On Thu, May 11, 2017 at 3:00 PM, Bobby Holley <bobbyhol...@gmail.com> wrote:
> On Thu, May 11, 2017 at 2:48 PM, Lars Hansen <lhan...@mozilla.com> wrote: > >> On Thu, May 11, 2017 at 10:55 AM, Martin Thomson <m...@mozilla.com> wrote: >> >> > On Thu, May 11, 2017 at 5:57 PM, Lars Hansen <lhan...@mozilla.com> >> wrote: >> > > We do think there are >> > > architectural improvements that hardware manufacturers, operating >> > systems, >> > > and browsers can make [19], and we intend to investigate them. >> > >> > I think that the work you cite is promising. However, listening to >> > this presentation, there's a little soundbite that seems relevant to >> > this point. Forgive any transcription errors, but I think that David >> > (the author of the paper) says: >> > >> > "For example, Javascript is currently considering adding shared >> > memory. That would destroy this entire model." -- start at 27:00 for >> > the question and this answer. >> > >> >> They make much the same point in their paper, section 4.5. >> >> >> Do you have a strategy for dealing with this problem? The UCSD paper >> > doesn't provide any suggestions from what I can see. >> > >> >> We do not have an overarching strategy for this - indeed, being able to >> construct a precise "non-exiting" clock seems to be an inevitable >> consequence of the low level APIs that are exposed through shared memory >> with racy access and true parallelism. On the technical side, on some >> platforms, in heightened-security contexts, short of disabling the feature >> one could probably pin the threads that share memory to the same core, >> thus >> removing parallelism (and the resulting clock) while allowing the feature >> to function. But this is not portable and I don't know for a fact that it >> is completely practical. >> >> >> A major issue here is that once we ship a feature like this, it's very >> > difficult to un-ship if we find that we need to change things to deal >> > with issues. Given that we know those issues, having a framework for >> > dealing with those issues ahead of time would allow us to gain some >> > confidence that we aren't setting ourselves up for some serious pain. >> > >> >> Our only mitigation measure at the moment is that if the feature should >> be >> used as an attack vector in the wild we can disable it again (eg, ship a >> dot-release or other hotfix). As my original message notes, it will also >> remain possible to disable this feature for all tabs in about:config. >> > > Well, only until some top-500 website starts using it for a critical piece > of functionality, right? I'd love to unship plenty of warts in the DOM for > security reasons, but we can't break the web. > That's right. The window of opportunity for unshipping this somewhat painlessly is probably relatively small, on the order of a few months, perhaps. --lars > > >> --lars >> _______________________________________________ >> dev-platform mailing list >> dev-platform@lists.mozilla.org >> https://lists.mozilla.org/listinfo/dev-platform >> > > _______________________________________________ dev-platform mailing list dev-platform@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-platform