public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Shiva V <shivaramakrishnan740@gmail.com>
To: kvm@vger.kernel.org
Subject: Re: Integrity in untrusted environments
Date: Fri, 1 Aug 2014 15:43:19 +0000 (UTC)	[thread overview]
Message-ID: <loom.20140801T173017-509@post.gmane.org> (raw)
In-Reply-To: 53DB38B6.1080405@redhat.com

Paolo Bonzini <pbonzini <at> redhat.com> writes
>
 Hello,
 I am exploring ideas to implement a service inside a virtual machine on 
 untrusted hypervisors under current cloud infrastructures.
 Particularly, I am interested how one can verify the integrity of the 
 service in an environment where hypervisor is not trusted. This is my 
setup.
 
 1. I have two virtual machines. (Normal client VM's).
 2. VM-A is executing a service and VM-B wants to verify its integrity.
 3. Both are executing on untrusted hypervisor.
 
 Though, Intel SGX will solve this, by using the concept of enclaves, its 
not 
 publicly available yet.
 
One could also use SMM to verify the integrity. But since this is time based 
approach, one could easily exploit between the time window.

 I was drilling down this idea, We know Write xor Execute Memory Protection 
 Scheme. Using this idea,If we could lock down the VM-A memory pages where 
 the service is running and also corresponding page-table entries, then have 
 a handler code that temporarily unlocks them for legitimate updates, then 
 one could verify the integrity of the service running. 

> You can make a malicious hypervisor that makes all executable pages also
 writable, but hides the fact to the running process.  But really, if you
 control the hypervisor you can just write to guest memory as you wish.

 SMM will be emulated by the hypervisor.
If the hypervisor is untrusted, you cannot solve _everything_.  For the
third time, what attacks are you trying to protect from?
 
 Paolo


Thanks Paolo, I was considering all critical attacks possible that a client 
virtual machine could have under the untrusted hypervisor scenarios. For 
example,Memory based,Hypervisor based and few major side channel attacks. I 
am ignoring the network based attacks for the time being. 
And one more question to your reply. I did'nt understand as to what you were 
trying to describe here 
"You can make a malicious hypervisor that makes all executable pages also 
writable, but hides the fact to the running process.  But really, if you 
control the hypervisor you can just write to guest memory as you wish"

This is my understanding, Correct me if I am wrong here. 
If we lock down the code pages of genuine hypervisor as I discussed before, 
Isn't it sufficent? Because essentially hypervisor is the one that handles 
the traps from the virtual machines for execution.So, even if the hypervisor 
wishes to write to the client virtual machine, it will be captured since the 
memory pages of the hypervisor is locked down and is essentially non 
bypassable.





      reply	other threads:[~2014-08-01 15:43 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-31 21:25 Integrity in untrusted environments Shiva V
2014-07-31 21:40 ` Nakajima, Jun
2014-07-31 22:19   ` Shiva V
2014-08-01  6:50 ` Paolo Bonzini
2014-08-01 15:43   ` Shiva V [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=loom.20140801T173017-509@post.gmane.org \
    --to=shivaramakrishnan740@gmail.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox