Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp925331rwr; Thu, 27 Apr 2023 09:50:31 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7nYa+JbX3R4qsFmM2RvGvyDbuY3BDPn5u7zTnbDwYrkwpAQROZFN29p76HXbVvccF7zaiQ X-Received: by 2002:a05:6a00:4009:b0:63b:4978:a50a with SMTP id by9-20020a056a00400900b0063b4978a50amr3051573pfb.1.1682614230747; Thu, 27 Apr 2023 09:50:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682614230; cv=none; d=google.com; s=arc-20160816; b=dbQzLUIiMCehfveVaQBz8v+8PfnHoSWdIpjGaqfiAnKZrmVTNBYzDYfrICZzpFJi0J AKbFi53ykJ4wxwWTPjNDPPHfBIsbVge2Y9uUhmkHu6jt7v4x2jKPNkdFDFzfBgZP20hN Mvtqnbjuz3SxSxmF1u0a89PBsOOSJAXtHMy4LqKdww4iuVTOMLk4+6SfFMpQWzTDx2lw wbVClidL/RW+o20wMExl94O9PZ0ay7RmEqa9EDoBQVMnDULQidzXZDxaqcFL9YwtSWxU rsnARgRnOFjC1GwFvhEDXEnrgM4JuTS/jxYoowTnFbSErZyi2iIDGrbneDZltTty1fi+ HgKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=oCSISiBhQ6jeXLv+1vbq+8sBDufgGTcMCBny1IuJcBA=; b=TmFLxtXQmyP+vJVtqn/FQgM2AY2iOtxEQV6cT5c04Wa8+lI/etQb9AhYdXcmlJXV0S J4vYvu0+s3kJasWecyP9FE0DkQXceG/IvHLH4OegsQSUPy4nbMmdaevNTWtLEZcvEgbB wMgt/dCR4x6dPMyBk/LtcB9NHo2Vl22Ik1IM4i39w9xQ8pUbgvFZKaR8/mLDniJsswQ9 I67Ww9W6UzE9+FqfMs608FD+tK8o1cCNqjj+9SsbE8RYhtgKeFBTpZKETxvw79+e2GTc KyMmxbWQYG5Qd/ckjAQrfl4oKKgkXqDOjlEAcocVj/HGdi66Wv7LCLqr7N9O55vqgOel 4bbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=jPsj+NvQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x26-20020aa79a5a000000b0063b78674625si18752134pfj.327.2023.04.27.09.50.19; Thu, 27 Apr 2023 09:50:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=jPsj+NvQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244102AbjD0Qqx (ORCPT + 99 others); Thu, 27 Apr 2023 12:46:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38662 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243734AbjD0Qqv (ORCPT ); Thu, 27 Apr 2023 12:46:51 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4DF9E40DA; Thu, 27 Apr 2023 09:46:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Sender:Reply-To:Content-ID:Content-Description; bh=oCSISiBhQ6jeXLv+1vbq+8sBDufgGTcMCBny1IuJcBA=; b=jPsj+NvQ6JhhLQOlQGZSpOSoFr KyvtLIUbux6Rwe0+w+gjmpnSfXrPp34k1WkvkKBE9b5M706N29HEe9G9ldQxTljzBljfUyzwT+rGO qfXD/yWxb8ZRl+Xi+gfMh/WEYtiTyW6s9TL3PMod9pj12JgOCnn5POjk3LG9SKsspbG6selS3z+lQ s//+wQsCVdBOQXP+ZozIMEseKUhCtJCt2FECNCitS+r/gMoG8dU/pFr3vFPxxwI/d01vyNEI3gOja GWQaiHW31r6ACZz9qrwUIHfb65TjChiIKvKz1ZOnYX0t5aOYZlsw3HRHBO3XAWYPpzV74sWZDnow1 sPOaNYUw==; Received: from [2601:1c2:980:9ec0::2764] by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1ps4lQ-0071jA-18; Thu, 27 Apr 2023 16:46:36 +0000 Message-ID: <8ebcfabb-0be3-f45c-c4f8-99ebc34f658e@infradead.org> Date: Thu, 27 Apr 2023 09:46:31 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH] docs: security: Confidential computing intro and threat model Content-Language: en-US To: jejb@linux.ibm.com, "Reshetova, Elena" , "Christopherson, , Sean" Cc: Carlos Bilbao , "corbet@lwn.net" , "linux-doc@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "ardb@kernel.org" , "kraxel@redhat.com" , "dovmurik@linux.ibm.com" , "dave.hansen@linux.intel.com" , "Dhaval.Giani@amd.com" , "michael.day@amd.com" , "pavankumar.paluri@amd.com" , "David.Kaplan@amd.com" , "Reshma.Lal@amd.com" , "Jeremy.Powell@amd.com" , "sathyanarayanan.kuppuswamy@linux.intel.com" , "alexander.shishkin@linux.intel.com" , "thomas.lendacky@amd.com" , "tglx@linutronix.de" , "dgilbert@redhat.com" , "gregkh@linuxfoundation.org" , "dinechin@redhat.com" , "linux-coco@lists.linux.dev" , "berrange@redhat.com" , "mst@redhat.com" , "tytso@mit.edu" , "jikos@kernel.org" , "joro@8bytes.org" , "leon@kernel.org" , "richard.weinberger@gmail.com" , "lukas@wunner.de" , "cdupontd@redhat.com" , "jasowang@redhat.com" , "sameo@rivosinc.com" , "bp@alien8.de" , "security@kernel.org" , Andrew Bresticker , Rajnesh Kanwal , Dylan Reid , Ravi Sahita References: <20230327141816.2648615-1-carlos.bilbao@amd.com> <7502e1af0615c08167076ff452fc69ebf316c730.camel@linux.ibm.com> <8f212b0dfa9eb00ccc7acc5bf1483c9615277590.camel@linux.ibm.com> From: Randy Dunlap In-Reply-To: <8f212b0dfa9eb00ccc7acc5bf1483c9615277590.camel@linux.ibm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/27/23 09:16, James Bottomley wrote: > Public but not open source is still a problem. The federal government > has walked into several cloud accounts demanding a source code security > review, which means the code was made public to them but not generally. Apparently we have different definitions of "public". I don't call that public. > Without all customers or some third party being able to build the code > and verify it (or ideally supply it ... think something like Red Hat > built the OVMF code this cloud is using and you can prove it using > their build signatures) how do you know the source you're given > corresponds to the binary the signature verifies. -- ~Randy