lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <DM8PR11MB575068AC229C410A9FA5F3AAE736A@DM8PR11MB5750.namprd11.prod.outlook.com>
Date:   Wed, 12 Jul 2023 06:14:41 +0000
From:   "Reshetova, Elena" <elena.reshetova@...el.com>
To:     Greg KH <gregkh@...uxfoundation.org>,
        Carlos Bilbao <carlos.bilbao@....com>
CC:     "corbet@....net" <corbet@....net>,
        "linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "ardb@...nel.org" <ardb@...nel.org>,
        "kraxel@...hat.com" <kraxel@...hat.com>,
        "dovmurik@...ux.ibm.com" <dovmurik@...ux.ibm.com>,
        "dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>,
        "Dhaval.Giani@....com" <Dhaval.Giani@....com>,
        "michael.day@....com" <michael.day@....com>,
        "pavankumar.paluri@....com" <pavankumar.paluri@....com>,
        "David.Kaplan@....com" <David.Kaplan@....com>,
        "Reshma.Lal@....com" <Reshma.Lal@....com>,
        "Jeremy.Powell@....com" <Jeremy.Powell@....com>,
        "sathyanarayanan.kuppuswamy@...ux.intel.com" 
        <sathyanarayanan.kuppuswamy@...ux.intel.com>,
        "alexander.shishkin@...ux.intel.com" 
        <alexander.shishkin@...ux.intel.com>,
        "thomas.lendacky@....com" <thomas.lendacky@....com>,
        "tglx@...utronix.de" <tglx@...utronix.de>,
        "dgilbert@...hat.com" <dgilbert@...hat.com>,
        "dinechin@...hat.com" <dinechin@...hat.com>,
        "linux-coco@...ts.linux.dev" <linux-coco@...ts.linux.dev>,
        "berrange@...hat.com" <berrange@...hat.com>,
        "mst@...hat.com" <mst@...hat.com>, "tytso@....edu" <tytso@....edu>,
        "jikos@...nel.org" <jikos@...nel.org>,
        "joro@...tes.org" <joro@...tes.org>,
        "leon@...nel.org" <leon@...nel.org>,
        "richard.weinberger@...il.com" <richard.weinberger@...il.com>,
        "lukas@...ner.de" <lukas@...ner.de>,
        "jejb@...ux.ibm.com" <jejb@...ux.ibm.com>,
        "cdupontd@...hat.com" <cdupontd@...hat.com>,
        "jasowang@...hat.com" <jasowang@...hat.com>,
        "sameo@...osinc.com" <sameo@...osinc.com>,
        "bp@...en8.de" <bp@...en8.de>,
        "Christopherson,, Sean" <seanjc@...gle.com>,
        "security@...nel.org" <security@...nel.org>,
        Larry Dewey <larry.dewey@....com>
Subject: RE: [PATCH v3] docs: security: Confidential computing intro and
 threat model for x86 virtualization

> On Tue, Jul 11, 2023 at 09:12:57AM -0500, Carlos Bilbao wrote:
> > Kernel developers working on confidential computing for virtualized
> > environments in x86 operate under a set of assumptions regarding the Linux
> > kernel threat model that differs from the traditional view. Historically,
> > the Linux threat model acknowledges attackers residing in userspace, as
> > well as a limited set of external attackers that are able to interact with
> > the kernel through networking or limited HW-specific exposed interfaces
> > (e.g. USB, thunderbolt). The goal of this document is to explain additional
> > attack vectors that arise in the virtualized confidential computing space
> > and discuss the proposed protection mechanisms for the Linux kernel.
> 
> When you have a "and" in a changelog text, that's a huge hint that it
> needs to be split up into multiple patches.
> 
> And that's the case here, you want to do two things, describe your crazy
> model of different attack vectors AND propose new ways to protect from
> them.

Actually if you read the full doc we are not proposing *yet* any *concrete* new
mechanisms of protecting against these attack vectors that would require
kernel patches. These are indeed going to come later with the code changes
as you highlight below. What we *do* discuss below is high-level mitigation
strategies that wont make sense to include in the actual patches, because
some of these mitigations wont need *any* new patches to linux. For example,
the first attack we have is " Guest malicious configuration", where the
misbehaving host modifies one of the guest's configuration (kernel binary, 
command line, etc). The general mitigation for this attack vector is a way 
to authenticate/attest this configuration and it is mostly transparent for the
kernel. So, we either need to drop this attack description fully form the doc
(and this would result in questions from people not familiar with CoCo: why
do you try to harden the kernel apis when you don’t describe how kernel
binary integrity is protected), or we leave it in for an overall picture to provide
context and justify the overall reasoning. 

That said we can rewrite the sentence that you commented upon not to create
confusion (I do agree it can be misinterpreted the way you pointed out):

"The goal of this document is to explain additional
attack vectors that arise in the virtualized confidential computing space,
as well as highlight the overall mitigation strategies that can used
to address them.
The concrete mechanisms, if determined needed for Linux,
will be described in the future extensions of this document, together with the
code that implements them".

Does this address your concern? 

Best Regards,
Elena

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