Reducing the accuracy of timers to mitigate Intel CPU flaw

General discussion and chat (archived)
User avatar
yereverluvinuncleber
Lunatic
Lunatic
Posts: 323
Joined: 2017-12-06, 21:25

Reducing the accuracy of timers to mitigate Intel CPU flaw

Unread post by yereverluvinuncleber » 2018-01-04, 19:43

Question:

Browser developers such as firefox are reducing the accuracy of timing functions as precise timing is required to exploit the Intel CPU side exploit flaw, reduction in timer accuracy means that drive-by web based exploits would be harder to carry out using javascript on the web.

Are the PaleMoon developers planning on doing the same? It seems to me that it would be a positive marketing change to do so as well as a sensible security precaution?

If it isn't done then two issues arise: Firstly, Firefox devs could point out that they are the only people who can be trusted to secure the web from exploits in the wild and as a result all should use real firefox instead of forks...
Secondly, that in not doing the change that browsers such as Palemoon are in fact potential Trojan Horses.

I would strongly suggest the the PM devs look at what Firefox are doing to mitigate web-based drive-by exploits and see if it can replicated in PM if only for the sake of looking good in the browser community and to the world in general. I am not a developer of these things so I cannot suggest more. It just needed to be raised.
Last edited by yereverluvinuncleber on 2018-01-04, 20:00, edited 1 time in total.
My skills technical & otherwise: VMS system manager 20 years. Fault Tolerance, clustering, Vax, Alpha and ftSparc. DCL, QB45, VB.NET, VB6, PHP, Javascript. Graphic Design, Project Management, CMS Web Design. DOS and Windows admin since 1985. Quad Audio Electronics update and repair. Rebuilding classic cars and motorcycles. Artist in watercolours. Historian. There's more.


User avatar
yereverluvinuncleber
Lunatic
Lunatic
Posts: 323
Joined: 2017-12-06, 21:25

Re: Reducing the accuracy of timers to mitigate Intel CPU flaw

Unread post by yereverluvinuncleber » 2018-01-04, 20:21

Thanks for that, I wasn't aware of topic no.2 - Mitigate Speculative Side-Channel Attack Techniques

I'm glad I'm on-stream - I hope the importance of this change is acknowledged by the Devs and when we implement it we do so loud and clear and make a fanfare of it too. A minor patch just for this would seem a good thing.
Last edited by yereverluvinuncleber on 2018-01-04, 20:25, edited 1 time in total.
My skills technical & otherwise: VMS system manager 20 years. Fault Tolerance, clustering, Vax, Alpha and ftSparc. DCL, QB45, VB.NET, VB6, PHP, Javascript. Graphic Design, Project Management, CMS Web Design. DOS and Windows admin since 1985. Quad Audio Electronics update and repair. Rebuilding classic cars and motorcycles. Artist in watercolours. Historian. There's more.

Locked