Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp660675rdb; Tue, 5 Dec 2023 16:43:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IFKOK6hmak2AiNcZFAHTpak/sZU3VcUkVbPsGCvUffwedS73Vo9/TsVy/9L39jKxeGvfvwp X-Received: by 2002:a05:6a00:10c9:b0:6ce:2757:7868 with SMTP id d9-20020a056a0010c900b006ce27577868mr2169920pfu.35.1701823419177; Tue, 05 Dec 2023 16:43:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701823419; cv=none; d=google.com; s=arc-20160816; b=akwxQUAXfnl29o0A97veD85zYbqtNAu7Xkvbu1098IbZxVeKhppwpswdJfZCpMo1co lK+geigqD2NoJLjtpdo+FvWUZop3EpR0H9/6XFNXkBXiizLpJOATGBbuy51nar1uiNYy x5ffAZ8ljnC2UebqwQ40NRJxwwm831MOJmkFdMRIYM7Q33qYSoSQdrDjfBbHwkSGKb6N 472PaNUFz0ARD41TZGgxLY916qam/nkfZiVaHc8L6IHmwh2SCfQap5Qu/J+/BA60QchH V0s/59I+cmxhtxHZWYFlfclZHs6z2cYU3vayBhvsVmt6J5JF0dHKzKYW37a1wajDcb+x tQew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=0CGpNMJzqHfBBmrth6e1MGteUUzf7hdy/lyzvmA95dY=; fh=Gja1l53NHGWw3VKCV8W+Bva9i36Wcy6254Az0jXKXgI=; b=ykjRAjJmHD4LLRljPL/YW4Ic0jvrikTW2IyXjvNe17ELFv3BtrF5iAe6AoDnrjPyoL c9GMRltgyB4uQZsbW0qOrbkwk38tR04qe9dzHaIkVzlmV7Kr0MKvnkJAk9xrXJ4kIsjC nFHG7qcfum4/soE9kZriwrWPDFJoXnDUgJEdkKCRF1yK82LOsjIJQJQ+UHYH7KgoNE8x 7lGoXVCba8nZGGq3yhwwRkzy9yYbPHtNK9cjJid1/Z9ou+3e6+s7sSyMjlc6pC54jTsU y4EQZujJhkku5vOPuiqXgCPqeLM0pLKwkl994JCWtrnejAbqZlYfj8L3wpSlap9IVabQ 7Fag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=QvTjp1Kl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id m16-20020a056a00081000b006cb6fb35b87si1123321pfk.94.2023.12.05.16.43.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Dec 2023 16:43:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=QvTjp1Kl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 3F0888145564; Tue, 5 Dec 2023 16:43:36 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376311AbjLFAnN (ORCPT + 99 others); Tue, 5 Dec 2023 19:43:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376296AbjLFAnM (ORCPT ); Tue, 5 Dec 2023 19:43:12 -0500 Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4A7E1C9 for ; Tue, 5 Dec 2023 16:43:16 -0800 (PST) Received: by mail-ed1-x529.google.com with SMTP id 4fb4d7f45d1cf-54c77d011acso2652a12.1 for ; Tue, 05 Dec 2023 16:43:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1701823395; x=1702428195; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=0CGpNMJzqHfBBmrth6e1MGteUUzf7hdy/lyzvmA95dY=; b=QvTjp1KlEWSQySGsfIuBlHX2OhzZ6h7tYxCZcNM+Q5LS9XTLc0ChHEP78AUt0qDsha KzixpmwLIzoF87f0S/AoLpsnp3LagWd5hlzSmCBmZ4Dw7ue7yV2SsNUDinmhi91UaEqY 8jjcA6sHmEHiJ07S7M6cfZrsPSJxd8BHReJzbYeWpWUsnu3W08X63VDzMp3V71dyYscr O+j7rB71uGXBloj74qhq+PoWiOzG+VN9/+ZDY2MQD4s9HCYElr/npFtHMpBVng5I0L55 K0bd062uyRJH9q3y1MudQyAQpIo78DkObbrDvs0kPHiSJ9GfPAwhO/QiolkD+PrLn4Io mo5g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701823395; x=1702428195; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0CGpNMJzqHfBBmrth6e1MGteUUzf7hdy/lyzvmA95dY=; b=daWvRzj/iuCCbqUrXzDh84ZZX88gnUeHog3YfEdJaN9lRp9fYJmrsJiWbXznpzq7Q4 iJWQhajyQYICuLvzXVTYW+ixaUtpxUPfko5TxpoHJ/3dbulGoiFb6cj9cQM7JisUqPPu ujzAXis8Z/UJ3WKaPuaOMafgPs5+mGs096FYA2cNewtbCU+Wkb6m+uDMmsS97XTIrMNX TixzQ6oLp2Tbp3ozdOMqlckvYIaSNYRIdBccG/sIE46HlrfnD1l2Fp7KXFcsfZem4Fe0 GiNy2tIWHpceo22tBGc/MN5/FzfpLFx+qMxwBDtPoes+UvRLRpr/KYxGq8vIfaya8lUV yi9g== X-Gm-Message-State: AOJu0YwMwH3B4Kd8AQT847+x57RQxujHb2FL+qiAdOn5c0o9T6HDlvWJ iJFBDycYVBJnvaExwaRYryyokdtbVjnKZ4Y/GEXBE+Oi6bcITXZEep9urlBE X-Received: by 2002:a50:c35d:0:b0:54c:79ed:a018 with SMTP id q29-20020a50c35d000000b0054c79eda018mr44800edb.2.1701823394564; Tue, 05 Dec 2023 16:43:14 -0800 (PST) MIME-Version: 1.0 References: <20231110220756.7hhiy36jc6jiu7nm@amd.com> <656e6f0aa1c5_4568a29451@dwillia2-xfh.jf.intel.com.notmuch> <656f82b4b1972_45e012944e@dwillia2-xfh.jf.intel.com.notmuch> <656fae221bf90_45e01294d2@dwillia2-xfh.jf.intel.com.notmuch> In-Reply-To: <656fae221bf90_45e01294d2@dwillia2-xfh.jf.intel.com.notmuch> From: Dionna Amalie Glaze Date: Tue, 5 Dec 2023 16:43:03 -0800 Message-ID: Subject: Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event To: Dan Williams Cc: Sean Christopherson , Michael Roth , Alexey Kardashevskiy , kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com, Brijesh Singh , dan.middleton@intel.