Intel could face a class-action lawsuit over its Downfall chip vulnerabilities.
Class-Action Lawsuit Forming Against Intel for 'Downfall' Chip Bug : Read more
Class-Action Lawsuit Forming Against Intel for 'Downfall' Chip Bug : Read more
The scheduled forum maintenance has now been completed. If you spot any issues, please report them here in this thread. Thank you!
Because it is a side-channel: Downfall poses no threat at all without malicious code somewhere else actively attempting to scoop whatever data it may be leaking and successfully extracting data still requires the attacking thread to get lucky with peeking at what it can see while relevant data is being processed and attempt to infer the target content from it. No plain-text user-space data is being directly leaked.It seems to me (and please correct me if I'm wrong) that you are conflating "speculative execution" with "side-channel attacks".
You do want to allow accountability for bugs that make a product fundamentally unsuitable for its intended purposes like the Pentium FP bug that made affected FPUs effectively worthless.Well, here's the real problem... If you start allowing damages against bugs, then the entire hardware and software industries shut down.
If you need the highest security possible, don't allow your security-critical code and services to run on a machine that also runs arbitrary user code such as a virtualized server instance. If you don't allow any unknown code on your security-critical servers, side-channel exploits are irrelevant.So, yeah, it sucks that you have to choose between maximum security vs the original performance but what would be the reasonable alternative?
It depends. I believe it has to be on a case per case basis. As it is today.Well, here's the real problem... If you start allowing damages against bugs, then the entire hardware and software industries shut down. Poof. Gone. No more hardware. No more software. The complexity of them both is to such a degree that it is, at this point, impossible to not have a number of fatal flaws. Just not gonna happen. The buyer has to accept the risk, otherwise they get nothing.
^^Well, here's the real problem... If you start allowing damages against bugs, then the entire hardware and software industries shut down. Poof. Gone. No more hardware. No more software. The complexity of them both is to such a degree that it is, at this point, impossible to not have a number of fatal flaws. Just not gonna happen. The buyer has to accept the risk, otherwise they get nothing.
What bugged feature? The speculative execution and load features work fine. The only problem is that some architecture registers which weren't thought to be of significance at the time the feature (gather registers) got implemented turned out to be a potential information leak vector.In that sense, customers see a performance regression that has nothing to do with how they use the product, but which has everything to do with the (bugged) features Intel (and others) build into their products.
The mitigation is only necessary if you cannot be bothered to secure you system against it any other way, assuming any mitigation is necessary in the first place. For heaps of online infrastructure, the most security-sensitive thing a server will ever do is session authentication and you can delegate that task to a more secure server instead of doing it locally.The flaw being of no consequence in a secure system isn't the issue; the issue is that intel launched a mitigation (so Intel believes the problem needs to be addressed, irrespective of whether or not it has real-life applicability), and that mitigation subverts expected performance. That's a valid complaint.
I think the more pressing issue, aside from most of these need physical access and specialized software/hardware to execute is that the modern 'gamer' or anyone working on any normal (non-mission-critical) workloads, will have to update to the latest firmware to get the new bug fixes/feature fixes, where they end up having to either roll back and stop updating their firmware, or get the latest bug fixes and have their cpu work at (in extreme cases) roughly half of the rated throughput they were expecting. Considering that these exploits are mostly theoretical, I wish Intel/AMD would have different firmware 'branches' .. much like Nvidia does with the 'Gamer ready drivers vs Studio Drivers' .. where one would be for bug fixes, timings and max performance, and the other with all the security vulnerabilities that are 'obscure' fixed (along with the performance degradation) .. Now I'm not completely insensitive to patching bugs, like par se if a remote root access exploit existed, that needs to be patched for all cpus.Most of these side-channel attacks are purely theoretical yet practically impossible to achieve under real-world conditions where systems are juggling tens of thousands of threads spanning dozens of unrelated background processes, applications, system services, etc. and there are no guarantees that the desired data is in-flight through the victim algorithm at any particular time for the attack code to get anything back from.
Since all of those side-channel attacks require extensive CPU-time abuse to even have a chance of succeeding, a successful exploit also requires failure to catch rogue processes consuming a disproportionate amount of CPU time that should cause performance complaints along with a substantial increase in system power draw.
Most systems don't handle data anywhere near sensitive enough to worry about these. For environments where hypothetical side-channel attacks are unacceptable, we'll need different CPUs designed specifically to eliminate all potential crosstalk between unrelated threads.
For most other uses, all that is really necessary would be to provide software developers with the ability to mark security-critical parts of their software to prevent unrelated code from running on the same CPU/L2 until it exits the protected section - can't side-channel-attack code when you cannot run concurrently.
you're right, I never read the original paper until just now and the news articles didn't go into details.It seems to me (and please correct me if I'm wrong) that you are conflating "speculative execution" with "side-channel attacks".
To clarify the part you quoted from my earlier comment:If you need the highest security possible, don't allow your security-critical code and services to run on a machine that also runs arbitrary user code such as a virtualized server instance. If you don't allow any unknown code on your security-critical servers, side-channel exploits are irrelevant.
They don't owe anyone anything until they manage to convince a jury that Intel should have been able to foresee the exploit or was demonstrably negligent in their design.anyway they are facing a lawsuit so they have to compensate money
Yes, it is true car makers have been sued for defects yet are still making cars. I'm not denying this. I'd like to add that car makers have a different severity level and potential remediation processes than available with a CPU with "unforeseen security issue, fix slows it down, no one dies. Probably." Suing over something like that is up there with getting sued by a patent troll.Car makers have been sued for defects and car makers are still making cars.
Try again. Your sig tells me you're just after a "free" OC unlock. Nope.anyway they are facing a lawsuit so they have to compensate money or come up with a workaround to compensate for the performance loss by some solution like unlocking bclk overclocking all boards and cpus, releasing bios to increase clock speed, unlocking cpu multiplier, suggest overclock to regain performance lost... otherwise they will have to compensate billions of users with money 🙃. sorry but i'm not against intel for hate reasons but they have to guarantee the rights of consumers, can do anything with the purchased product, otherwise will have to be SUED OR COMPENS☠. I mostly only buy intel cpu and at the same time I want to claim the user proper rights (overclock-free)
Don't run foreign code in security-critical systems and CPU security flaws become irrelevant - can't exploit flaws if you cannot get code on the machine to do so.I agree that the comparison of car defects and CPU security issues is flawed. But CPU security issues, on the other hand, can lead to data breaches, financial losses, and other problems