Re: [RFC PATCH v3 0/4] security/x86/sgx: SGX specific LSM hooks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 7/8/2019 8:55 AM, Sean Christopherson wrote:
On Sun, Jul 07, 2019 at 04:41:30PM -0700, Cedric Xing wrote:
...

different FSMs to govern page protection transitions. Implementation wise, his
model also imposes unwanted restrictions specifically to SGX2, such as:
   · Complicated/Restricted UAPI – Enclave loaders are required to provide

I don't think "complicated" is a fair assessment.  For SGX1 enclaves it's
literally a direct propagation of the SECINFO RWX flags.

True only for SGX1.
     “maximal protection” at page load time, but such information is NOT always
     available. For example, Graphene containers may run different applications
     comprised of different set of executables and/or shared objects. Some of
     them may contain self-modifying code (or text relocation) while others
     don’t. The generic enclave loader usually doesn’t have such information so
     wouldn’t be able to provide it ahead of time.

I'm unconvinced that it would be remotely difficult to teach an enclave
loader that an enclave or hosted application employs SMC, relocation or
any other behavior that would require declaring RWX on all pages.

You've been talking as if "enclave loader" is tailored to the enclave it is loading. But in reality "enclave loader" is usually a library knowing usually nothing about the enclave. How could it know if an enclave contains self-modifying code?

   · Inefficient Auditing – Audit logs are supposed to help system
     administrators to determine the set of minimally needed permissions and to
     detect abnormal behaviors. But consider the “maximal protection” model, if
     “maximal protection” is set to be too permissive, then audit log wouldn’t
     be able to detect anomalies;

Huh?  Declaring overly permissive protections is only problematic if an
LSM denies the permission, in which case it will generate an accurate
audit log.

If the enclave/loader "requires" a permission it doesn't actually need,
e.g. EXECDIRTY, then it's a software bug that should be fixed.  I don't
see how this scenario is any different than an application that uses
assembly code without 'noexecstack' and inadvertantly "requires"
EXECSTACK due to triggering "read implies exec".  In both cases the
denied permission is unnecessary due to a userspace application bug.

You see, you've been assuming "enclave loader" knows everything and tailored to what it loads in a particular application. But the reality is the loader is generic and probably shared by multiple applications. It needs some generic way to figure out the "maximal protection". An implementation could use information embedded in the enclave file, or could just be "configurable". In the former case, you put extra burdens on the build tools, while in the latter case, your audit logs cannot help generating an appropriate configuration.

     or if “maximal protection” is too restrictive,
     then audit log cannot identify the file violating the policy.

Maximal protections that are too restrictive are completely orthogonal to
LSMs as the enclave would fail to run irrespective of LSMs.  This is no
different than specifying the wrong RWX flags in SECINFO, or opening a
file as RO instead of RW.

Say loader is configurable. By looking at the log, can an administrator tell which file has too restrictive "maximal protection"?

In either case the audit log cannot fulfill its purposes.
   · Inability to support #PF driven EPC allocation in SGX2 – For those
     unfamiliar with SGX2 software flows, an SGX2 enclave requests a page by
     issuing EACCEPT on the address that a new page is wanted, and the resulted
     #PF is expected to be handled by the kernel by EAUG’ing an EPC page at the
     fault address, and then the enclave would be resumed and the faulting
     EACCEPT retried, and succeed. The key requirement is to allow mmap()’ing
     non-existing enclave pages so that the SGX module/subsystem could respond
     to #PFs by EAUG’ing new pages. Sean’s implementation doesn’t allow
     mmap()’ing non-existing pages for variety of reasons and therefore blocks
     this major SGX2 usage.

This is simply wrong.  The key requirement in the theoretical EAUG scheme
is to mmap() pages that have not been added to the _hardware_ maintained
enclave.  The pages (or some optimized representation of a range of pages)
would exist in the kernel's software mode of the enclave.

You are right. Code can always change. My assessment was made on what's in your patch.

The key point here is your patch is more complicated than it seems because you've been hand-waving on imminent requirements.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux