Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What mitigations did you disable, specific ones you know wouldn't be a risk to what the machines were doing (mostly network, mostly kernel space)..?

Like, by disabling the mitigations does that leave the servers slightly more open to someone nefarious finding a way to use some kind of timing attack to get some knowledge of your wireguard keys?

(Genuine question as someone with very little knowledge on both wireguard and *bleed CPU flaws)



No, I actually just booted with 'mitigations=off' and called it a day. We will employ Zen4 cores on the pre-prod setup soon enough, and I'll be looking into the benefit (if any) of disabling mitigations in a more fine-grained manner there.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: