Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Fractal Design Meshify 2 Compact chassis review
Sabrent Rocket 4 PLUS 2TB NVMe SSD review
MSI Radeon RX 6900 XT GAMING X TRIO review
Guru3D Q1 Winter 20/21 PC Buyer Guide
AOC CU34G2X monitor review
Silicon Power UD70 PCIe 3.0 NVMe SSD review
Patriot Viper Steel RGB 3600 MHz (2x 16GB) review
ClockTuner 2.0 for Ryzen (CTR) Guide
Silicon Power US70 PCIe 4.0 NVMe review
Guru3D Rig of the Month - January 2021

New Downloads
AIDA64 Download Version 6.32.5640 beta
CrystalDiskInfo 8.11.2 Download
AMD Radeon Adrenalin Edition 21.2.3 driver download
GPU-Z Download v2.37.0
Intel HD graphics Driver Download Version: DCH27.20.100.9313
HWiNFO Download v6.43 - 4380 Beta
AMD Radeon Adrenalin Edition 21.2.2 driver download
3DMark Download v2.17.7137 + Time Spy
PCMark 10 Download v.2.1.2508
Media Player Classic - Home Cinema v1.9.9 Download


New Forum Topics
Epic Games settles Fortnite and Rocket League lootboxes NVIDIA: Rainbow Six Siege Players Test NVIDIA Reflex and Two new DLSS Titles AMD to announce Radeon RX 6700 Series upcoming March 3rd Diablo 2 Resurrected PC requirements Wheres this months driver? Fry's Electronics closes all 31 stores - permanently AMD is investigating USB problems with 500 series chipsets Microsoft To Share More Details on Microsoft DirectStorage for PC in April GeForce 461.40 WHQL drivers: download & discussion New Upcoming ATI/AMD GPU's Thread: Leaks, Hopes & Aftermarket GPU's




Guru3D.com » News » Chrome version 67 Add on Site Isolation as standard for protection against Spectre

Chrome version 67 Add on Site Isolation as standard for protection against Spectre

by Hilbert Hagedoorn on: 07/15/2018 07:14 AM | source: Google | 41 comment(s)
Chrome version 67 Add on Site Isolation as standard for protection against Spectre

Ever since the Intel processor vulnerabilities got exposed, Google has been working hard to to protect the Chrome browser against security vulnerabilities. The company now achieved a final solution, by implementing a function called Site Isolation.

-- Google -- Speculative execution side-channel attacks like Spectre are a newly discovered security risk for web browsers. A website could use such attacks to steal data or login information from other websites that are open in the browser. To better mitigate these attacks, we're excited to announce that Chrome 67 has enabled a security feature called Site Isolation on Windows, Mac, Linux, and Chrome OS. Site Isolation has been optionally available as an experimental enterprise policy since Chrome 63, but many known issues have been resolved since then, making it practical to enable by default for all desktop Chrome users.

This launch is one phase of our overall Site Isolation project. Stay tuned for additional security updates that will mitigate attacks beyond Spectre (e.g., attacks from fully compromised renderer processes).

What is Spectre?

In January, Google Project Zero disclosed a set of speculative execution side-channel attacks that became publicly known as Spectre and Meltdown. An additional variant of Spectre was disclosed in May. These attacks use the speculative execution features of most CPUs to access parts of memory that should be off-limits to a piece of code, and then use timing attacks to discover the values stored in that memory. Effectively, this means that untrustworthy code may be able to read any memory in its process's address space.

This is particularly relevant for web browsers, since browsers run potentially malicious JavaScript code from multiple websites, often in the same process. In theory, a website could use such an attack to steal information from other websites, violating the Same Origin Policy. All major browsers have already deployed some mitigations for Spectre, including reducing timer granularity and changing their JavaScript compilers to make the attacks less likely to succeed. However, we believe the most effective mitigation is offered by approaches like Site Isolation, which try to avoid having data worth stealing in the same process, even if a Spectre attack occurs.


What is Site Isolation?

Site Isolation is a large change to Chrome's architecture that limits each renderer process to documents from a single site. As a result, Chrome can rely on the operating system to prevent attacks between processes, and thus, between sites. Note that Chrome uses a specific definition of "site" that includes just the scheme and registered domain. Thus, https://google.co.uk would be a site, and subdomains like https://maps.google.co.uk would stay in the same process.

Chrome has always had a multi-process architecture where different tabs could use different renderer processes. A given tab could even switch processes when navigating to a new site in some cases. However, it was still possible for an attacker's page to share a process with a victim's page. For example, cross-site iframes and cross-site pop-ups typically stayed in the same process as the page that created them. This would allow a successful Spectre attack to read data (e.g., cookies, passwords, etc.) belonging to other frames or pop-ups in its process.

When Site Isolation is enabled, each renderer process contains documents from at most one site. This means all navigations to cross-site documents cause a tab to switch processes. It also means all cross-site iframes are put into a different process than their parent frame, using "out-of-process iframes." Splitting a single page across multiple processes is a major change to how Chrome works, and the Chrome Security team has been pursuing this for several years, independently of Spectre. The first uses of out-of-process iframes shipped last year to improve the Chrome extension security model.

In Chrome 67, Site Isolation has been enabled for 99% of users on Windows, Mac, Linux, and Chrome OS. (Given the large scope of this change, we are keeping a 1% holdback for now to monitor and improve performance.) This means that even if a Spectre attack were to occur in a malicious web page, data from other websites would generally not be loaded into the same process, and so there would be much less data available to the attacker. This significantly reduces the threat posed by Spectre.



Chrome version 67 Add on Site Isolation as standard for protection against Spectre




« Cougar Launches the Cougar Turret · Chrome version 67 Add on Site Isolation as standard for protection against Spectre · Microsoft advocates regulation for facial recognition »

9 pages 1 2 3 4 > »


HonoredShadow
Senior Member



Posts: 4280
Joined: 2007-05-27

#5565028 Posted on: 07/15/2018 11:20 AM
Does it have much effect to performance? i don't care about memory just performace being on a Intel NUC.

I'm also new to Chrome. If I paste that into the address bar does it automatically disable it? When I do paste it shows disabled in the box. So i'm guessing it's off already.

Thanks for any help.

Labyrinth
Senior Member



Posts: 4370
Joined: 2008-07-15

#5565029 Posted on: 07/15/2018 11:25 AM
Does it have much effect to performance? i don't care about memory just performace being on a Intel NUC.

I'm also new to Chrome. If I paste that into the address bar does it automatically disable it? When I do paste it shows disabled in the box. So i'm guessing it's off already.

Thanks for any help.

It's off for me too, the command just helps to find it quickly.
I wonder if it stays off if a PC is already protected from Spectre?

Also found this (no idea if it's true)

The critical Meltdown and Spectre bugs baked deep into modern computer processors will have ramifications on the entire industry for years to come, and Chrome just became collateral damage. Google 67 enabled “Site Isolation” Spectre protection for most users, and the browser now uses 10 to 13 percent more RAM due to how the fix behaves.

https://www.pcworld.com/article/3289749/browsers/chrome-more-ram-google-site-isolation-spectre-cpu-flaws.html

Koniakki
Senior Member



Posts: 2843
Joined: 2009-09-15

#5565037 Posted on: 07/15/2018 12:41 PM
I have customized the flags to my liking but is this(haven't read upon it yet) something completely different compared to Strict Site Isolation?

Btw this will be fun to test on Chrome with 250-300 tabs consuming 15-17GB of ram! :P

GreenAlien
Member



Posts: 61
Joined: 2012-07-30

#5565064 Posted on: 07/15/2018 03:05 PM
With this, do we still need the costly spectre microcode update?

Sylencer
Member



Posts: 99
Joined: 2015-05-23

#5565065 Posted on: 07/15/2018 03:19 PM
It does affect performance in flash-based Games. Not by much but if you want fast loading etc.. - it makes a difference.

9 pages 1 2 3 4 > »


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2021