[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21010 [Applications/Tor Browser Sandbox]: Disable RDTSC/RDTSCP to limit side-channel attacks



#21010: Disable RDTSC/RDTSCP to limit side-channel attacks
----------------------------------------------+-------------------------
 Reporter:  cypherpunks                       |          Owner:  yawning
     Type:  enhancement                       |         Status:  new
 Priority:  High                              |      Milestone:
Component:  Applications/Tor Browser Sandbox  |        Version:
 Severity:  Normal                            |     Resolution:
 Keywords:                                    |  Actual Points:
Parent ID:                                    |         Points:
 Reviewer:                                    |        Sponsor:
----------------------------------------------+-------------------------

Comment (by cypherpunks):

 A small correction on my part.

 >The reason this happens is that a few syscalls, namely `getcpu()`,
 `gettimeofday()`, `time()`, and `clock_gettime()` use the `RDTSC`
 instruction

 The `getcpu()` and `time()` vDSOs do not use `RDTSC`. I meant to say they
 were all vDSOs, but those two are safe to call even with TSC instructions
 restricted to ring 0. `getcpu()` uses `LSL` instead of `RDTSCP` (since it
 works on all architectures), and `time()` consults a dynamically updating
 value in the VVAR.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21010#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs