But how the virtual machine verify its host?
But how the virtual machine verify its host?
Posted Jan 3, 2021 8:47 UTC (Sun) by moxfyre (guest, #13847)Parent article: Challenges in protecting virtual machines from untrusted entities
All of this technology sounds fascinating, if cumbersome to implement.
But here's what I don't understand: how can a VM possibly verify that it's running under a "trusted entity" which takes pains not to be able to access the guest's secret data, as opposed to a standard omniscient hypervisor — or more pointedly a malicious hypervisor which pretends to be a "trusted entity"?
If the VM can't actually verify its host environment's construction, then… what's the point?
It seems to come down to "trusting your cloud/VM hosting provider not to do leaky or malicious things", which is about where we are anyway.
Posted Jan 5, 2021 0:23 UTC (Tue)
by moxfyre (guest, #13847)
[Link] (3 responses)
Posted Jan 6, 2021 10:54 UTC (Wed)
by penguin42 (guest, #72294)
[Link]
Posted Jan 6, 2021 10:54 UTC (Wed)
by kashyap (subscriber, #55821)
[Link]
And indeed, since the "trusted entity" is the hardware, so you're placing trust in the CPU/SoC. I'll let more clueful people than me to correct me or add further details.
Posted Jan 6, 2021 19:44 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link]
Based on this very interesting blog post from James Bottomley (https://blog.hansenpartnership.com/deploying-encrypted-images-for-confidential-computing)… it appears that this is, essentially, a rather complex scheme that — if it works correctly — means that the VM/guest owners have to place very little trust in the cloud provider, but a lot of trust in the CPU/SoC manufacturer.
But how will the virtual machine verify its host?
But how will the virtual machine verify its host?
back to the CPU vendor, and you have to trust the CPU vendor to have implemented the mechanism.
To your first comment, it's not necessarily that the guest can verify it's running under a trusted entity - it's that a 3rd party (running outside the potentially dodgy cloud) can verify that the VM they're talking to is running in a trusted setup before you give that VM work or a secret that is then used to do something.
But how will the virtual machine verify its host?
But how will the virtual machine verify its host?