TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack [pdf]

51 pointsby pedro84over 11 years ago

5 comments

IbJackedover 11 years ago
So, according to this paper, &quot;GnuPG in its current form is not safe for a multi-user system or for any system that may run untrusted code.&quot;<p>The attack is against the RSA implementation specifically. Is there a gpg asymmetric encryption that <i>would</i> be considered safe? If not, is there a reasonable gpg alternative?
评论 #6391828 未加载
评论 #6391699 未加载
评论 #6391885 未加载
daemon13over 11 years ago
So, practical question<p>I am on Ubuntu LTS 12.04 with GnuPG 1.4.11 (Linux version 3.2.0-32-virtual (buildd@batsu) (gcc version 4.6.3 (Ubuntu&#x2F;Linaro 4.6.3-1ubuntu5)).<p>Q1. Do I need to fix this potential attack?<p>Q2. Assuming this fix is not backported [now] - if I compile fresh gpg and swap the binary with the old gpg - will this fix it?
评论 #6392318 未加载
nn3over 11 years ago
The key part is the first line in the abstract<p>&quot;Flush+Reload is a cache side-channel attack that monitors access to data in shared pages&quot;<p>The OS does not allow arbitary programs to share pages with gpg. If you share pages with gpg you can already read the key directly, no need for any side channels.<p>As far as I can tell the paper is completely pointless, a variant of this fallacy <a href="http://blogs.msdn.com/b/oldnewthing/archive/2009/01/21/9353310.aspx" rel="nofollow">http:&#x2F;&#x2F;blogs.msdn.com&#x2F;b&#x2F;oldnewthing&#x2F;archive&#x2F;2009&#x2F;01&#x2F;21&#x2F;93533...</a>
评论 #6391728 未加载
评论 #6391754 未加载
sspiffover 11 years ago
Can someone knowledgeable about security tell me if there is anything about their claim (98% in one round) that is exaggerated or &quot;best edge case only&quot;?<p>I wonder how these attacks would fare against NaCl[1] or Sodium[2], who were designed to be secure against side-channel attacks.<p>[1]: <a href="http://nacl.cr.yp.to" rel="nofollow">http:&#x2F;&#x2F;nacl.cr.yp.to</a><p>[2]: <a href="http://labs.umbrella.com/2013/03/06/announcing-sodium-a-new-cryptographic-library" rel="nofollow">http:&#x2F;&#x2F;labs.umbrella.com&#x2F;2013&#x2F;03&#x2F;06&#x2F;announcing-sodium-a-new-...</a>
评论 #6392167 未加载
评论 #6394716 未加载
contingenciesover 11 years ago
Gentoo bug @ <a href="https://bugs.gentoo.org/show_bug.cgi?id=478184" rel="nofollow">https:&#x2F;&#x2F;bugs.gentoo.org&#x2F;show_bug.cgi?id=478184</a>