Impact of Meltdown

282 views
Skip to first unread message

Reto Buerki

unread,
Jan 16, 2018, 10:01:47 AM1/16/18
to muen-dev
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi,

We thoroughly studied the potential impact of the recent
Spectre/Meltdown speculative execution CPU design issues on the Muen
Separation Kernel. In this mail we would like to share our findings
regarding Meltdown. The analysis of Spectre will follow in a separate
mail.

For the technical details of the Meltdown vulnerability the reader is
directed to the associated papers and blog posts [1][2][3].

= Introduction

Meltdown is part of a new attack class which relies on observing side
effects caused by speculative instruction execution by the processor. It
is also referred to as Rogue Data Cache Load (CVE-2017-5754).

For a successful Meltdown attack, three requirements have to be met:
(1) The memory space of the unprivileged attacker contains privileged
memory mappings to which the attacker has no access (U/S bit not
set)
(2) The mappings contain desired information
(3) The attacker can measure the timing effects introduced by its attack

= Assessment

Muen uses VT-x and not ring-0/ring-3 transitions as isolation mechanism
between subjects and the kernel. As VT-x transitions automatically
switch the memory layout between guests and the host, Muen does not use
the User/Supervisor bit in page tables for the enforcement of access
rights.

Consequently the precondition (1) for the attack is not met and the Muen
kernel is not vulnerable.

Subjects which internally rely on ring-0/ring-3 transition (e.g. Linux,
Windows) are vulnerable from local attacks unless adequate mitigation is
performed at subject level. E.g. for Linux guests, Kernel Page Table
Isolation (KPTI, formerly KAISER) must be enabled.

= Conclusion

Meltdown is defended by our design decision to have a simple
architecture which only utilizes a single isolation mechanism: hardware
virtualization. We prioritized a minimal design over performance
considerations and decided not to use ring-3 in VMX-root mode for native
subjects. Since Meltdown only affects the ring-0/ring-3 isolation
mechanism we were spared from that pit of lava.

Kind regards,
The Muen Team

[1] - https://meltdownattack.com
[2] -
https://googleprojectzero.blogspot.ch/2018/01/reading-privileged-memory-
with-side.html
[3] -
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Ana
lysis-of-Speculative-Execution-Side-Channels.pdf
-----BEGIN PGP SIGNATURE-----
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=wuhR
-----END PGP SIGNATURE-----
Reply all
Reply to author
Forward
0 new messages