Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

Never make any mistaeks. -- Anonymous, in a mail discussion about to a kernel bug report


devel / comp.arch / iLeakage - Spectre-type attacks are alive and well...

SubjectAuthor
* iLeakage - Spectre-type attacks are alive and well...Thomas Koenig
`* Re: iLeakage - Spectre-type attacks are alive and well...MitchAlsup
 `* Re: iLeakage - Spectre-type attacks are alive and well...Anton Ertl
  `- Re: iLeakage - Spectre-type attacks are alive and well...MitchAlsup

1
iLeakage - Spectre-type attacks are alive and well...

<ui7mbn$2oia7$1@newsreader4.netcologne.de>

  copy mid

https://news.novabbs.org/devel/article-flat.php?id=34846&group=comp.arch#34846

  copy link   Newsgroups: comp.arch
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!newsreader4.netcologne.de!news.netcologne.de!.POSTED.2001-4dd4-e920-0-a1b2-d557-4ba8-9f7b.ipv6dyn.netcologne.de!not-for-mail
From: tkoenig@netcologne.de (Thomas Koenig)
Newsgroups: comp.arch
Subject: iLeakage - Spectre-type attacks are alive and well...
Date: Sun, 5 Nov 2023 09:13:27 -0000 (UTC)
Organization: news.netcologne.de
Distribution: world
Message-ID: <ui7mbn$2oia7$1@newsreader4.netcologne.de>
Injection-Date: Sun, 5 Nov 2023 09:13:27 -0000 (UTC)
Injection-Info: newsreader4.netcologne.de; posting-host="2001-4dd4-e920-0-a1b2-d557-4ba8-9f7b.ipv6dyn.netcologne.de:2001:4dd4:e920:0:a1b2:d557:4ba8:9f7b";
logging-data="2902343"; mail-complaints-to="abuse@netcologne.de"
User-Agent: slrn/1.0.3 (Linux)
 by: Thomas Koenig - Sun, 5 Nov 2023 09:13 UTC

.... also on Apple Silicon. Just saw this on comp.risks...

https://ileakage.com/

"We present iLeakage, a transient execution side channel targeting
the Safari web browser present on Macs, iPads and iPhones. iLeakage
shows that the Spectre attack is still relevant and exploitable,
even after nearly 6 years of effort to mitigate it since its
discovery. We show how an attacker can induce Safari to render an
arbitrary webpage, subsequently recovering sensitive information
present within it using speculative execution. In particular,
we demonstrate how Safari allows a malicious webpage to recover
secrets from popular high-value targets, such as Gmail inbox
content. Finally, we demonstrate the recovery of passwords, in
case these are autofilled by credential managers."

They also link to a paper describing their exploit.

Re: iLeakage - Spectre-type attacks are alive and well...

<58dcb399bfed53f2dfecca60030ad026@news.novabbs.com>

  copy mid

https://news.novabbs.org/devel/article-flat.php?id=34871&group=comp.arch#34871

  copy link   Newsgroups: comp.arch
Path: i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup)
Newsgroups: comp.arch
Subject: Re: iLeakage - Spectre-type attacks are alive and well...
Date: Fri, 10 Nov 2023 01:51:42 +0000
Organization: novaBBS
Message-ID: <58dcb399bfed53f2dfecca60030ad026@news.novabbs.com>
References: <ui7mbn$2oia7$1@newsreader4.netcologne.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
logging-data="406263"; mail-complaints-to="usenet@i2pn2.org";
posting-account="t+lO0yBNO1zGxasPvGSZV1BRu71QKx+JE37DnW+83jQ";
User-Agent: Rocksolid Light
X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on novalink.us
X-Rslight-Posting-User: 7e9c45bcd6d4757c5904fbe9a694742e6f8aa949
X-Spam-Level: *
X-Rslight-Site: $2y$10$CZ4iVxUQYFb4B4vgUwkfZeQU/yUvJVuQ5J.cCV.U83Z66vXiiy87i
 by: MitchAlsup - Fri, 10 Nov 2023 01:51 UTC

What this illustrates is that the fundamental flaw µArchitects are
not allowed to make is that of "flying blind"--that is make a prediction
and believe that prediction until made aware of its incorrectness. Spectré
illustrated that any "flying blind" opens up a covert channel and if one
can touch some µArchitectural state while "flying blind" you can exploit
this to extract data you should have been prevented from seeing.

Apple wanted performance, high performance requires lots of predictors,
predictors mean you are effectively flying blind--and the circle of
bad µArchitecture continues.

Neither the 1-wide not the 6-wide My 66000 µArchitectures are sensitive
to these kinds of attacks, and I don't think I have lost a single Iota
of performance getting there. ...

Re: iLeakage - Spectre-type attacks are alive and well...

<2023Nov12.152522@mips.complang.tuwien.ac.at>

  copy mid

https://news.novabbs.org/devel/article-flat.php?id=34922&group=comp.arch#34922

  copy link   Newsgroups: comp.arch
Path: i2pn2.org!i2pn.org!news.samoylyk.net!news.szaf.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: anton@mips.complang.tuwien.ac.at (Anton Ertl)
Newsgroups: comp.arch
Subject: Re: iLeakage - Spectre-type attacks are alive and well...
Date: Sun, 12 Nov 2023 14:25:22 GMT
Organization: Institut fuer Computersprachen, Technische Universitaet Wien
Lines: 42
Message-ID: <2023Nov12.152522@mips.complang.tuwien.ac.at>
References: <ui7mbn$2oia7$1@newsreader4.netcologne.de> <58dcb399bfed53f2dfecca60030ad026@news.novabbs.com>
Injection-Info: dont-email.me; posting-host="1c67750aa3c13e65e256ac016f5d9798";
logging-data="148335"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18RofuC5qk+9dfFXg3HWpBX"
Cancel-Lock: sha1:LXbUa7bA2HoTlUZjsTb+jB77EWI=
X-newsreader: xrn 10.11
 by: Anton Ertl - Sun, 12 Nov 2023 14:25 UTC

mitchalsup@aol.com (MitchAlsup) writes:
>What this illustrates is that the fundamental flaw �Architects are
>not allowed to make is that of "flying blind"--that is make a prediction
>and believe that prediction until made aware of its incorrectness. Spectr�
>illustrated that any "flying blind" opens up a covert channel and if one
>can touch some �Architectural state while "flying blind" you can exploit
>this to extract data you should have been prevented from seeing.
>
>Apple wanted performance, high performance requires lots of predictors,
>predictors mean you are effectively flying blind--and the circle of
>bad �Architecture continues.

As we (in particular, including you) have worked out soon after
Spectre was revealed to the public, you can fix (not mitigate) Spectre
by not exposing speculative microarchitectural changes to other
threads or cores, and throwing them away when the speculation turns
out to be incorrect. We know that this can be done because it is just
the same thing that has been done for architectural changes since
1995. We also need to make sure that resources are not speculatively
occupied in a way that can be perceived by other threads or cores.

>Neither the 1-wide not the 6-wide My 66000 �Architectures are sensitive
>to these kinds of attacks, and I don't think I have lost a single Iota
>of performance getting there. ...

As you note yourself: "high performance requires [...] predictors".
So if you use prediction, do you make it Spectre-proof? And if you
don't use prediction, how do you get performance?

While it's possible to get performance for throughput code (like
matrix multiply) without prediction, for other code (e.g., most
SpecInt stuff, or our LaTeX benchmark) you lose a lot of performance
if you don't have speculation.

E.g., Ultimate Speculative Load Hardening (which eliminates most, but
not all speculation) is reported as having a slowdown by a factor of
2.5 on SPECint programs (pretty little variation between them).

- anton
--
'Anyone trying for "industrial quality" ISA should avoid undefined behavior.'
Mitch Alsup, <c17fcd89-f024-40e7-a594-88a85ac10d20o@googlegroups.com>

Re: iLeakage - Spectre-type attacks are alive and well...

<39069b1e4a059625f8671948712e7d07@news.novabbs.com>

  copy mid

https://news.novabbs.org/devel/article-flat.php?id=34931&group=comp.arch#34931

  copy link   Newsgroups: comp.arch
Path: i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup)
Newsgroups: comp.arch
Subject: Re: iLeakage - Spectre-type attacks are alive and well...
Date: Sun, 12 Nov 2023 19:10:30 +0000
Organization: novaBBS
Message-ID: <39069b1e4a059625f8671948712e7d07@news.novabbs.com>
References: <ui7mbn$2oia7$1@newsreader4.netcologne.de> <58dcb399bfed53f2dfecca60030ad026@news.novabbs.com> <2023Nov12.152522@mips.complang.tuwien.ac.at>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
logging-data="701521"; mail-complaints-to="usenet@i2pn2.org";
posting-account="t+lO0yBNO1zGxasPvGSZV1BRu71QKx+JE37DnW+83jQ";
User-Agent: Rocksolid Light
X-Spam-Level: *
X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on novalink.us
X-Rslight-Posting-User: 7e9c45bcd6d4757c5904fbe9a694742e6f8aa949
X-Rslight-Site: $2y$10$MY1w/1V8HiI.jUcRB6kAwOqllNd1E/E/Xa.WdWgLrlbRTR/3MbM/m
 by: MitchAlsup - Sun, 12 Nov 2023 19:10 UTC

Anton Ertl wrote:

> mitchalsup@aol.com (MitchAlsup) writes:
>>What this illustrates is that the fundamental flaw �Architects are
>>not allowed to make is that of "flying blind"--that is make a prediction
>>and believe that prediction until made aware of its incorrectness. Spectr�
>>illustrated that any "flying blind" opens up a covert channel and if one
>>can touch some �Architectural state while "flying blind" you can exploit
>>this to extract data you should have been prevented from seeing.
>>
>>Apple wanted performance, high performance requires lots of predictors,
>>predictors mean you are effectively flying blind--and the circle of
>>bad �Architecture continues.

> As we (in particular, including you) have worked out soon after
> Spectre was revealed to the public, you can fix (not mitigate) Spectre
> by not exposing speculative microarchitectural changes to other
> threads or cores, and throwing them away when the speculation turns
> out to be incorrect. We know that this can be done because it is just
> the same thing that has been done for architectural changes since
> 1995. We also need to make sure that resources are not speculatively
> occupied in a way that can be perceived by other threads or cores.

>>Neither the 1-wide not the 6-wide My 66000 �Architectures are sensitive
>>to these kinds of attacks, and I don't think I have lost a single Iota
>>of performance getting there. ...

> As you note yourself: "high performance requires [...] predictors".
> So if you use prediction, do you make it Spectre-proof? And if you
> don't use prediction, how do you get performance?

> While it's possible to get performance for throughput code (like
> matrix multiply) without prediction, for other code (e.g., most
> SpecInt stuff, or our LaTeX benchmark) you lose a lot of performance
> if you don't have speculation.
<
It is not that the 6-wide does not have speculation (predictors), but
that µArchitecture state is not updated until the causing instruction
retires. This requires speculation buffers for the predictors which is
accessible to the fetch-insert part of the pipeline, but if one backs
up (for any reason) the buffered speculations younger than the recovery
point are not used and are certainly no0t written into the long-term
predictor store. ST-to-LD forwarding is simply defined to be such a
predictor.
<
> E.g., Ultimate Speculative Load Hardening (which eliminates most, but
> not all speculation) is reported as having a slowdown by a factor of
> 2.5 on SPECint programs (pretty little variation between them).
<
Yes, that is why you don't do it that way.
<
The only time My 66000 takes a stall on this stuff is when the predictor
runs out of speculation state. Memory references (to recover TSO) has
48 potentially outstanding references, branch/call/switch/return has 16.
<
> - anton

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor