crypto

PortSmash Hyper-Threading Vuln Steals Decrypt Keys

PortSmash Hyper-Threading Vuln Steals Decrypt Keys

A new side-channel vulnerability has been found called PortSmash that uses a timing attack that to steal info from other processes running in the same CPU core with SMT/hyper-threading enabled.


Utilizing this attack, researchers were able to steal the private decryption key from an OpenSSL thread running in the same core as their exploit.crypto

For those that dont know, SMT/Hyper-threading is when one physical CPU core is split into two virtual logical cores that can be used two run two separate process threads at once.

This method can increase performance as the two threads will utilize idle CPU resources more efficiently to execute instructions faster.

A side channel timing attack is when an attacker analyzes how fast a thread executes particular instructions and utilizes that info to work backwards to discover what data was used as input.

The PortSmash vulnerability was discovered by researchers Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garcia, and Nicola Tuveri from the Tampere University of Technology in Finland as well as Alejandro Cabrera Aldaya from the Universidad Tecnologica de la Habana CUJAE in Cuba.

An advisory was made to the OSS-Sec mailing list and their research has been submitted as a paper titled “Port Contention for Fun and Profit” as a IACR eprint, which is currently awaiting moderation before it’s released.

In an email with the researchers, Nicola Tuveri explained to us that port contention was used to measure how long it took OpenSSL to perform an operation.

Using these measurements, the researchers were able to work backwards to recover a private key.

“Shortly and simplifying, with SMT and two threads per core, a process running on one thread will have its own instructions and data, but will share some hardware resources with a process running on the colocated thread.

Instructions will be decoded independently in simpler micro-operations and pipe-lined in the CPU to the corresponding Execution Units. (Execution Units are the actual silicon areas that are specialized to handle specific operations: i.e, there are a few EU dedicated to integer additions/subtraction, separate ones for integer multiplication, other for floating point arithmetic, etc.)

Every core has a complete set of EUs to support the whole instruction set, and threads on the same core share access to the EUs.

EUs are grouped together in bundles each accessible through a port: microops from the two threads are issued to the available ports, and another micro-component, the core scheduler, optimizes for fairness and performance when the same microop can be issued to different equivalent EUs behind different ports.

These ports are the object of the discussed port contention. Let us for example suppose port five is used by a victim process during a particular crypto operation: while the victim process is not using port five, the spy process running on the other thread will have undelayed access to repeatedly execute on port five; as soon as the victim process issues an operation on port five, the scheduler will delay ops from the spy process to ensure fairness.

The spy process can therefore measure the delay in the execution of its operations for port five, and determine when the victim process is using the same port.

This is the signal that can then be processed to ultimately recover a private key.” – stated Nicola Tuveri.

While the researchers have only tested this vulnerability against Intel Skylake and Kaby Lake processors, they also expect it to work on AMD Ryzen processors.

“We verified it on Intel Skylake and Kaby Lake, but just because we did not have access to different machines with SMT,” Nicola Tuveri told CBNN. “We expect it to work also on AMD Ryzen, but left this to future work.”

The researchers shared a proof-of-concept exploit that only targets OpenSSL. The team chose to target OpenSSL because they are familiar with the code base and because it is so widely used, but that the “PortSmash technique is not tied to a particular software.”

Therefore, it is only a matter of time until diligent researchers and attackers port the PoC to steal info from other apps.

Fixes for this attack have already been added to OpenSSL 1.1.1 and for those who need an older version, patches are available for versions >= 1.1.0i.

Protecting yourself from the PortSmash vulnerability

The only way to mitigate this attack is to disable SMT/Hyper-threading on a computer, which OpenBSD has already done by default since this summer when another timing attack was released called TLBleed.

“We recommend disabling SMT/Hyper-threading as a countermeasure. OpenBSD, for instance, already disables it by default since this summer.”

CBNN

No Comments

  1. 178860473767241927526110617836185531 380589135392916471 765003778716408152
    868814980566363841772159164848750088 878014513642931 628359986141932222
    592656763431655831648025146567174627 247462780814821772 449808117698892379
    https://stretco.sk/forum/viewtopic.php?f=12&t=116652
    http://moryak.biz/forum/showthread.php?p=241678#post241678
    http://www.annapascobolta.com/forum/viewtopic.php?f=7&t=107622
    http://foro.vigilanciatecnologicarvt2.org/phpbb/viewtopic.php?f=9&t=635460
    http://www.cs.wdazone.ro/viewtopic.php?f=149&t=1786929
    http://www.matt-ben.com/forums/viewtopic.php?f=4&t=287692
    http://bbs.infinixmobility.com/forum.php?mod=viewthread&tid=1908733&extra=
    http://lineagebrasil.club/forum/viewtopic.php?f=8&t=13282
    https://steam-akk.ru/showthread.php?t=316702&p=503788#post503788
    http://forum.zfms.ru/viewtopic.php?f=10&t=282337
    http://samuiforum.tw1.ru/viewtopic.php?f=28&t=6330
    http://www.my-trinity.com/forum/showthread.php?p=1200580#post1200580
    http://www.motopicture.com/best-motorcycles-for-your-kids-or-for-commuting-to-work/?unapproved=21342&moderation-hash=e13398623c71b99c493ebd0957d5e3a3#comment-21342
    http://www.matt-ben.com/forums/viewtopic.php?f=4&t=287690
    http://my.jurnalotaku.com/contact-us/?contact-form-id=2755&contact-form-sent=120637&_wpnonce=f9ef927267
    http://compagnonsdarmes.fr/viewtopic.php?f=18&t=227356
    http://forum.verwaltungskostensenken.it/viewtopic.php?f=2&t=639878
    http://www.matt-ben.com/forums/viewtopic.php?f=4&t=287693
    http://psnow.es/foro/viewtopic.php?f=19&t=276786
    http://theloungeog.com/showthread.php?tid=24605&pid=88423#pid88423
    https://www.forum.7feetshipping.com/thread-412907.html
    https://aceverso.com/showthread.php?35802-106621413782538535438649750595894381-498390671500139702-747704381391116913&p=52261#post52261
    http://forumjudimania.com/showthread.php?tid=8683&pid=85444#pid85444
    http://khalidalshaikh-fans.com/forum/showthread.php?p=120389#post120389
    http://www.promnet.ru/forum/viewtopic.php?f=45&t=590206
    https://www.titaniumroleplay.com/showthread.php?tid=78847
    https://stretco.sk/forum/viewtopic.php?f=15&t=1296&p=148252#p148252
    https://forum.dbkgaming.de/viewtopic.php?f=12&t=222323
    http://twd-boardgame-expansion.mindtrip.at/viewtopic.php?f=5&t=785170
    http://www.marvid.biz/showthread.php?tid=112181&pid=320281#pid320281
    http://nauc.info/forums/viewtopic.php?f=3&t=12575505
    http://runeline.com/forum/index.php?/topic/142272-187885991426808217935481633391163157-189352504831449802-804093285251977567/
    http://midmomtb.com/viewtopic.php?f=8&t=921703
    http://forum.therealtymedics.com/viewtopic.php?f=5&t=507778
    http://tsreader.com/forum/viewtopic.php?f=2&t=298198&sid=07a158ba01bc18e00781efb8f3ab7f38
    http://persinforum.com/index.php?/topic/10106-528690514267129643878500078618842714-416951858544501254-390691384526842777/
    https://moorcam.com/forums/showthread.php?tid=752
    http://www.moremusic.es/forum/viewthread.php?thread_id=54208
    http://www.letechs.com/forum/showthread.php?tid=73&pid=221533#pid221533
    https://www.shadowconsortium.com/forums/index.php?/topic/13005-948216056321360495291981588198888571-890271870822162037-553001048306486150/
    https://forum.grandchase.co/index.php?/topic/4170-69236985831086197548055798181009894-914630597854131678-719000961693908182/
    http://forums.cacheonix.org/viewtopic.php?f=2&t=320133
    http://www.multiple-avenues.com/forums/showthread.php?1282-News-2019&p=161761&posted=1#post161761
    http://xenile.com/forum/viewtopic.php?f=1&t=1192211
    http://sjrpci.com/phpbb/viewtopic.php?f=3&t=11816

    http://www.google.co.th/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CDYQFjAB&url=http://1plus1serial.site/ http://www.google.co.tz/url?sa=i&rct=j&q=mohamed+matumla&source=images&cd=&docid=yuDfb_X7Gab40M&tbnid=RYy8i5d178GAsM:&ved=0CAUQjRw&url=http://1plus1serial.site/ http://www.google.com.cy/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=7&ved=0CFQQFjAG&url=http://1plus1serial.site/ http://www.google.com.kw/url?sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=2&cad=rja&uact=8&ved=0CCYQFjAB&url=http://1plus1serial.site/ http://www.google.com.mx/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CCYQFjAA&url=http://1plus1serial.site/
    http://www.pazzbot.net/cl/count.php?url=http://1plus1serial.site/ http://www.onegreatwork.net/c/?u=http://1plus1serial.site/ http://www.pelletsmoking.com/redirect-to/?redirect=http://1plus1serial.site/ http://www.pete2dakar.com/process/Redirect?url=http://1plus1serial.site/ http://www.photos.newocx.com/index.php?url=http://1plus1serial.site/ http://www.pequotyc.com/default.aspx?p=TrackHyperlink&url=http://1plus1serial.site/ http://www.philawyp.com/processurl.asp?url=http://1plus1serial.site/ http://www.photokonkurs.com/cgi-bin/out.cgi?id=lkpro&url=http://1plus1serial.site/ http://www.pist.tn/record/3/reviews/vote?ln=ar&comid=10&com_value=-1&do=od&ds=all&nb=100&p=1&referer=http://1plus1serial.site/ http://www.pismobeach.com/banner_ads/adredir.asp?url=http://1plus1serial.site/ http://www.plati-prosto.ru/go?http://1plus1serial.site/ http://www.ohi.org.tw/index/link.php?id=1&link=http://1plus1serial.site/ http://www.plevenon-meteo.info/livredor/signatux/redirect.php?p=http://1plus1serial.site/ http://www.pickyourownchristmastree.org/XMTRD.php?PAGGE=/WashingtonStateTreeRecyclingDisposal.php&NAME=&URL=http%3A%2F%2F1plus1serial.site%2F http://www.phoenix-motors.ru/bitrix/redirect.php?event1=&event2=&event3=&goto=http://1plus1serial.site/ http://www.plazaomega.ru/lx/r.php?id=2158&to=http://1plus1serial.site/ http://www.pohoroni.info/redirect.php?url=http://1plus1serial.site/ http://www.petprapa.com/?goto=http://1plus1serial.site/ http://www.pokermoscow.ru/go/?http://1plus1serial.site/ http://www.pianoya.com/pialink/rank.cgi?mode=link&id=833&url=http://1plus1serial.site/ http://www.pinhole-eyemask.jp/link/rank.cgi?mode=link&id=57&url=http://1plus1serial.site/ http://www.paynekillers.com/affiliates/?affout=1&go=http://1plus1serial.site/

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.