Improving the handling of embargoed hardware-security bugs
Improving the handling of embargoed hardware-security bugs
Posted Oct 25, 2018 19:45 UTC (Thu) by jhoblitt (subscriber, #77733)Parent article: Improving the handling of embargoed hardware-security bugs
I grasp that shipping a microcode update is unlikely to ever be an overnight process but is anyone really more "secure" because a vulnerability isn't disclosed to the "public" for 6 months? I think I'd rather be aware of a known risk rather than gamble that a exploit isn't already in the wild...
Posted Oct 25, 2018 20:05 UTC (Thu)
by roc (subscriber, #30627)
[Link] (3 responses)
Surely the answer is "sometimes yes".
Tradeoffs are hard.
Posted Oct 29, 2018 15:29 UTC (Mon)
by ortalo (guest, #4654)
[Link] (2 responses)
That's not a trade off IMHO, more of an hypothesis coverage issue.
[1] less skilled, less informed, slow, etc.
Posted Nov 1, 2018 4:47 UTC (Thu)
by brooksmoses (guest, #88422)
[Link] (1 responses)
It is very unlikely that the attackers gain will access to information about the vulnerability at the same time that the vendor does. If they already have this information at the point the vendor discovers it, then a delay from the vendor makes the situation only quantitatively worse, not qualitatively -- the time the attackers can exploit it gets longer due to the embargo, but it doesn't come into existence due to the embargo. If the embargo time is short compared to the length of time that the exploitable bug has existed, then it's unlikely that the embargo causes a substantial increase in the time the attackers can exploit it, and also unlikely that the attackers will discover it during the embargo period if they haven't already discovered it.
Meanwhile, you have to consider the value of lifting the embargo earlier. Lifting it early doesn't necessarily mean the end users are then "safe". If there are essentially no practical fixes without changes from the manufacturer, and the manufacturer doesn't have those changes ready, then lifting the embargo only helps attackers without helping users protect themselves. Even if there are practical fixes available, rushing them out before they are "fully baked" increases the risk that they are insufficient or buggy, at which point we can basically assume that the attackers will find the bugs in the patches before they can be patched, and that's almost as bad as lifting the embargo without a fix.
And, of course, there's also the observation that there are certainly plenty of "less skilled, less informed, slow, etc." attackers in the world -- and, once the embargo is lifted, they too can pretty quickly start exploiting the bug. So even if a few highly-skilled attackers already know of the bug, lifting the embargo without a reliable fix in place still has high cost.
Posted Nov 1, 2018 17:31 UTC (Thu)
by anton (subscriber, #25547)
[Link]
Posted Oct 25, 2018 21:07 UTC (Thu)
by hansendc (subscriber, #7363)
[Link]
Posted Nov 1, 2018 5:09 UTC (Thu)
by brooksmoses (guest, #88422)
[Link]
Making a bug public is probably going to put it into the first of those categories in reasonably short order.
Meanwhile, if the exploit becomes widely known and being actively used at the script kiddie level while it's under embargo, it's likely that someone in the anti-attacker community is going to find out about it fairly quickly due to poor opsec on the part of some script kiddie, at which point the embargo is basically irrelevant.
So, effectively the tradeoff you get is something more like: Would you rather be aware of a known risk that every hack-script builder also knows about and you don't have a good fix for, or gamble that you're not going to be the target of this particular hack when it's used as a tightly-targeted zero-day?
Personally, I think if the latter is a serious concern to you, the precautions that you would have taken had you known about Meltdown before the embargo was lifted are pretty much precautions you should be taking regardless: Don't trust software you haven't completely vetted to run on your machine, don't trust any interface to be an impenetrable barrier unless you can (and do) audit the traffic, and assume timing data on that traffic is an exploitable side channel that you need to secure.
Improving the handling of embargoed hardware-security bugs
Improving the handling of embargoed hardware-security bugs
The implied hypothesis is that your attackers do not have access to the vulnerability information.
I hate this hypothesis because in some sense, it means you only consider attackers more stupid [1] than defenders.
Which in itself is contradictive. (Only stupid defenders do such an hypothesis, no? ;-)
Improving the handling of embargoed hardware-security bugs
A drawback of the embargo is patents: If the security researchers find the vulnerability on Intel, and therefore inform Intel, Intel can patent all the ways to fix the problem that they can think of. While, e.g., AMD has patent exchange agreements with Intel, a startup RISC-V manufacturer probably does not, and will find itself at a disadvantage thanks to the embargo.
Improving the handling of embargoed hardware-security bugs
Improving the handling of embargoed hardware-security bugs
Improving the handling of embargoed hardware-security bugs
