[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20171227204645.GA14201@amd>
Date: Wed, 27 Dec 2017 21:46:45 +0100
From: Pavel Machek <pavel@....cz>
To: greg@...ellic.com
Cc: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
platform-driver-x86@...r.kernel.org, x86@...nel.org,
linux-kernel@...r.kernel.org, Borislav Petkov <bp@...e.de>,
"David S. Miller" <davem@...emloft.net>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Grzegorz Andrejczuk <grzegorz.andrejczuk@...el.com>,
Haim Cohen <haim.cohen@...el.com>,
Ingo Molnar <mingo@...nel.org>,
Janakarajan Natarajan <Janakarajan.Natarajan@....com>,
Jim Mattson <jmattson@...gle.com>,
Kan Liang <Kan.liang@...el.com>,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Kyle Huey <me@...ehuey.com>, Len Brown <len.brown@...el.com>,
"open list:DOCUMENTATION" <linux-doc@...r.kernel.org>,
"open list:FILESYSTEMS (VFS and infrastructure)"
<linux-fsdevel@...r.kernel.org>,
Mauro Carvalho Chehab <mchehab@...nel.org>,
Paolo Bonzini <pbonzini@...hat.com>,
Piotr Luc <piotr.luc@...el.com>,
Radim Kr??m???? <rkrcmar@...hat.com>,
Randy Dunlap <rdunlap@...radead.org>,
Sean Christopherson <sean.j.christopherson@...el.com>,
Thomas Gleixner <tglx@...utronix.de>,
Tom Lendacky <thomas.lendacky@....com>,
Vikas Shivappa <vikas.shivappa@...ux.intel.com>
Subject: Re: [PATCH v6 00/11] Intel SGX Driver
Hi!
> > Would you list guarantees provided by SGX?
>
> Obviously, confidentiality and integrity. SGX was designed to address
> an Iago threat model, a very difficult challenge to address in
> reality.
Do you have link on "Iago threat model"?
> I don't have the citation immediately available, but a bit-flip attack
> has also been described on enclaves. Due to the nature of the
> architecture, they tend to crash the enclave so they are more in the
> category of a denial-of-service attack, rather then a functional
> confidentiality or integrity compromise.
So ... even with SGX, host can generate bitflips in the enclave,
right?
People usually assume that bitflip will lead "only" to
denial-of-service, but rowhammer work shows that even "random" bit
flips easily lead to priviledge escalation on javascript virtual
machines, and in similar way you can get root if you have user and bit
flips happen.
So... I believe we should assume compromise is possible, not just
denial-of-service.
> Unfortunately, in the security field it is way more fun, and seemingly
> advantageous from a reputational perspective, to break things then to
> build solutions.... :-)(
Well, yes :-). And I believe someone is going to have fun with SGX
;-).
Pavel
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
Download attachment "signature.asc" of type "application/pgp-signature" (182 bytes)
Powered by blists - more mailing lists