On Thu, May 11, 2017 at 2:48 PM, Lars Hansen <lhan...@mozilla.com> wrote:

> On Thu, May 11, 2017 at 10:55 AM, Martin Thomson <m...@mozilla.com> wrote:
>
> > On Thu, May 11, 2017 at 5:57 PM, Lars Hansen <lhan...@mozilla.com>
> wrote:
> > > We do think there are
> > > architectural improvements that hardware manufacturers, operating
> > systems,
> > > and browsers can make [19], and we intend to investigate them.
> >
> > I think that the work you cite is promising.  However, listening to
> > this presentation, there's a little soundbite that seems relevant to
> > this point.  Forgive any transcription errors, but I think that David
> > (the author of the paper) says:
> >
> > "For example, Javascript is currently considering adding shared
> > memory.  That would destroy this entire model."  -- start at 27:00 for
> > the question and this answer.
> >
>
> ​They make much the same point in their paper, section 4.5.​
>
>
> Do you have a strategy for dealing with this problem?  The UCSD paper
> > doesn't provide any suggestions from what I can see.
> >
>
> We do not have an overarching strategy for this - indeed, being able to
> construct a precise "non-exiting" clock seems to be an inevitable
> consequence of the low level APIs that are exposed through shared memory
> with racy access and true parallelism.  On the technical side, on some
> platforms, in heightened-security contexts, short of disabling the feature
> one could probably pin the threads that share memory to the same core, thus
> removing parallelism (and the resulting clock) while allowing the feature
> to function.  But this is not portable and I don't know for a fact that it
> is completely practical.
> ​
>
> A major issue here is that once we ship a feature like this, it's very
> > difficult to un-ship if we find that we need to change things to deal
> > with issues.  Given that we know those issues, having a framework for
> > dealing with those issues ahead of time would allow us to gain some
> > confidence that we aren't setting ourselves up for some serious pain.
> >
>
> ​Our only mitigation measure at the moment is that if the feature should be
> used as an attack vector in the wild we can disable it again (eg, ship a
> dot-release or other hotfix).  As my original message notes, it will also
> remain possible to disable this feature for all tabs in about:config.
>

Well, only until some top-500 website starts using it for a critical piece
of functionality, right? I'd love to unship plenty of warts in the DOM for
security reasons, but we can't break the web.


> ​--lars
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to