In order to avoid the asm.js disaster we should investigate whether wasm complies with our design requirements. It got [in Firefox 52] but [in ESR 52].
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Changing the description so that others don't need to read comments to know about this.
Trac: Description: In order to avoid the asm.js disaster we should investigate whether wasm complies with our design requirements. It got enabled in Firefox 52 (and presumably in ESR 52 as well): https://bugzilla.mozilla.org/show_bug.cgi?id=1342060.
to
In order to avoid the asm.js disaster we should investigate whether wasm complies with our design requirements. It got [in Firefox 52] but [in ESR 52].
Thanks. Cherry-picked to tor-browser-60.1.0esr-8.0-1 (commit 3c6862f6cc8a7dc59b9eba41638100638ecb33b0). Setting back to new for the investigation part.
Trac: Keywords: TorBrowserTeam201808R deleted, TorBrowserTeam201808 added Status: needs_review to new
I think we could bypass the investigation for HTTPS Everywhere (and extensions in general) at least by assuming it belongs to privileged code (which it does) and that the linkability etc. concerns only applies to content (which I think is not unreasonable). The idea then could be to implement a switch to being able to disable WASM and similar things (ASM.js comes to mind) for content only while leaving chrome like code untouched.
Or maybe the chrome/content separation already exists and WebExtensions are just not properly added to the chrome bucket?
@gk I'm concerned that extensions are a single-click install in most cases, and privileging them in general will open identifiable characteristics to possibly irresponsible third parties. Can we whitelist WASM by extension ID?
@gk I'm concerned that extensions are a single-click install in most cases, and privileging them in general will open identifiable characteristics to possibly irresponsible third parties. Can we whitelist WASM by extension ID?
Maybe. However, the current policy is that users are responsible themselves for possible fallout if they are installing other extensions into their Tor Browser. This is not recommended for all sorts of reasons.
Webextensions got already "privileged" by allowing JavaScript to run in general if it is disabled in the browser (you might remember https://bugzilla.mozilla.org/show_bug.cgi?id=1329731). I think it is more straightforward to follow the reasoning dveditz outlined in https://bugzilla.mozilla.org/show_bug.cgi?id=1329731#c7 arguing that disabling WASM for extensions (while allowing it for the remaining parts of the privileged browser) is not the right solution.
FWIW: that Mozilla bug might be a good start for investigating how to enable WASM for extensions only but not content (by checking the principal accordingly).
Oh, and one additional point: we might want to have some WebExtensions exceptions on the higher levels of the security slider for things like JIT (see: #23719 (moved)) which is kind of related.
Update: in https://github.com/EFForg/https-everywhere/pull/18093, HTTPS Everywhere includes WASM optimizations. So Tor Browser would see an OOTB performance increase and memory overhead decrease by enabling WASM in extension-land.
We have #23719 (moved) for the slider related things and this bug for the general enabling. Talking to Luke I think we are in good shape (surprise!) and nothing stood out. One thing that remains to test is whether New Identity is actually blowing away WASM related cache in case someone used Tor Browser outside of Private Browsing Mode (there are no WASM cache entries written to disk in that mode).
Okay, I started from the beginning, and then worked backwards :)
This was tedious because most of the initial patches were simply refactoring asmjs compiler code such that the code could be shared with wasm. Reading these patches was helpful except the code has significantly changed since four years ago (and wasm has mostly replaced asmjs in the codebase now). As an example, the compiler cached asmjs code until earlier this year. I'm taking a different approach now, but I'll post this anyway. The next comments will be based on the current implementation.
WebAssembly.compile is for ahead-of-time compiling a WASM module. It takes in a buffer of WASM and returns a Promise of a WebAssembly.Module.
WebAssembly.compileStreaming is similar to compile() except it takes in a Response object or Promise for a wasm module (compared with a buffer containing the module).
WebAssembly.instantiate has two prototypes.
The first takes in a buffer of WASM and returns a Promise of a tuple: (WebAssembly.Module, WebAssembly.Instance). The Module is the compiled WASM, and the Instance is an instantiation of that Module.
The second takes in an existing WebAssembly.Module (already compiled WASM) and returns an Instance.
WebAssembly.instantiateStreaming takes in a a Response object or Promise (like compileStreaming) and returns a Promise of a tuple: (WebAssembly.Module, WebAssembly.Instance) like instantiate().
WebAssembly.validate() takes in a buffer of WASM binary code and returns a boolean true if the buffer contained valid wasm, and false otherwise.
WebAssembly.Global is an object containing a WASM "global" variable. Multiple Global instances may be passed into WebAssembly.instantiate(), but these globals are only accessible by WASM if they are explicitly "imported" by the WASM Module.
WebAssembly.Instance is an instance of a Module initialized with Global and/or Memory instances.
WebAssembly.Memory().buffer is an ArrayBuffer representing the "heap" memory available in the WASM module. This is readable and writable by both JavaScript and WASM. From WASM, pointers are represented by an index of the Memory ArrayBuffer.
WebAssembly.Table is an "array-like" structure storing function-references. In the future, Tables may store more than only function-references. Tables allow calling arbitrary functions from WASM (after the WASM module assigns a function-reference at an index in the table). It seems like this provides a level of abstraction compared with exporting a function from WASM into JavaScript, because function-references can be added/deleted/modified in the Table at run-time.
I don't see any significant fingerprinting or linkability issues in the wasm implementation. I don't see any caching across principals. There is a minor fingerprinting risk due to timing leaks (how quickly the wasm byte code is returned as a Module), and how quickly a wasm function is executed. There is the additional risk of malicious byte code exploiting a compiler bug. However, these seem no worse than the existing javascript attack surface - wasm simply adds more options.
Looks good. Merged to master (Torbutton) as commit 324e8fd7f73c7f97f8174713c6a112ec75669e56 and tor-browser-68.2.0-9.5-1 (tor-browser) as commit 80134f6a3d2026ff95943e806cb424bf9eff2c2f.
Nice review work!
Trac: Status: needs_review to closed Resolution: N/Ato fixed