SMT is definitely evil here. Constant time may work for crypto, but it does not work for computing in general. Sure, crypto keys are high value and deserve extra protection... but that just means SMT will leak everything except your crypto keys.
-
-
Replying to @marcan42
If that is your concern, this is still just a drop in the bucket IMO. There are many, many side channels. But leaking data through side channels from one process to another is far from easy (even on a shared phys core, regardless of channel)... Not much worth it beyond key data.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024 @marcan42
Also, unless you're using VMs, truly malicious code on your physical core is .... a much bigger problem. And if you *are* using VMs, all the major cloud vendors have already isolated your core. All the non cloud VM stacks are on it too. L1TF makes this risk look tiny.
1 reply 0 retweets 1 like -
Replying to @chandlerc1024
Containers come to mind. Also, plenty of on-premise VM stuff isn't doing proper core isolation. And in general any multiuser systems. We rely on untrusted code not escaping OS privilege boundaries all the time.
1 reply 0 retweets 2 likes -
Replying to @marcan42
Yes, but in all of those cases is *this* even close to the most serious risk considering it is limited to info leak, high difficulty, low bandwidth, inability to target arbitrary data, etc....? Outside of very specific areas (crypto, maybe a few others) this shouldn't be a prio.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024
The problem with that mindset is you think you're ~safe until your not and someone comes up with a high impact exploit for your platform. The stars align and you're truly screwed.
2 replies 0 retweets 0 likes -
Replying to @marcan42
You cannot disable all attackable surfaces though just because they may be attacked. You have to make risk- and cost-based prioritizations. That's just reality. Disabling SMT, especially because of *this* vuln, seems like a bad priority. Minimal risk avoided at v. high cost.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024 @marcan42
Anyways, we may just take very different views of either risk or cost here. Not sure this discussion is going to uncover much at this point.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024
You don't disable SMT, you just make sure two threads of one core never run software in different security domains. SMT is evil when sold (and implemented) as comparable to two independent processors. If you see it as a way to accelerate multithreaded apps then it's fine.
1 reply 0 retweets 2 likes -
Replying to @marcan42
Again, *this* vuln is, IMO, a very weak motivation for doing that level of isolation. And there remains a whole lot of the processor shared even after you do it.
1 reply 0 retweets 0 likes
If this vuln is such a weak motivation then why do all the cloud providers, in fact, isolate cores between users where possible? Yes, anything can be a side channel, but HT is almost as bad as it gets. Evil software potentially watching your instruction timings.
-
-
Replying to @marcan42
Cloud vendors do core isolation because of L1TF: https://gweb-cloudblog-publish.appspot.com/products/gcp/protecting-against-the-new-l1tf-speculative-vulnerabilities/amp/ … https://blogs.technet.microsoft.com/virtualization/2018/08/14/hyper-v-hyperclear/ … Couldn't find AWS or other cloud vendor announcements, but it's all the same. L1TF, for cloud vendors, absolutely *was* serious enough.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.