[qubes-devel] Re: [qubes-users] AMD Zen Secure Encrypted Virtualization (SEV)

2020-01-02 Thread Lorenzo Lamas
So now more than 3 years have passed. Researchers have release a whitepaper 
on attacking SEV, and AMD released SEV-ES in response. Is SEV on Qubes any 
closer?

On Wednesday, August 31, 2016 at 3:34:30 PM UTC+2, Joanna Rutkowska wrote:
>
> -BEGIN PGP SIGNED MESSAGE- 
> Hash: SHA256 
>
> On Fri, Aug 19, 2016 at 11:58:18AM -0700, kev27 wrote: 
> > > Secure Encrypted Virtualization (SEV) integrates main memory 
> encryption 
> > > capabilities with the existing AMD-V virtualization architecture to 
> support 
> > > encrypted virtual machines. Encrypting virtual machines can help 
> protect 
> > > them not only from physical threats but also from other virtual 
> machines or 
> > > even the hypervisor itself. SEV thus represents a new virtualization 
> > > security paradigm that is particularly applicable to cloud computing 
> where 
> > > virtual machines need not fully trust the hypervisor and administrator 
> of 
> > > their host system. 
> > 
> > 
> http://amd-dev.wpengine.netdna-cdn.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf
>  
> > 
> > https://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf 
> > 
>
> Thanks for the pointers. Next time I suggest to send such stuff to 
> qubes-devel ;) 
>
> > Is this something Qubes OS could work with in the future to improve its 
> security on AMD Zen chips? Maybe something to keep an eye on. 
>
> Maybe. For either SGX or SEV to make sense for Qubes OS (i.e. a desktop 
> OS) it 
> would need to allow some form of protected HID/video from/to the 
> SGX/SEV-protected VM. Currently none of these technologies seem to support 
> this. 
> Specifically the white paper you referenced explicitly states: 
>
> > One important consideration for an SEV-enabled guest is that DMA into 
> guest 
> > encrypted memory is not allowed by the SEV hardware for security 
> reasons. All 
> > DMA, whether from a real hardware or a HV emulated device, must occur to 
> > shared guest memory. The guest OS can therefore choose to allocate 
> memory 
> > pages for DMA as shared (C-bit clear), or may copy data to/from a 
> special 
> > buffer (aka “bounce buffer”) for DMA purposes. Some operating systems 
> have 
> > existing support for bounce buffers which may be used for this purpose, 
> such 
> > as the swiotlb Linux functionality. 
>
> It's thinkable that the IOMMU could transparently decrypt DMAs (from 
> select) 
> devices, allowing communication between these devices (XHCI, GPU) and the 
> protected guest, without the hypervisor being able to sniff or inject the 
> data 
> (e.g. the actual keystrokes, framebuffers). Let's hope they do that one 
> day. 
>
> Cheers, 
> joanna. 
> -BEGIN PGP SIGNATURE- 
>
> iQIcBAEBCAAGBQJXxtzVAAoJEDOT2L8N3GcYSiYQAL69fzVC4PVInuGNeXPPkhN0 
> qr8ahmRzDCZECi/b26fqfWZ/GrW9sf569m0cVT8VImL3Ki0gvV2WPcqiCypNjX6E 
> dMQKKnPmkNAbTpKFtv6IIDsC3PxdtvGjcLXSr/R123DLNpbN2/IN5MvrrYCEhfDz 
> CpI6YuSzWLwLAEk/MoEfm3Dk+ninRsLY+2bt0YVwfTj2X7/Q+p0VPCY2ImtL1h3k 
> OhvYCtIKkMTAvrY4t0gV9Ndm3UNxHAHslZkl9Kcj6Gqp/mkC1GXCK1KemolCcLQE 
> MvW9NUlhscpVYYIBmExnQPOPLb8eyD1DqxiZC0FaJz/UxQUCHhLaX6RCqr4MHqQX 
> ytPPeNXW/Q3jgfgNewVslbwEOkehWWZgATKuHRMB6W3d/dXtcct7DDSBcqk8pCTr 
> jn5Bq55zjylMvRE46seIFR4T4lRNVGsSeKe90N5ouO31v51q9fLAUWoEvF6/4rKA 
> d8m/OrbtZf9DFCCXIsVXdTVI6fDzBDKAZSZOlgSpDTiApZyTfOZox6K2rPXO3RuN 
> cI3Wf36aCH6gDMJciDOMbWMa2Gf5NxjJJhZ+PXDiqTxIJlf8yzLu2nAvEcGv3XIh 
> EWQL6sKNxb4xFgRYCZn4Ekl8vBy9/0rYqpxdhSclg9BX5vJGhrCb6XxHfY6yjRJl 
> ToSrhIQPHr1JUZfCqcDv 
> =JJWX 
> -END PGP SIGNATURE- 
>

Seems to be implemented now: "Support for hardware devices (network, 
storage, graphics cards) to access encrypted pages seamlessly through DMA.¨
https://www.servethehome.com/amd-epyc-7002-series-rome-delivers-a-knockout/4/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/565c03bc-f076-436a-9526-d5e25707d185%40googlegroups.com.


[qubes-devel] Re: Announcement: Recommended Fedora 25 TemplateVM Upgrade for Qubes 3.2

2017-08-04 Thread Lorenzo Lamas
Because Fedora 25 has a newer version of NetworkManager, can the same method 
for MAC randomization for Debian now be used for Fedora instead of using 
macchanger as described here?
https://www.qubes-os.org/doc/anonymizing-your-mac-address/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/2f0cb08b-5254-4fb5-a7e3-bd6956cd5ec9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.