan b" to Spectre / Meltdown that at least slows down attackers.  On
a few servers, I do have ways to detect after that fact intrusions
(tripwire etc), but I want to mitigate this attack from happening in the
first place as much as possible.  Supposedly Spectre exploits on AMD are
MUCH harder (or so says AMD at least) so I am hoping I can at least have
this as an option.  We even ordered a Tyan Epyc based board to see what
its like too.

	---Mike



-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a06cca15-c7b0-8f67-0812-19b6487e39b4>