[apache/incubator-teaclave] Fix rpc build error for app mode (#347)

2020-06-10 Thread luoyanhua2011
## Description Fix build error when app depend teaclave_proto You can view, comment on, or merge this pull request online at: https://github.com/apache/incubator-teaclave/pull/347 -- Commit Summary -- * Fix rpc build error for app mode -- File Changes -- M rpc/Cargo.toml (3) M rpc

[apache/incubator-teaclave] Add an example of RSA signature (#348)

2020-06-10 Thread renxingliang
## Description Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. Fixes # (issue) ## Type of change (select or add applied and delete the others) - [ ] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-b

Implications of SGAxe?

2020-06-10 Thread Matt Sicker
https://cacheoutattack.com/ With all these practical attacks in place for Intel (and AMD to a different extent), what do you think the future of SGX and its competitors will look like? Are there plans on supporting other hardware enclaves that may be more secure (if they exist)? -- Matt Sicker

[apache/incubator-teaclave] [crypto] Read/Write files as small chunks (#349)

2020-06-10 Thread Qinkun Bao
## Description Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. Fixes # (issue) ## Type of change (select or add applied and delete the others) - [ ] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-b

Re: Implications of SGAxe?

2020-06-10 Thread Yu Ding
>From what I understand, SGAxe is still utilizing TSX to leak data from LFB. It's not a problem of SGX, but a problem of TSX. TSX breaks the security guarantees provided by SGX, or VMX. The TSX problem is not limited to attacking SGX, but also stealing memory from Dom0 in Xen, or memory from the k

[apache/incubator-teaclave-sgx-sdk] Add checks for untrusted memory allocation result. (#247)

2020-06-10 Thread Zhaofeng Chen
You can view, comment on, or merge this pull request online at: https://github.com/apache/incubator-teaclave-sgx-sdk/pull/247 -- Commit Summary -- * Add checks for untrusted memory allocation result. -- File Changes -- M sgx_libc/src/linux/x86_64/ocall.rs (12) -- Patch Links -- http

Re: [apache/incubator-teaclave-sgx-sdk] Add checks for untrusted memory allocation result. (#247)

2020-06-10 Thread Yu Ding
Merged #247 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave-sgx-sdk/pull/247#event-3431670812

Re: Implications of SGAxe?

2020-06-10 Thread Mingshen Sun
Hi Matt, Thanks for bringing up this issue. Regardless of this specific attack itself, let me answer another frequently asked question about supporting other hardware enclaves. Actually, we have investigated other hardware enclaves for a long time. The following are commonly mentioned hardware TE

Re: Implications of SGAxe?

2020-06-10 Thread Mingshen Sun
BTW, maybe we can write a blog about the implication of recent side channel attacks in SGX. But we need some time to survey this problem and collect enough materials. On Wed, Jun 10, 2020 at 3:18 PM Mingshen Sun wrote: > > Hi Matt, > > Thanks for bringing up this issue. Regardless of this specifi

Re: [apache/incubator-teaclave] [function] Add Private Join And Compute (#345)

2020-06-10 Thread Mingshen Sun
Merged #345 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/345#event-3431863069

Re: [apache/incubator-teaclave] [function] Add Private Join And Compute (#345)

2020-06-10 Thread Qinkun Bao
Thanks for your help! -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/345#issuecomment-642325363

Re: Implications of SGAxe?

2020-06-10 Thread Matt Sicker
Thanks for the explanations everyone! And a blog post sounds like a great idea. On Wed, 10 Jun 2020 at 17:50, Mingshen Sun wrote: > > BTW, maybe we can write a blog about the implication of recent side > channel attacks in SGX. But we need some time to survey this problem > and collect enough mat

Re: [apache/incubator-teaclave] Fix rpc build error for app mode (#347)

2020-06-10 Thread Mingshen Sun
Merged #347 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/347#event-3431965537

[apache/incubator-teaclave] [docs] fix some typos (#350)

2020-06-10 Thread Qinkun Bao
#127 Description Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. Fixes # (issue) ## Type of change (select or add applied and delete the others) - [ ] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (no

Re: [apache/incubator-teaclave] [docs] fix some typos (#350)

2020-06-10 Thread Mingshen Sun
Merged #350 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/350#event-3432057615

[apache/incubator-teaclave] Only allow info log for release build and triage log levels (#351)

2020-06-10 Thread Mingshen Sun
## Description - Only allow info log for release build and triage log levels Note that this feature can control a compile time filter (https://docs.rs/log/0.4.8/log/#compile-time-filters). Also, for log levels, I found that most `info!` are `debug!` and some are `error!`. Please don't misuse

Re: [apache/incubator-teaclave] Only allow info log for release build and triage log levels (#351)

2020-06-10 Thread Mingshen Sun
CI passed: https://ci.mesalock-linux.org/mssun/incubator-mesatee/927/ -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/351#issuecomment-642389974

Re: [apache/incubator-teaclave] Only allow info log for release build and triage log levels (#351)

2020-06-10 Thread Mingshen Sun
Merged #351 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/351#event-3432407760