* SVSM Development Call - June 12th, 2024
@ 2024-06-11 20:46 Claudio Siqueira de Carvalho
2024-06-12 10:00 ` [svsm-devel] " Stefano Garzarella
2024-06-12 12:20 ` James Bottomley
0 siblings, 2 replies; 5+ messages in thread
From: Claudio Siqueira de Carvalho @ 2024-06-11 20:46 UTC (permalink / raw)
To: linux-coco@lists.linux.dev, svsm-devel@coconut-svsm.dev
Cc: James.Bottomley@HansenPartnership.com, joro@8bytes.org
Hi,
I would like to add two topics to the SVSM meeting agenda:
- What does TPM locality[1] mean for the SVSM vTPM?
- Is there any SVSM boot event that we want to record in the TPM PCRs/Event log?
E.g. a SVSM configuration, the OVMF hash, etc
[1]
https://trustedcomputinggroup.org/wp-content/uploads/PC-Client-Specific-Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf
Thanks,
Claudio
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [svsm-devel] SVSM Development Call - June 12th, 2024
2024-06-11 20:46 SVSM Development Call - June 12th, 2024 Claudio Siqueira de Carvalho
@ 2024-06-12 10:00 ` Stefano Garzarella
2024-06-12 10:22 ` Yao, Jiewen
2024-06-12 12:29 ` James Bottomley
2024-06-12 12:20 ` James Bottomley
1 sibling, 2 replies; 5+ messages in thread
From: Stefano Garzarella @ 2024-06-12 10:00 UTC (permalink / raw)
To: Claudio Siqueira de Carvalho
Cc: linux-coco@lists.linux.dev, svsm-devel@coconut-svsm.dev,
James.Bottomley@HansenPartnership.com
Hi Claudio,
On Tue, Jun 11, 2024 at 10:46 PM Claudio Siqueira de Carvalho
<cclaudio@ibm.com> wrote:
>
> Hi,
>
> I would like to add two topics to the SVSM meeting agenda:
I won't be able to participate in today's call because I'm on my way
to Brno for DevConf, so I post a few thoughts below.
>
> - What does TPM locality[1] mean for the SVSM vTPM?
Interesting, IIUC an example could be to use different "localities"
for SVSM itself, edk2, kernel, etc. right ?
> - Is there any SVSM boot event that we want to record in the TPM PCRs/Event log?
> E.g. a SVSM configuration, the OVMF hash, etc
Talking with Daniel, it seems that now EDK2 is self-measuring itself
in PCR0, so maybe it would be better to do this in SVSM.
So it would be nice to have SVSM measuring itself in PCR0, SVSM
measuring EDK2 in PCR0, and EDK2 stopping doing it.
Obviously SVSM and EDK2 are already measured by the SNP attestation
report, so it's not a blocking thing for now, since the guest OS can
use that mechanism to measure them.
Thanks for raising these topics!
Stefano
>
> [1]
> https://trustedcomputinggroup.org/wp-content/uploads/PC-Client-Specific-Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf
>
> Thanks,
> Claudio
> --
> Svsm-devel mailing list
> Svsm-devel@coconut-svsm.dev
> https://mail.8bytes.org/cgi-bin/mailman/listinfo/svsm-devel
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: [svsm-devel] SVSM Development Call - June 12th, 2024
2024-06-12 10:00 ` [svsm-devel] " Stefano Garzarella
@ 2024-06-12 10:22 ` Yao, Jiewen
2024-06-12 12:29 ` James Bottomley
1 sibling, 0 replies; 5+ messages in thread
From: Yao, Jiewen @ 2024-06-12 10:22 UTC (permalink / raw)
To: Stefano Garzarella, Claudio Siqueira de Carvalho
Cc: James.Bottomley@HansenPartnership.com, linux-coco@lists.linux.dev,
svsm-devel@coconut-svsm.dev
Comment below:
> -----Original Message-----
> From: Svsm-devel <svsm-devel-bounces@coconut-svsm.dev> On Behalf Of
> Stefano Garzarella
> Sent: Wednesday, June 12, 2024 6:01 PM
> To: Claudio Siqueira de Carvalho <cclaudio@ibm.com>
> Cc: James.Bottomley@HansenPartnership.com; linux-coco@lists.linux.dev; svsm-
> devel@coconut-svsm.dev
> Subject: Re: [svsm-devel] SVSM Development Call - June 12th, 2024
>
> Hi Claudio,
>
> On Tue, Jun 11, 2024 at 10:46 PM Claudio Siqueira de Carvalho
> <cclaudio@ibm.com> wrote:
> >
> > Hi,
> >
> > I would like to add two topics to the SVSM meeting agenda:
>
> I won't be able to participate in today's call because I'm on my way
> to Brno for DevConf, so I post a few thoughts below.
