UKI, composefs and remote attestation for Bootable Containers

With Bootable Containers (bootc), we can place the operating system files inside a standard OCI container. This lets users modify the con...

That meant that programs on other computers could decide whether to talk to your computer based on whether they agreed with your choices about which code to run.

This process, called "#RemoteAttestation," is generally billed as a way to identify and block computers that have been compromised by malware, or to identify gamers who are running cheats and refuse to play with them.

9/

Achievement Unlocked:
Remote attestation with Keylime on RHEL. Whew!

#keylime #rhel #redhat #redhatenterpriselinux #remoteattestation #infosec #security

You get subjected to draconian tech like #DRM, #TrustedComputing, #RemoteAttestation and #PartsPairing in the name of protecting IP. What about your IP? The code you write, the paintings you make and even your online comments get fed into #AI and reproduced wholly or in part elsewhere, in the name of #fairuse. What is common to these seemingly contradictory, if not hypocritical measures? Those who promote it have the money to deploy them in mass and fight you in court if you challenge them.

#RemoteAttestation and #WebEnvironmentIntegrity are abstract but it boils down to this: in a conflict between what you want your browser to do and what some website wants from it, you should win. It’s yours, what you say goes.

https://t.co/UCNtY3a27Y

#WEI #OpenWeb #NoWEI #DRM

πŸ¦πŸ”—: https://nitter.oksocial.net/eff/status/1689049096341135360

[2023/08/08 23:01]

OKSocial: Twitter

Well, it finally happened to me. I was blocked out of a site I need for work because of #cloudflare. And I have no idea if or when I’ll be let back in.
https://jrhawley.ca/2023/08/07/blocked-by-cloudflare
For all the #internet #security people who think that #remoteattestation is a good idea, please reconsider. I already have all the security certificates and passwords I should need to access this site, but I was blocked anyway for some unknown reason probably related to browser fingerprinting.
Blocked by Cloudflare

Well, it finally happened to me. I was blocked out of a website I use for work because of Cloudflare. And I have no idea if or when I'll be...

Owner override also completely changed the calculus for another, even more dangerous part of Trusted Computing: #RemoteAttestation.

35/

Then it can cryptographically "sign" these observations, proving that they were made by a secure chip and not by something you could have modified. Then you can send this signed "attestation" to someone else, who can use it to determine how your computer is configured and thus whether to trust it. This is called "#RemoteAttestation."

46/

Then there are applications that are somewhere in between, like #RemoteAttestation (when the secure computer signs a computer-readable description of what your computer is doing so that you can prove things about your computer and its operation to people who don't trust you, but do trust that secure computer).

Remote attestation is the McGuffin of *Red Team Blues*, my latest novel, a crime-thriller about a #cryptocurrency heist.

44/

V. Narayanan et al., "emote attestation of SEV-SNP confidential VMs using e-vTPMs"ΒΉ

Departing from "your data is safe with us" model where the cloud infrastructure is trusted, cloud tenants are shifting towards a model in which the cloud provider is not part of the trust domain. Both silicon and cloud vendors are trying to address this shift by introducing confidential computing - an umbrella term that provides mechanisms for protecting the data in-use through encryption below the hardware boundary of the CPU, e.g., Intel Software Guard Extensions (SGX), AMD secure encrypted virtualization (SEV), Intel trust domain extensions (TDX), etc.
In this work, we design and implement a virtual trusted platform module (vTPM) that virtualizes the hardware root-of-trust without requiring to trust the cloud provider. To ensure the security of a vTPM in a provider-controlled environment, we leverage unique isolation properties of the SEV-SNP hardware and a novel approach to ephemeral TPM state management. Specifically, we develop a stateless ephemeral vTPM that supports remote attestation without persistent state. This allows us to pair each confidential VM with a private instance of a vTPM that is completely isolated from the provider-controlled environment and other VMs. We built our prototype entirely on open-source components - Qemu, Linux, and Keylime. Though our work is AMD-specific, a similar approach could be used to build remote attestation protocol on other trusted execution environments (TEE).

#arXiv #ResearchPapers #SEV-SNP #TPM #TDX #SGX #RemoteAttestation #Intel #AMD

__
ΒΉ https://arxiv.org/abs/2303.16463

Remote attestation of SEV-SNP confidential VMs using e-vTPMs

Departing from "your data is safe with us" model where the cloud infrastructure is trusted, cloud tenants are shifting towards a model in which the cloud provider is not part of the trust domain. Both silicon and cloud vendors are trying to address this shift by introducing confidential computing - an umbrella term that provides mechanisms for protecting the data in-use through encryption below the hardware boundary of the CPU, e.g., Intel Software Guard Extensions (SGX), AMD secure encrypted virtualization (SEV), Intel trust domain extensions (TDX), etc. In this work, we design and implement a virtual trusted platform module (vTPM) that virtualizes the hardware root-of-trust without requiring to trust the cloud provider. To ensure the security of a vTPM in a provider-controlled environment, we leverage unique isolation properties of the SEV-SNP hardware and a novel approach to ephemeral TPM state management. Specifically, we develop a stateless ephemeral vTPM that supports remote attestation without persistent state. This allows us to pair each confidential VM with a private instance of a vTPM that is completely isolated from the provider-controlled environment and other VMs. We built our prototype entirely on open-source components - Qemu, Linux, and Keylime. Though our work is AMD-specific, a similar approach could be used to build remote attestation protocol on other trusted execution environments (TEE).

arXiv.org