[RFC PATCH v1 2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux
Dr. Greg
greg at enjellic.com
Thu Jun 13 07:25:39 UTC 2019
On Wed, Jun 12, 2019 at 07:25:57AM -0700, Sean Christopherson wrote:
Good morning, we hope the week continues to go well for everyone.
> On Wed, Jun 12, 2019 at 04:32:21AM -0500, Dr. Greg wrote:
> > With SGX2 we will, by necessity, have to admit the notion that a
> > platform owner will not have any effective visibility into code that
> > is loaded and executed, since it can come in over a secured network
> > connection in an enclave security context. This advocates for the
> > simplest approach possible to providing some type of regulation to any
> > form of WX page access.
> I believe we're all on the same page in the sense that we all want
> the "simplest approach possible", but there's a sliding scale of
> complexity between the kernel and userspace. We can make life
> simple for userspace at the cost of additional complexity in the
> kernel, and vice versa. The disagreement is over where to shove the
> extra complexity.
Yes, we are certainly cognizant of and sympathetic to the engineering
tensions involved.
The purpose of our e-mail was to leaven the discussion with the notion
that the most important question is how much complexity should be
shoved in either direction. With respect to SGX as a technology, the
most important engineering metric is how much effective security is
actually being achieved.
Given an admission that enclave dynamic memory management (EDMM/SGX2)
is the goal in all of this, there are only two effective security
questions to be answered:
1.) Should a corpus of known memory with executable permissions be
copied into to an enclave.
2.) Should a corpus of executable memory with unknown content be
available to an enclave.
Given the functionality that SGX implements, both questions ultimately
devolve to whether or not a platform owner trusts an enclave author.
Security relevant trust is conveyed through cryptographically mediated
mechanisms.
The decision has been made to take full hardware mediated
cryptographic trust off the table for the mainstream Linux
implementation. Given that, the most pragmatic engineering solution
would seem to be to implement the least complex implementation that
allows a platform owner to answer the two questions above.
See below.
> > Current state of the art, and there doesn't appear to be a reason to
> > change this, is to package an enclave in the form of an ELF shared
> > library. It seems straight forward to inherit and act on page
> > privileges from the privileges specified on the ELF sections that are
> > loaded. Loaders will have a file descriptor available so an mmap of
> > the incoming page with the specified privileges should trigger the
> > required LSM interventions and tie them to a specific enclave.
> >
> > The current enclave 'standard' also uses layout metadata, stored in a
> > special .notes section of the shared image, to direct a loader with
> > respect to construction of the enclave stack, heap, TCS and other
> > miscellaneous regions not directly coded by the ELF TEXT sections. It
> > seems straight forward to extend this paradigm to declare region(s) of
> > an enclave that are eligible to be generated at runtime (EAUG'ed) with
> > the RWX protections needed to support dynamically loaded code.
> >
> > If an enclave wishes to support this functionality, it would seem
> > straight forward to require an enclave to provide a single zero page
> > which the loader will mmap with those protections in order to trigger
> > the desired LSM checks against that specific enclave.
> This is effectively #1, e.g. would require userspace to pre-declare its
> intent to make regions W->X.
Yes, we understood that when we wrote our original e-mail.
This model effectively allows the two relevant security questions to
be easily answered and is most consistent with current enclave
formats, software practices and runtimes. It is also largely
consistent with existing LSM practices.
There hasn't been any discussion with respect to backports of this
driver but we believe it it safe to conclude that the industry is
going to be at least two years away from any type of realistic
deployments of this driver. By that time there will be over a half a
decade of software deployment of existing API's and enclave formats.
Expecting a 'flag day' to be successful would seem to be contrary to
all known history of software practice and would thus disadvantage
Linux as an effective platform for this technology.
Best wishes for a productive remainder of the week to everyone.
Dr. Greg
As always,
Dr. G.W. Wettstein, Ph.D. Enjellic Systems Development, LLC.
4206 N. 19th Ave. Specializing in information infra-structure
Fargo, ND 58102 development.
PH: 701-281-1686 EMAIL: greg at enjellic.com
------------------------------------------------------------------------------
"Sometimes I sing and dance around the house in my underwear,
doesn't make me Madonna, never will.
-- Cyn
Working Girl
More information about the Linux-security-module-archive
mailing list