>
> >
> > - What does TPM locality[1] mean for the SVSM vTPM?
>
> Interesting, IIUC an example could be to use different "localities"
> for SVSM itself, edk2, kernel, etc. right ?
[Jiewen] The main usage of TPM locality is to support DRTM model, but not SRTM.
I am not sure the value to support locality if we just adopt SRTM.
>
> > - Is there any SVSM boot event that we want to record in the TPM PCRs/Event
> log?
> > E.g. a SVSM configuration, the OVMF hash, etc
>
> Talking with Daniel, it seems that now EDK2 is self-measuring itself
> in PCR0, so maybe it would be better to do this in SVSM.
> So it would be nice to have SVSM measuring itself in PCR0, SVSM
> measuring EDK2 in PCR0, and EDK2 stopping doing it.
[Jiewen] Yes. Intel is working on a patch to let SVSM measure EDK2 OVMF directly to PCR[0].
With this change, the EDK2 OVMF over SVSM will skip the PCR[0] measurement but only create event log.
>
> Obviously SVSM and EDK2 are already measured by the SNP attestation
> report, so it's not a blocking thing for now, since the guest OS can
> use that mechanism to measure them.
>
> Thanks for raising these topics!
> Stefano
>
> >
> > [1]
> > https://trustedcomputinggroup.org/wp-content/uploads/PC-Client-Specific-
> Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf
> >
> > Thanks,
> > Claudio
> > --
> > Svsm-devel mailing list
> > Svsm-devel@coconut-svsm.dev
> > https://mail.8bytes.org/cgi-bin/mailman/listinfo/svsm-devel
> >
>
> --
> Svsm-devel mailing list
> Svsm-devel@coconut-svsm.dev
> https://mail.8bytes.org/cgi-bin/mailman/listinfo/svsm-devel
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: SVSM Development Call - June 12th, 2024
2024-06-11 20:46 SVSM Development Call - June 12th, 2024 Claudio Siqueira de Carvalho
2024-06-12 10:00 ` [svsm-devel] " Stefano Garzarella
@ 2024-06-12 12:20 ` James Bottomley
1 sibling, 0 replies; 5+ messages in thread
From: James Bottomley @ 2024-06-12 12:20 UTC (permalink / raw)
To: Claudio Siqueira de Carvalho, linux-coco@lists.linux.dev,
svsm-devel@coconut-svsm.dev
Cc: joro@8bytes.org
On Tue, 2024-06-11 at 20:46 +0000, Claudio Siqueira de Carvalho wrote:
> Hi,
>
> I would like to add two topics to the SVSM meeting agenda:
>
> - What does TPM locality[1] mean for the SVSM vTPM?
Well, unlike the physical TPM, which is locked to locality zero unless
you do a dynamic launch, the SVSM vTPM protocol supports any locality
(in that way it's the same as a vTPM attached to a VM). This would
allow us to operate userspace and the kernel at different localities
meaning there could be key sealing policies that won't allow a key to
unseal in the userspace locality (i.e. kernel only). Adding
functionality like this doesn't require the SVSM to police localities
(the kernel does it).
Policing localities is more problematic for the SVSM. It means that
the SVSM must ensure that a particular locality request comes from a
particular trust level. For instance in a dynamic launch, the TIS TPM
polices localities by replicating register access pages (one for each
locality) and then the chipset blocks access to some of them as the
boot continues.
The problem for the SVSM-vTPM is that it's hard to employ this type of
access sealing mechanism without an additional command and enlightening
all the OS components to use it, so unless there's a reason to reserve
a locality exclusively for the SVSM (say to unseal a provided secret
only for it)
> - Is there any SVSM boot event that we want to record in the TPM
> PCRs/Event log?
> E.g. a SVSM configuration, the OVMF hash, etc
OVMF records all the mandatory TCG measured boot events, including its
own measurement. This, unfortunately, includes the static core root of
trust (SCRT) measurement, which is supposed to be the first entry. We
could still add preceding SVSM measurements, but this would be a
technical spec violation.
Probably what needs to happen is that the SVSM-vTPM should be
responsible for the SCRT Measurement and OVMF should detect the
presence of the SVSM and assume it's been done. That would give us
scope for adding the SVSM configuration to the SCRT measurement.
Regards,
James
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [svsm-devel] SVSM Development Call - June 12th, 2024
2024-06-12 10:00 ` [svsm-devel] " Stefano Garzarella
2024-06-12 10:22 ` Yao, Jiewen
@ 2024-06-12 12:29 ` James Bottomley
1 sibling, 0 replies; 5+ messages in thread
From: James Bottomley @ 2024-06-12 12:29 UTC (permalink / raw)
To: Stefano Garzarella, Claudio Siqueira de Carvalho
Cc: linux-coco@lists.linux.dev, svsm-devel@coconut-svsm.dev
On Wed, 2024-06-12 at 12:00 +0200, Stefano Garzarella wrote:
> Hi Claudio,
>
> On Tue, Jun 11, 2024 at 10:46 PM Claudio Siqueira de Carvalho
> <cclaudio@ibm.com> wrote:
> >
> > Hi,
> >
> > I would like to add two topics to the SVSM meeting agenda:
>
> I won't be able to participate in today's call because I'm on my way
> to Brno for DevConf, so I post a few thoughts below.
>
> >
> > - What does TPM locality[1] mean for the SVSM vTPM?
>
> Interesting, IIUC an example could be to use different "localities"
> for SVSM itself, edk2, kernel, etc. right ?
>
> > - Is there any SVSM boot event that we want to record in the TPM
> > PCRs/Event log? E.g. a SVSM configuration, the OVMF hash, etc
>
> Talking with Daniel, it seems that now EDK2 is self-measuring itself
> in PCR0, so maybe it would be better to do this in SVSM.
> So it would be nice to have SVSM measuring itself in PCR0, SVSM
> measuring EDK2 in PCR0, and EDK2 stopping doing it.
Actually, that's not quite how it should work. edk2 has a 3 phase
measurement sequence: the SEC phase which is the current static root of
trust adds a self measurement then measures PEI (actually this is a bit
of a lie: that's what the spec says EFI is supposed to do, but not what
OVMF actually does because SEC originally didn't have the cryptographic
ability to do a measurement) and hands off to it. PEI eventually
measures DXE and hands off to it. To keep the sequence correct, the
SVSM-vTPM should really only measure SEC before handing off to it.
What really happens is that PEI adds both the SCRT measurement and its
own measurement and then measures DXE. I've asked several times if we
could fix this, because it really is a measured boot hole.
James
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2024-06-12 12:29 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-06-11 20:46 SVSM Development Call - June 12th, 2024 Claudio Siqueira de Carvalho
2024-06-12 10:00 ` [svsm-devel] " Stefano Garzarella
2024-06-12 10:22 ` Yao, Jiewen
2024-06-12 12:29 ` James Bottomley
2024-06-12 12:20 ` James Bottomley
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).