From: George Dunlap <george.dunlap@citrix.com>
To: Ian Jackson <ian.jackson@eu.citrix.com>,
Lars Kurth <lars.kurth.xen@gmail.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>, committers@xenproject.org
Subject: Re: Impact of HW vulnerabilities & Implications on Security Vulnerability Process
Date: Wed, 7 Sep 2016 16:59:34 +0100 [thread overview]
Message-ID: <016f1ff8-ae34-9cdb-b3eb-4ac6574d8312@citrix.com> (raw)
In-Reply-To: <22480.13129.281839.14168@mariner.uk.xensource.com>
On 07/09/16 16:33, Ian Jackson wrote:
> Lars Kurth writes ("Impact of HW vulnerabilities & Implications on Security Vulnerability Process"):
>> A few years ago it was discovered that much of the RAM shipped in our
>> computers contains flaws which allow "leakage" across rows; effectively
>> allowing programs to use access to one bit of memory to flip bits in
>> other parts of memory to which they have been specifically denied
>> access. This has attack on faulty hardware has been dubbed "rowhammer"
>> [1].
> ...
>
>> From my perspective, there are a number of differing goals we are trying
>> to achieve with the process
> ...
>> b) If already public (or at disclosure time), ensure that our users have
>> all the information to make the right choices
>
> This is my concern.
>
> From my POV XSAs are a convenient established format and process.
>
> However, I don't think this necessarily needs to be dealt with by
> issuing an actual XSA, particularly if there are other reasons for
> doing things differently. We could brief our users by writing some
> other kind of message, perhaps posted on xen-announce.
>
> Indeed several aspects of the XSA process are not really applicable.
>
> One main reason for issuing an XSA for an ordinary software bug is
> that it allows the issue, and its fix, to be tracked in a standardised
> way. CVEs perform the same function, with a more general scope.
>
> But, we would not expect to get a CVE for what really amounts to a
> hardware quality issue. And where there can be little useful way of
> avoiding a hardware bug by adding workarounds to the software
> (specifically, in our case, by modifying Xen), there is no need to
> track whether any particular codebase has the mitigation.
>
> So there is little benefit in assigning a number.
>
> Unlike with software bugs, there is also relatively little benefit in
> having rowhammer listed on a web page alongside software bugs.
>
> The XSA advisory template format does not lend itself well to this
> issue, as I found when I tried to write a draft. While does have the
> benefit of being in a format which is familiar to users, user response
> will have to be quite different. And the level of uncertainty and
> hardware-dependence means that the usual questions such as `Impact'
> and `Vulnerable systems' have unsatisfactory non-answers, in such a
> bulletin.
>
> We did issue XSA-3 for a mitigationless hardware design problem. But
> that was in a very different environment: the XSA process was not as
> formally established as it is now, and the publicity implications were
> different.
>
>> Technical
>> =========
>> On the technical front, it would be good to understand whether
>> a) This is a real threat and whether thus, we as a community need to
>> take action
>
> It is unclear what action the Xen upstream community can usefully
> take, other than providing users with information.
>
> But, users with deployments on actual hardware ought to try to find
> out whether they are vulnerable. If they are then they could seek
> replacement non-faulty hardware from their vendor, or take unpleasant
> migitation measures (like switching to HVM, perhaps).
>
>> b) Whether the technique described in [3] is serious on big iron with
>> different core/cache properties compared to some of the machines this
>> was tested on
>
> This is a big question.
>
>> c) Whether there is any mitigation that we can develop, if necessary
>
> AIUI there is little to be done. But, I look forward to being proven
> wrong.
The attack described in [4] relies on the fact that the attacker knows
the mfn of the L2 pagetables being used by the hardware. Using shadows
for the L2+ pagetables would thwart that particular attack, and
shouldn't in theory cause too much overhead.
But that would only thwart a particular attack. Other attacks are
certain to develop; we can only strongly advise all our users that if
they expect to have determined adversaries inside their guests, that
they should make every effort to use RAM which is not vulnerable to
rowhammer attacks.
-George
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2016-09-07 15:59 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-09-07 15:08 Impact of HW vulnerabilities & Implications on Security Vulnerability Process Lars Kurth
2016-09-07 15:33 ` Ian Jackson
2016-09-07 15:44 ` Jan Beulich
2016-09-07 15:59 ` George Dunlap [this message]
2016-09-07 16:05 ` George Dunlap
2016-09-08 11:12 ` Ian Jackson
2016-09-08 11:19 ` Wei Liu
2016-09-08 11:39 ` Lars Kurth
2016-09-07 19:08 ` Stefano Stabellini
2016-09-07 20:33 ` Meng Xu
2016-09-07 21:02 ` Stefano Stabellini
2016-09-07 21:31 ` Andrew Cooper
2016-09-07 22:01 ` Stefano Stabellini
2016-09-08 9:29 ` George Dunlap
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=016f1ff8-ae34-9cdb-b3eb-4ac6574d8312@citrix.com \
--to=george.dunlap@citrix.com \
--cc=committers@xenproject.org \
--cc=ian.jackson@eu.citrix.com \
--cc=lars.kurth.xen@gmail.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).