23. April 2024 #1852
dimakuv
started this conversation in
Meeting notes
23. April 2024
#1852
Replies: 1 comment
-
Small correction: I think what I said (or at least meant) was this: Currently for us it's like "non-strict" -- P2 can open the file created (and closed) by P1, and the "strict" mode will disallow this, even though there was no attack from the host. So, it's oversensitive and is not backwards compatible. That "even though it allows a rollback attack" doesn't make much sense, right now we allow a multitude of replay attacks (but we limit them to a whole-file only). |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Agenda
(please write your proposed agenda items in comments under this discussion)
gramine-manifest-check
tool #1726Woju/Jinen: Release and #1726
Mona: at the other meeting (a week ago?), it was considered not yet fully reviewed so it was decided to move out to v1.8 (next-next release). However, this was not communicated to Woju and not updated in the open source roadmap of Gramine.
Jinen: there are two validation parts: first is testing applications from
master
branch, second is testing packaging (with light testing of applications). So the tool was not properly validated.Woju: what goes into the release and what not, is supposed to be decided (or clearly communicated) in the open-source meeting.
Mona: we can add this PR in the release, but it will not fail but only issue warnings.
Mona: we need to sync properly between the two groups, especially close to release dates.
Michael Steiner Discuss #1835
[ Michael Steiner shows a presentation ]
Gramine's Protected/Encrypted Files provide basic rollback protection -- for a single file and only during the open and until close
Propose phased approach:
Phase 1 implementation:
struct libos_encrypted_volume
which is a generalization of currentencryption_key
, associated with a FS mount pointMichal: what will be the default mode for this? Currently for us it's like "non-strict" -- P2 can open the file created (and closed) by P1, even though it allows a rollback attack. If we choose the default to be "strict", then P2 will fail, and it is backwards incompatible.
Michael continues presentation: multi-process will involve maintaining the struct in the process leader, and children always consult and update the leader via IPC. This is similar to file locking.
Dmitrii: EDMM bug(s) in the SGX driver
Dmitrii gave a quick explanation on two bugs found in EDMM flows of the SGX driver, and the current status -- both bugs are acknowledged by kernel devs, and the proposed fixes seem ok.
Beta Was this translation helpful? Give feedback.
All reactions