this post was submitted on 22 Mar 2024
0 points (NaN% liked)

Technology

58009 readers
3105 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

The attack has been dubbed GoFetch: https://gofetch.fail/

top 6 comments
sorted by: hot top controversial new old
[–] GlitterInfection@lemmy.world 0 points 5 months ago (1 children)

This requires local access to do and presently an hour or two of uninterrupted processing time on the same cpu as the encryption algorithm.

So if you're like me, using an M-chip based device, you don't currently have to worry about this, and may never have to.

On the other hand, the thing you have to worry about has not been patched out of nearly any algorithm:

https://xkcd.com/538/

[–] Killing_Spark@feddit.de 0 points 5 months ago

Yeah I don't think this is a big-ish problem currently. But by having this vulnerability to point to, other CPU vendors have a good reason not to include this feature in their own chips.

[–] Spedwell@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (2 children)

Wow, what a dishearteningly predictable attack.

I have studied computer architecture and hardware security at the graduate level—though I am far from an expert. That said, any student in the classroom could have laid out the theoretical weaknesses in a "data memory-dependent prefetcher".

My gut says (based on my own experience having a conversation like this) the engineers knew there was a "information leak" but management did not take it seriously. It's hard to convince someone without a cryptographic background why you need to {redesign/add a workaround/use a lower performance design} because of "leaks". If you can't demonstrate an attack they will assume the issue isn't exploitable.

[–] lightnegative@lemmy.world 0 points 5 months ago (1 children)

If you can't demonstrate an attack they will assume the issue isn't exploitable.

Absolutely. Theory doesn't always equal reality. The security guys submitting CVE's to pad their resumes should absolutely be required to submit a working exploit. If they can't then they're just making needless noise

[–] Killing_Spark@feddit.de 0 points 5 months ago

There are definitely bullshit cves out there but I don't think that's a good general rule. Especially in this context where it's literally unpatchable at the root of the problem.

[–] Killing_Spark@feddit.de 0 points 5 months ago* (last edited 5 months ago)

So the attack is (very basically, if I understand correctly)

Setup:

  • I control at least one process on the machine I am targeting another process on
  • I can send data to the target process and the process will decrypt that

Attack:

  • I send data that in some intermediate state of decryption will look like a pointer
  • This "pointer" contains some information about the secret key I am trying to steal
  • The prefetcher does it's thing loading the data "pointed to" in the cache
  • I can observe via a cache side channel what the prefetcher did, giving me this "pointer" containing information about the secret key
  • Repeat until I have gathered enough information about the secret key

Is this somewhat correct? Those speculative execution vulnerabilities always make my brain hurt a little