All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Michael S. Tsirkin" <mst@redhat.com>
To: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
Cc: Brijesh Singh <brijesh.singh@amd.com>,
	"libvir-list@redhat.com" <libvir-list@redhat.com>,
	"Relph, Richard" <Richard.Relph@amd.com>,
	"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>,
	"Lendacky, Thomas" <Thomas.Lendacky@amd.com>
Subject: Re: [Qemu-devel] libvirt/QEMU/SEV interaction
Date: Thu, 19 Oct 2017 04:35:35 +0300	[thread overview]
Message-ID: <20171019043254-mutt-send-email-mst@kernel.org> (raw)
In-Reply-To: <20171018191847.GF3225@work-vm>

On Wed, Oct 18, 2017 at 08:18:48PM +0100, Dr. David Alan Gilbert wrote:
> * Michael S. Tsirkin (mst@redhat.com) wrote:
> > On Fri, Sep 08, 2017 at 10:48:10AM -0500, Brijesh Singh wrote:
> > > > >      > 11. GO verifies the measurement and if measurement matches then it may
> > > > >      >  give a secret blob -- which must be injected into the guest before
> > > > >      >  libvirt starts the VM. If verification failed, GO will request cloud
> > > > >      >  provider to destroy the VM.
> > 
> > I realised I'm missing something here: how does GO limit the
> > secret to the specific VM? For example, what prevents hypervisor
> > from launching two VMs with the same GO's DH, getting measurement
> > from 1st one but injecting the secret into the second one?
> 
> Isn't that the 'trusted channel nonce currently associated with the
> guest' in the guest context?
> 
> Dave

Let me try to clarify the question. I understand that sometimes a key
is shared between VMs. If this is allowed, it seems that a hypervisor
can run any number of VMs with the same key. An unauthorised VM
will not get a measurement that guest owner authorizes, but
can the hypervisor get secret intended for an authorized VM and
then inject it into an unauthorized one sharing the same key?

> > Thanks,
> > 
> > -- 
> > MST
> > 
> --
> Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK

  reply	other threads:[~2017-10-19  1:35 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-09-08 11:57 [Qemu-devel] libvirt/QEMU/SEV interaction Brijesh Singh
2017-09-08 13:15 ` Daniel P. Berrange
2017-09-08 13:45   ` Relph, Richard
2017-09-08 14:52     ` Daniel P. Berrange
2017-09-08 15:48       ` Brijesh Singh
2017-09-08 15:51         ` Daniel P. Berrange
2017-09-08 16:10           ` Brijesh Singh
2017-09-08 16:11           ` Laszlo Ersek
2017-10-18  4:21         ` Michael S. Tsirkin
2017-10-18 19:18           ` Dr. David Alan Gilbert
2017-10-19  1:35             ` Michael S. Tsirkin [this message]
2017-10-20 14:26               ` Richard Relph
2017-09-18  9:43       ` [Qemu-devel] [libvirt] " Erik Skultety
2017-09-18  9:47         ` Daniel P. Berrange
2017-09-18 12:41           ` Richard Relph
2017-09-18 13:51             ` Erik Skultety
2017-09-26 14:36 ` [Qemu-devel] " Michael S. Tsirkin
2017-09-27 11:06   ` Dr. David Alan Gilbert
2017-09-27 13:39   ` Brijesh Singh
2017-09-27 16:12     ` Michael S. Tsirkin
2017-09-27 19:06       ` Richard Relph
2017-09-29 19:34         ` Michael S. Tsirkin
2017-09-29 19:48           ` Richard Relph
2017-09-29 20:07             ` Richard Relph
2017-09-29 21:35               ` Michael S. Tsirkin
2017-10-01  2:54               ` Michael S. Tsirkin
2017-10-01  2:59               ` Michael S. Tsirkin
2017-09-29 21:16             ` Michael S. Tsirkin
2017-09-29 22:15               ` Laszlo Ersek
2017-10-02  9:15               ` Daniel P. Berrange
2017-10-02  9:11             ` Daniel P. Berrange
2017-09-29 21:58         ` Laszlo Ersek
2017-10-01  0:09           ` Brijesh Singh
2017-10-01  9:17             ` Laszlo Ersek
2017-10-01  9:56               ` Laszlo Ersek
2017-10-03 16:03                 ` Brijesh Singh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171019043254-mutt-send-email-mst@kernel.org \
    --to=mst@redhat.com \
    --cc=Richard.Relph@amd.com \
    --cc=Thomas.Lendacky@amd.com \
    --cc=brijesh.singh@amd.com \
    --cc=dgilbert@redhat.com \
    --cc=libvir-list@redhat.com \
    --cc=qemu-devel@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.