Open fscoto opened 2 years ago
And cryptographers worry about quantum computing…
Tentative answers:
In any case, there's not much I can do right now, so I suggest we leave this issue open and wait for the dust to settle.
Can we treat this as wontfix/no action required for 4.0.0? If we wanted to make breaking changes, now before 4.0.0 would be the time and it seems nobody else has made a move despite the novel threat model.
Indeed this won't be fixed for 4.0.0. It's "only" been 8 months since we knew of the issue so I didn't dare close it outright, but… Benevolent dictator (me) hereby says this won't be fixed for 4.0.0.
Now I can add the label and close this right now (we can always re-open this issue later), or I can wait this summer. But to be honest I'm not expecting any new result in the coming months.
Yingchen Wang et al. recently released a Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
In essence, frequently boosting on mainstream AMD and Intel CPUs causes (remotely) measurable differences in execution speeds with apparently practical exploitation, even for seemingly constant-time operations like addition depending on the involved numbers. No microcode patches seem to be planned and from the description it seems there can't be meaningful OS-level mitigations.
Intel provides guidance on mitigation in software, which boils down to techniques about power side channel mitigation. In other words, power side channel mitigations are likely going to become de facto parts of networked threat models. The performance impact is likely to be catastrophic.
Open research questions:
#define
for e.g. embedded applications with CPUs that cannot exhibit this frequency boosting behavior?