[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21010 [Applications/Tor Browser Sandbox]: Disable RDTSC/RDTSCP to limit side-channel attacks



#21010: Disable RDTSC/RDTSCP to limit side-channel attacks
----------------------------------------------+-------------------------
 Reporter:  cypherpunks                       |          Owner:  yawning
     Type:  enhancement                       |         Status:  new
 Priority:  High                              |      Milestone:
Component:  Applications/Tor Browser Sandbox  |        Version:
 Severity:  Normal                            |     Resolution:
 Keywords:                                    |  Actual Points:
Parent ID:                                    |         Points:
 Reviewer:                                    |        Sponsor:
----------------------------------------------+-------------------------

Comment (by yawning):

 > Is there a reason that timing attacks against ASLR is the primary issue
 in the Tor Browser Sandbox's threat model, rather than any other number of
 attacks made possible by RDTSC and RDTSCP?

 No, everything else is valid, it's just that, I looked into it after
 reading papers on the subject (what, am I not allowed to provide
 historical context)?

 I'm somewhat worried that RDTSC use ends up depending on distribution, and
 what the user is doing.  Maybe I'm being overly paranoid here...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21010#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs