Jump to content

[Update] Security flaws discovered in AMD zen processors : AMD's meltdown?

Message added by WkdPaul

Please keep the conversation civil and respectful, as per the Community Standards;

Quote
  • Ensure a friendly atmosphere to our visitors and forum members.
  • Encourage the freedom of expression and exchange of information in a mature and responsible manner.
  • "Don't be a dick" - Wil Wheaton.
  • "Be excellent to each other" - Bill and Ted.
  • Remember your audience; both present and future.

 

3 minutes ago, M.Yurizaki said:

It's important to note that Spectre is a hardware flaw around what appears to be how speculative execution is done. While it's poor form to shirk the impact to others, Intel's right in that anyone else's speculative execution engines could be at fault. And it calls into question if speculative execution itself is a fundamental issue or if it's just how it's implemented.

AMD is only vulnerable to 1 of the 3 vulnerabilities, Intel was implying that everyone was vulnerable to all 3 vulnerabilities just like them. AMD had to clarify that this was not the case.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, sazrocks said:

AMD is only vulnerable to 1 of the 3 vulnerabilities, Intel was implying that everyone was vulnerable to all 3 vulnerabilities just like them. AMD had to clarify that this was not the case.

AMD was/is vulnerable to 2 out of 3. They are vulnerable to both Spectre variants.

No, Intel was not implying AMD was vulnerable to all 3.

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, sazrocks said:

AMD is only vulnerable to 1 of the 3 vulnerabilities, Intel was implying that everyone was vulnerable to all 3 vulnerabilities just like them. AMD had to clarify that this was not the case.

And as much as I'd like to take AMD's word for it and that the researchers have found the exact steps they used to reproduce it Intel's side doesn't work on AMD, I'm still skeptical. I don't think there's enough of resources poking at AMD's hardware.

Link to comment
Share on other sites

Link to post
Share on other sites

15 minutes ago, Some Random Member said:

It still is a third or fourth repost of the same topic with no quotes.

It is a repost, but I wasn't aware at the time of posting this. It's not fake news, but it is a HUGE smear campaign. but I'll be happy to remove it nonetheless.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Digital_Zero said:

It is a repost, but I wasn't aware at the time of posting this. It's not fake news, but it is a HUGE smear campaign. but I'll be happy to remove it nonetheless.

it is a smear campaign, but some news anchors picked up on it thinking it was legitemate news, making it fake news.

Link to comment
Share on other sites

Link to post
Share on other sites

So basically, who cares? 

Laptop: 2019 16" MacBook Pro i7, 512GB, 5300M 4GB, 16GB DDR4 | Phone: iPhone 13 Pro Max 128GB | Wearables: Apple Watch SE | Car: 2007 Ford Taurus SE | CPU: R7 5700X | Mobo: ASRock B450M Pro4 | RAM: 32GB 3200 | GPU: ASRock RX 5700 8GB | Case: Apple PowerMac G5 | OS: Win 11 | Storage: 1TB Crucial P3 NVME SSD, 1TB PNY CS900, & 4TB WD Blue HDD | PSU: Be Quiet! Pure Power 11 600W | Display: LG 27GL83A-B 1440p @ 144Hz, Dell S2719DGF 1440p @144Hz | Cooling: Wraith Prism | Keyboard: G610 Orion Cherry MX Brown | Mouse: G305 | Audio: Audio Technica ATH-M50X & Blue Snowball | Server: 2018 Core i3 Mac mini, 128GB SSD, Intel UHD 630, 16GB DDR4 | Storage: OWC Mercury Elite Pro Quad (6TB WD Blue HDD, 12TB Seagate Barracuda, 1TB Crucial SSD, 2TB Seagate Barracuda HDD)
Link to comment
Share on other sites

Link to post
Share on other sites

Feel like those lawsuits that happened to intel if done here would put AMD back in the grave pretty much

Ex frequent user here, still check in here occasionally. I stopped being a weeb in 2018 lol

 

For a reply please quote or  @Eduard the weeb me :D

 

Xayah Main in Lol, trying to learn Drums and guitar. Know how to film do photography, can do basic video editing

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Space Reptile said:

Turns out its a pile of horseshit , theres a megathread on r/AMD with some interesting revelations in the comments 

What do you mean by "it's a pile of horseshit"?

Other security firms has confirmed that the findings are true.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Some Random Member said:

it is a smear campaign, but some news anchors picked up on it thinking it was legitemate news, making it fake news.

The vulnerabilities exist, though are not nearly as big of a deal as they have made them out to be, it's not fake news, it's poorly reported news. But I hope Intel gets a smooth kick in the ass for their part in this "vulnerability assessment". It's bullshit.

Link to comment
Share on other sites

Link to post
Share on other sites

48 minutes ago, LAwLz said:

No, Intel was not implying AMD was vulnerable to all 3.

Quote

Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

Quote

Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively.

https://newsroom.intel.com/news/intel-responds-to-security-research-findings/

That post was made to address the three variants. Therefore, "these exploits" most likely refers to all three exploits. It is unlikely that "these exploits" magically changed meaning between those two sentences. Thus, Intel was implying that other vendors (AMD, ARM) were susceptible to all three exploits. 

48 minutes ago, LAwLz said:

AMD was/is vulnerable to 2 out of 3. They are vulnerable to both Spectre variants.

There is some confusion here, and I should have addressed that. 

AMD is vulnerable to Variant 1

 

AMD is vulnerable to variant 2 if your definition of vulnerable is "theoretically possible to exploit", however so far (AFAIK) it has been impossible to actually exploit this variant on an AMD processor due to the nature of the architecture. On the other hand, IIRC Intel has proof of concept exploits for this variant in the wild right now.

 

AMD is not vulnerable to variant 3 (Meltdown).

 

https://www.amd.com/en/corporate/speculative-execution

(IIRC the whitepapers also stated something similar to the above, but I don't have the time to go searching though them right now)

 

Given that the researchers had many months to find a way to actually exploit variant 2 on AMD processors and were unsuccessful, I personally do not believe it to be a threat, though I will still happily install patches for variant 2 if they cause no performance penalty.

46 minutes ago, M.Yurizaki said:

And as much as I'd like to take AMD's word for it and that the researchers have found the exact steps they used to reproduce it Intel's side doesn't work on AMD, I'm still skeptical. 

If you're still skeptical even after a team at google of all places took many months documenting every detail of the exploit, I don't know what will convince you.

46 minutes ago, M.Yurizaki said:

I don't think there's enough of resources poking at AMD's hardware.

This may be a valid point. Do you have any evidence? I've been curious about this myself.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Blademaster91 said:

The organization stating they have an economic interest seems pretty shady,and only 24 hours to fix it although they aren't required to give a nice time window it still makes them look bad. No source code or Linux testing also seems suspicious,IMO.

while its not required to give the companies time to fix the bugs, it is kind of an industry standard and best practice, if the "researcher" doesnt have malicious intend. 

there are a ton of companies with a bad history of dealing with those bugs and the people who reported them.

8 minutes ago, LAwLz said:

What do you mean by "it's a pile of horseshit"?

Other security firms has confirmed that the findings are true.

whos that? 

it does look like a troll and scam to me tho, look at the FAQ of the site and how badly those videos were made.

 

https://twitter.com/GossiTheDog/status/973592498470866948

Link to comment
Share on other sites

Link to post
Share on other sites

18 minutes ago, LAwLz said:

What do you mean by "it's a pile of horseshit"?

Other security firms has confirmed that the findings are true.

Out of curiosity. Please name said companies. To allow for further eyesight into this

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, snortingfrogs said:

The researchers gave AMD less than 24 hours to look at the vulnerabilities and respond before publishing this report.

Err what, that seems insane but w/e.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, sazrocks said:

If you're still skeptical even after a team at google of all places took many months documenting every detail of the exploit, I don't know what will convince you.

I'm skeptical because they can only work with black boxes. You can only poke at a black box so many times before you come up dry with ideas on how to poke it. It's the same reason why people believe Linux is more secure than Windows by default. Anyone can poke at Linux code and find out what's going on. Only a handful of privileged people can look at Windows code.

Quote

This may be a valid point. Do you have any evidence? I've been curious about this myself.

There's no direct evidence I can show, but I can infer this from:

  • AMD has a smaller market share, and so it's not as interesting to look at.
  • Security researchers tend to poke at Intel systems and have glancing looks at AMD ones
  • The list of CVE vulnerabilities for AMD is much smaller compared to Intel. While a naive conclusion is "AMD is more secure!", it doesn't prove anything other than AMD has fewer publicly disclosed vulnerabilities.
Link to comment
Share on other sites

Link to post
Share on other sites

Seems odd to get close to no heads up. Let's hope AMD stays on top. Also, so many of you are making far too much of this it seems, gotta ease up on the conspiracies my dudes. 

-------

Current Rig

-------

Link to comment
Share on other sites

Link to post
Share on other sites

21 minutes ago, Digital_Zero said:

The vulnerabilities exist, though are not nearly as big of a deal as they have made them out to be, it's not fake news, it's poorly reported news. But I hope Intel gets a smooth kick in the ass for their part in this "vulnerability assessment". It's bullshit.

The company that wrote the whitepaper doesnt exist. All they have written is false. Thus=fake

 

Also the firm behind it was a stock manipulation firm, they hoped the stock would crash. Seems like intel didnt have too much to do with this.(as far as we know, maybe someone in intel wanted amd stock, we dont know)

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Some Random Member said:

The company that wrote the whitepaper doesnt exist. All they have written is false. Thus=fake

 

Also the firm behind it was a stock manipulation firm, they hoped the stock would crash. Seems like intel didnt have too much to do with this.(as far as we know, maybe someone in intel wanted amd stock, we dont know)

Thanks for this information. I just found that out myself. Also there is no proof of concept on any of these vulnerabilities. I work in the industry myself, so I'm sad to say I hopped on the believe the media train as I had seen the information from normally reputable sources. It'll be interesting to see what comes of this.

 

I have a ryzen 1800x myself and I love it, I hope Red Team keeps kicking ass and the 2k line puts them out infront in the CPU market.

Link to comment
Share on other sites

Link to post
Share on other sites

tfw you get sad that you couldn't get in on it while the stocks were down.

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, LAwLz said:

Remember, with Meltdown and Spectre there was A TON of misinformation being spread around based on assumptions or incomplete facts. I suspect the same thing will happen here. Don't believe everything you read on the Internet.

A lot of people were more pissed off that the companies involved knew about it for 6+ months and the net result was barely anything was done about it. While it was actually very complex and they weren't doing nothing that time frame is what got a lot so annoyed, not the existence of the flaws themselves.

 

Yes there was also a lot of hype over how bad it actually was too.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, leadeater said:

A lot of people were more pissed off that the companies involved knew about it for 6+ months and the net result was barely anything was done about it. While it was actually very complex and they weren't doing nothing that time frame is what got a lot so annoyed, not the existence of the flaws themselves.

There was the bit about how fixes could decrease performance by up to 40%. Too many people glazed over the "up to"

 

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, M.Yurizaki said:

I'm skeptical because they can only work with black boxes. You can only poke at a black box so many times before you come up dry with ideas on how to poke it. It's the same reason why people believe Linux is more secure than Windows by default. Anyone can poke at Linux code and find out what's going on. Only a handful of privileged people can look at Windows code.

Valid point.

17 minutes ago, M.Yurizaki said:

There's no direct evidence I can show, but I can infer this from:

  • AMD has a smaller market share, and so it's not as interesting to look at.
  • Security researchers tend to poke at Intel systems and have glancing looks at AMD ones
  • The list of CVE vulnerabilities for AMD is much smaller compared to Intel. While a naive conclusion is "AMD is more secure!", it doesn't prove anything other than AMD has fewer publicly disclosed vulnerabilities.

Also valid point.

 

Personally, though I prefer more concrete evidence.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, M.Yurizaki said:

There was the bit about how fixes could decrease performance by up to 40%. Too many people glazed over the "up to"

Yea good point, also all those test that were that high were all specific server tests and were even limited cases for that market segment.

Link to comment
Share on other sites

Link to post
Share on other sites

Some facts and thoughts from me:

 

 

The pro-AMD things first, so that people won't get mad at me and stop reading instantly:

 

The white paper is not that well written. I mean, it contains a lot of information which is correct, but it also contains things like on page 2 where it it tries linking Asus' issues with their routers to ASMedia having backdoors. I mean, there is a logical trail to be made between AMD having backdoors in their chipsets because Asus got in trouble with the FTC... But it's a very big stretch. Here their logic by the way:

ASMedia made the chipset for AMD -> ASMedia is owned by Asus -> FTC punished Asus for having poor router security -> therefore AMD chipsets has poor security.

When you read their document it kind of makes sense, but when you strip out all the fluff and link their logic up on a straight line like this, it sounds very silly.

 

There are a lot of mentions of "backdoors" in the paper, even though it also says they are "basic security design errors". Sorry, but a design error is not a backdoor.

Errors are by definitions mistakes.

Backdoors are by deliberate, at least that's how I use the term and that seems to be the agreed upon definition.

So you can't have it both ways. Are they mistakes or deliberate?

 

These are all attacks which relies on the system already being compromised in some way. For example needing admin privilege. Chances are if you are in that situation you're already pretty screwed, but these exploits makes things even worse.

 

The people behind this are unethical and scummy. Chances are they are deliberately trying to lower AMD's stock value. Not sure why though.

 

The statement that these issues are "practically un-patchable" seems to be grabbed out of thin air to me.

 

 

 

And now the "anti-AMD" part:

 

Other security firms, more specifically Trail of Bits, has confirmed that these vulnerabilities do exist, and there is working code to exploit them. In fact he even went as far as to say "we found their documentation far above average for typical security companies, the exploit code all worked exactly as described, and worked on the first try".

Jake Williams (from Rendition Infosec) has also said that "I'm confident this is real".

 

I think it is laughable that some of you are trying to discredit these findings for reasons such as "they have disabled comments on Youtube". Seriously, are you guys for real? Who the fuck cares when the website was registered, or when the Youtube channel was made? None of that matters. What matters is the information they are providing.

It's like listening to 12 year olds trying to play detectives to throw dirt at someone who took their lunch money. Nobody should give two shits if they use stock images in their video or not because that is irrelevant to whether or not their findings are legitimate.

 

They aren't as irresponsible as you might think. They provided AMD and other firms with the PoC without making it public. That reduces the risk of potential attacks by quite a lot.

 

These exploits do not need physical access. Not even the BIOS flashing ones does (which are 3 of the exploits, the other 10 does not need BIOS modifications).

"Local-machine elevated administration privilege" does not mean local as in physical access. It means local as in, on the computer.
 

Some of these issues are related to ASMedia chips, which have been known to be vulnerable before, although right now it's difficult to find articles about it because everything just brings up these AMD news.

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, Digital_Zero said:

Thanks for this information. I just found that out myself. Also there is no proof of concept on any of these vulnerabilities. I work in the industry myself, so I'm sad to say I hopped on the believe the media train as I had seen the information from normally reputable sources. It'll be interesting to see what comes of this.

 

I have a ryzen 1800x myself and I love it, I hope Red Team keeps kicking ass and the 2k line puts them out infront in the CPU market.

Every year a fake news story massively spreads, because journalist nowadays just copy one and another, so if one news anchor gets payed to put out a bs story like that, all the others copy it for free. A similar thing happened with "CNN transmitting hardcore p0rn for 30 minutes straight" Spoiler:that also never happened.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, leadeater said:

Yea good point, also all those test that were that high were all specific server tests and were even limited cases for that market segment.

On the other hand though, datacenter applications were affected by multiple percent, which is huge for that market.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×