WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] HT Vulnerability CAN-2005-0109

To: xen-devel@xxxxxxxxxxxxxxxxxxx, david.hopwood@xxxxxxxxxxxxxxxx
Subject: Re: [Xen-devel] HT Vulnerability CAN-2005-0109
From: Mark Williamson <mark.williamson@xxxxxxxxxxxx>
Date: Thu, 19 May 2005 03:46:15 +0100
Delivery-date: Thu, 19 May 2005 02:51:24 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <428BCB21.7020909@xxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: University of Cambridge
References: <1116427424.4496.17.camel@xxxxxxxxxxxxxxxxxxxxxxx> <200505181548.48629.mark.williamson@xxxxxxxxxxxx> <428BCB21.7020909@xxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.8
> > This vulnerability could (in principle) affect isolation between Xen VMs.
> > It's not clear how exploitable it is, though.
>
> It's clear that it is very exploitable.

On a real world system?

"To ensure that the two processes run simultaneously, we start running the Spy 
process before we start OpenSSL, and stop it after OpenSSL has finished, while 
minimizing the number of other processes running"

That's fine as a proof of concept but it's not the real world.  Note that I'm 
not denying a persistent attacker may still capture a key eventually, even in 
a very "noisy" environment.  The barrier to successful exploit may be 
substantially increased, however.

> > Covert channels will *always* be there.
>
> Yes. As you say, the problem is the side channel attack, not the covert
> channel.

The covert channel is still a problem if it's substantially higher bandwidth 
than the inevitable pre-existing channels.  For the XenSE work with mandatory 
access control we can't eliminate covert channels but we'd like them not to 
be high bandwidth.

> > Someone has yet to release code that'll actually exploit these
> > theoretical holes, so it's not clear how big a problem is in practice.
>
> Huh? That sounds like something I would expect to hear from a Microsoft
> marketroid.

Thank you for your insight, David.

> The paper includes code for the side channel attack (Figure 1 
> in <http://www.daemonology.net/papers/htt.pdf>), and even if it didn't, it
> would be easy to replicate.

I admit I hadn't noticed the code included could be used in the side channel 
attack - it's a fair cop guv!  It's worrying - we should watch what the other 
OS communities do on this.

Regards,
Mark

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel