On Tue, May 10, 2016 at 01:23:35PM +0200, Paolo Bonzini wrote: > It can send plaintext packets that will be stored encrypted in memory. > (Of course the hypervisor can do that too if it has access to the guest > network). And then what? You need to find out where exactly (which pages) got the packets. If at all. I don't think you can do that from another VM, you probably are more lucky if you're the hypervisor. But I'm no security guy so I'm genuinely asking... In any case, it sounds hard to do. > And that's great! However, it is very different from "virtual machines > need not fully trust the hypervisor and administrator of their host > system" as said in the whitepaper. You know, those documents can be corrected ... :) > SEV protects pretty well from sibling VMs, but by design > this generation of SEV leaks a lot of information to an evil > host---probably more than enough to mount a ROP attack or to do evil > stuff that Andy outlined. > > My problem is that people will read AMD's whitepaper, not your message > on LKML, and may put more trust in SEV than (for now) they should. So if people rely on only one security feature, then they get what they deserve. And even non-security people like me know that proper security is layering of multiple features/mechanisms which should take care of aspects only, not of everything. And not a single magic wand which makes sh*t secure. :) So let's please get real: the feature is pretty elegant IMO and gives you a lot more security than before. Can it be made better/cover more aspects? Absolutely and it is a safe bet that it will be. You don't just implement stuff like that in hw to not improve on it in future iterations. It is like with all hardware features, they get improved with time and CPU revisions. Now, can people please look at the actual code and complain about stuff that bothers them codewise? We've tried to make it as unobtrusive as possible to the rest of the kernel but improvement suggestions are always welcome! :-) Thanks. -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html