Update README.md

Added more info. Update might be finished now.
This commit is contained in:
43313EB9AA87E7039F8F3948282E61C0CB12372C5499884609A01B2BCA37B973 2019-06-13 18:32:33 -04:00 committed by GitHub
parent dba5f2689e
commit ec50b224be
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -6,7 +6,7 @@ Verification of mitigations is currently being developed for operating systems a
* [2. Linux](#linux)
* [3. Mac OS](#macos)
* [4. iOS](#ios)
* [5. Android](#and)
* [5. Android](#android)
## <a name="win"/>1. Windows
Verification of Windows operating system and application mitigations are being developed as custom Nessus audit files. Custom audit files can be leveraged by using a [Policy Compliance](https://docs.tenable.com/nessus/7_0/Content/ScanAndPolicyTemplates.htm) scan in Nessus. DoD components can acquire Nessus via the [ACAS](https://www.disa.mil/cybersecurity/network-defense/acas) program.
@ -16,20 +16,26 @@ See the [Windows page](./windows/README.md) for more information.
### 1.1 PowerShell
Microsoft has introduced a PowerShell module that reports on a system's vulnerability to several variants of Spectre and Meltdown. Color-coded, true or false output is returned. The presence of mitigations in BIOS/UEFI firmware and the Windows OS kernel are indicated. The tool also provides suggested actions if a missing mitigation is detected. Use the following commands from an administrator-elevated PowerShell terminal:
Install-Module SpeculationControl
Import-Module SpeculationControl
Get-SpeculationControlSettings
> Install-Module SpeculationControl
> Import-Module SpeculationControl
> Get-SpeculationControlSettings
For more specifics, see the bottom section of [this Microsoft information post](https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot).
### 1.2 Products
Products from [Eclypsium](https://eclypsium.com/) and [Tenable](https://www.tenable.com/blog/the-first-major-security-logos-of-2018-spectre-and-meltdown-vulnerabilities) are known to report on the status of Spectre and Meltdown vulnerability and mitigations. Other anti-malware, firmware inspection, and intrusion detection products may also offer detection capabilities -- consult with the software vendor to confirm.
### 1.3 Open Source Scripts
* [Alex Ionescu (ionescu007)'s Spectre and Meltdown Checker](https://github.com/ionescu007/SpecuCheck)
## <a name="linux"/>2. Linux
### 2.1 Terminal Commands
#### 2.1.1 Red Hat and Ubuntu
Kernel page tablet isolation is an indicator of Spectre and Meltdown patch application. Use the following command to query the status of isolation on Red Hat Enterprise Linux (RHEL) and Ubuntu devices:
cat /boot/config-3.10.0-957.12.2.el7.x86_64 | grep CONFIG_PAGE_TABLE_ISOLATION
> cat /boot/config-3.10.0-957.12.2.el7.x86_64 | grep CONFIG_PAGE_TABLE_ISOLATION
Y indicates that patching is compiled into the kernel. N indicates that software vulnerability may exist.
@ -39,12 +45,13 @@ Red Hat Enterprise Linux (RHEL) provides a package and script for checking the s
#### 2.1.3 Ubuntu Only
Ubuntu provides a package named "spectre-meltdown-checker" that can be downloaded, installed, and executed on an endpoint. After installing the package, simply execute the following from a terminal:
spectre-meltdown-checker
> spectre-meltdown-checker
### 2.2 Products
Products from [Eclypsium](https://eclypsium.com/) and [Tenable](https://www.tenable.com/blog/the-first-major-security-logos-of-2018-spectre-and-meltdown-vulnerabilities) are known to report on the status of Spectre and Meltdown vulnerability and mitigations. Other anti-malware, firmware inspection, and intrusion detection products may also offer detection capabilities -- consult with the software vendor to confirm.
### 2.3 Open Source Scripts
[Stéphane Lesimple (speed47)'s Spectre and Meltdown Checker](https://github.com/speed47/spectre-meltdown-checker)
* [Stéphane Lesimple (speed47)'s Spectre and Meltdown Checker](https://github.com/speed47/spectre-meltdown-checker)
## <a name="macos"/>3. Mac OS
Check the current version of Mac OS. The version number must be at least [10.13.2](https://support.apple.com/en-us/HT208394).