<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=6499&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / The importance of Microcode]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=6499</link>
		<description><![CDATA[The most recent posts in The importance of Microcode.]]></description>
		<lastBuildDate>Sun, 17 Mar 2024 19:12:27 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=49019#p49019</link>
			<description><![CDATA[<p>On my computers, I forget what it is that does not work with microcode installed, alsa line-out|hdmi I think.<br />Shady.</p>]]></description>
			<author><![CDATA[dummy@example.com (bilhook)]]></author>
			<pubDate>Sun, 17 Mar 2024 19:12:27 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=49019#p49019</guid>
		</item>
		<item>
			<title><![CDATA[Re: The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=49001#p49001</link>
			<description><![CDATA[<p>of course. I have been using an old x200 thinkpad with 0 microcode just fine there is that whole memory sinkhole thing because the APIC register can move I believe you can partially disable it though? My laptop ever a dell e6410 I installed the oldest bios available and it doesn&#039;t include microcode either.&#160; I just advise what I read skylake and onwards SGX is present and continues to be a thing on todays Xeon processors. So microcode helps mitigate issues.<br />Most people recommend it, as CPUs come with baked in microcode anyway. My concern is when loading microcode can flip some CPU registers.</p>]]></description>
			<author><![CDATA[dummy@example.com (czeekaj)]]></author>
			<pubDate>Sat, 16 Mar 2024 16:24:33 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=49001#p49001</guid>
		</item>
		<item>
			<title><![CDATA[Re: The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=49000#p49000</link>
			<description><![CDATA[<p>I don&#039;t know about others, but my old machine works fine even without the microcode...</p>]]></description>
			<author><![CDATA[dummy@example.com (stopAI)]]></author>
			<pubDate>Sat, 16 Mar 2024 15:27:41 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=49000#p49000</guid>
		</item>
		<item>
			<title><![CDATA[Re: The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=48999#p48999</link>
			<description><![CDATA[<p>yeah on a Q9550 I could see you just leave the old microcode packages. It&#039;s not something you update often! But I was deliberately removing it, depends on the hardware honestly. some UEFI systems have quite a few features that may expose the user to more attack vectors than other systems. It all depends I am sure. <img src="http://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /> I&#039;m sure there are realtek micro controllers that play much nicer than others for instance.</p>]]></description>
			<author><![CDATA[dummy@example.com (czeekaj)]]></author>
			<pubDate>Sat, 16 Mar 2024 15:25:38 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=48999#p48999</guid>
		</item>
		<item>
			<title><![CDATA[Re: The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=48979#p48979</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>czeekaj wrote:</cite><blockquote><div><p>... will be utilizing microcode updates to protect myself ...</p></div></blockquote></div><p>As far as I know, it is enough to keep your system up to date.</p><p>In the last nine years, have seen intel-microcode packages updated once every blue moon, probably because my box runs on a <em>legacy</em> (EOL 03/2013) Intel Yorkfield (Core™2 Quad Q9550) processor.</p><p>The <span class="bbc">intel-microcode</span> package is/has been there as part of the installation/upgrades from the start:</p><div class="codebox"><pre><code>~$ apt list | grep installed | grep -i microcode
--- snip ---
intel-microcode/oldoldstable-security,now 3.20231114.1~deb10u1 amd64 [installed]
~$ </code></pre></div><p>And then there is what you can see <a href="https://pkginfo.devuan.org/cgi-bin/policy-query.html?c=package&amp;q=*microcode*&amp;x=submit" rel="nofollow">here</a>.<br />Microcode for <span class="bbc">Intel</span> and <span class="bbc">amd64</span> CPUs all the way from up <span class="bbc">Jesse</span> down to <span class="bbc">Ceres</span>.</p><p>So any time a microcode package gets upgraded, it is made available for you in the Devuan repositories. </p><p>You would have to take intentional steps to keep your system <span class="bbc">apt</span> from actually downloading and installing it. </p><p>I may be missing something in your particular case, but in my opinion, keeping your system up-to-date is not an option to <span class="bbu">consider</span>.<br />It is something you <span class="bbu">do</span>.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Fri, 15 Mar 2024 18:39:31 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=48979#p48979</guid>
		</item>
		<item>
			<title><![CDATA[The importance of Microcode]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=48962#p48962</link>
			<description><![CDATA[<p>Hi guys, </p><p>I used to never really use microcode updates. However, recently I was exposed to some kind of low level rootkit like malware on my UEFI bios or within the Intel NIC PXE like system.</p><p>see:<br /><a href="https://platypusattack.com/" rel="nofollow">https://platypusattack.com/</a></p><p>An attacker can use intel rapl to potentially find encryption keys and other secrets. I noticed this when intel_rapl kernel module was not able to be disabled and other conditions where they were trying to maintain persistance. It could effect every linux OS on intel platform post Sandybridge with SGX enclaves built in. </p><p>So from now on, I will be utilizing microcode updates to protect myself going forward from these kinds of attacks where SGX instructions are present.&#160; I thought I should share with others so they can evaluate their choice in keeping their microcode up to date depending on their hardware and the presence of intel SGX enclaves instructions.</p>]]></description>
			<author><![CDATA[dummy@example.com (czeekaj)]]></author>
			<pubDate>Fri, 15 Mar 2024 16:49:18 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=48962#p48962</guid>
		</item>
	</channel>
</rss>