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 05 Dec 2023 16:43:36 -0800 (PST) > So it's not only SBOM that you are concerned about, but instead want to > have a one stop shop for auxiliary evidence and get the vendors agree on > following the same GUID+blob precedent that is already there for the AMD > cert chain? That sounds reasonable, but I still feel it should be > limited to things that do not fit into an existing ABI namespace. > The tl;dr is I want something simple for a hard problem and I'll probably lose this argument. The unfortunate state of affairs here is that it is "vendor dependent" whatever pathway they choose to provide reference material for attestations. Even with the RATS framework, "reference value provider" is just a bubble in a diagram and not a federated service protocol that we've all agreed on. TCG's recommendation for delivering the RIM in the efi volume doesn't quite work in the cloud setting, since images own that and not us as the firmware provider. There's no standard for how to inform a user where to get a RIM other than that :( > ...unless its evidence / material that only a TVM would ever need. There's the rub. Evidence may be provided to the TVM to forward to verifiers, but really it's the verifiers that are tasked with gathering all this attestation collateral. The TVM doesn't have to do anything, even provide machine-specific certificates. That's pretty dreadful system design though, since you end up with global services in your hot path rather than getting cached data from the machine you're getting an attestation from. My first stab at it is to just have a storage bucket with objects named based on expected measurement values, so you just construct a URL and download the endorsement if you need it. I'd really rather just make that part of what the guest can get from auxblob since they pay the bandwidth of forwarding it to verifiers rather than my cost center paying for the storage bucket bandwidth (is this the real reason I'm pushing on this? I'm unsure). If you're instead asking if this information would need to get piped to a non-TVM (say, a non-confidential VM with a virtual TPM), then the answer is maa~aaa~aaybe but probably not. PCR0 in the cloud really needs its own profile, since the TCG platform firmware profile (PFP) is unsuitable. There's not a whole lot of point delivering a signed endorsement of a firmware measurement that we don't include in the event log anyway for stability reasons, even if that's against the PFP spec. So probably not. I think we're pretty clear that host-cached data would only need to be for TVMs. If you ask the folks I've been talking to at Intel or NVIDIA, they'd probably say to put a service in your dependencies and be done with it; it's the vendor's responsibility to provide an available enough service to provide all the evidence that an attestation verifier may want. That's quite unfriendly to the smaller players in the field, but maybe it's easy to integrate with something like Veraison's endorsement provisioning API [1] or Intel's Trust Authority (n=C3=A9e Project Amber). I haven't done it. [1] https://github.com/veraison/docs/tree/main/api/endorsement-provisioning --=20 -Dionna Glaze, PhD (she/her)