TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Confidential VMs

181 pointsby cautionalmost 5 years ago

21 comments

kop316almost 5 years ago
Does anyone know what mode of AES that SEV (or SME) uses?<p>I have been reading though all of AMD&#x27;s documents, and I cannot find what mode of AES that SEV (or SME) uses. I find it extremely odd that this is not called out in any of AMD&#x27;s documents, and frankly a bit worrisome.<p>For the record, &quot;A Comparison Study of Intel SGX and AMD Memory Encryption&quot; [1] claims a modified version of AES-ECB is what SEV uses, BUT their reference links to AMD&#x27;s whitepaper [2], which does NOT say anything about their mode, so I do not consider [1] to be a trustworty resouce.<p>[1] <a href="https:&#x2F;&#x2F;caslab.csl.yale.edu&#x2F;workshops&#x2F;hasp2018&#x2F;HASP18_a9-mofrad_slides.pdf" rel="nofollow">https:&#x2F;&#x2F;caslab.csl.yale.edu&#x2F;workshops&#x2F;hasp2018&#x2F;HASP18_a9-mof...</a><p>[2] <a href="https:&#x2F;&#x2F;developer.amd.com&#x2F;wordpress&#x2F;media&#x2F;2013&#x2F;12&#x2F;AMD_Memory_Encryption_Whitepaper_v7-Public.pdf" rel="nofollow">https:&#x2F;&#x2F;developer.amd.com&#x2F;wordpress&#x2F;media&#x2F;2013&#x2F;12&#x2F;AMD_Memory...</a>
评论 #23835313 未加载
评论 #23831824 未加载
评论 #23831685 未加载
评论 #23831955 未加载
评论 #23850907 未加载
Dyaz17almost 5 years ago
What is the attack Vector that this solution prevent ?<p>Am I missing something obvious ?<p>Will it prevent Google from being able to have a Root access to the VM?<p>From my understanding it does not seem to protect from Google. If they are still able to have a Root Access to the VM it does not matter if the memory is encrypted or not.<p>The only thing that I see, is in case of a spectre&#x2F;meltdown vulnerabilty where the isolation of the RAM fails...
评论 #23831855 未加载
评论 #23831841 未加载
评论 #23834575 未加载
评论 #23831787 未加载
dsr_almost 5 years ago
Technology, technology, blah blah blah.<p>Tell me this: will Google indemnify you against all your losses proportional to the amount they are to blame?<p>i.e. if you lose $50 million because you relied on Google&#x27;s &quot;confidential VM&quot; and an investigation shows it&#x27;s 100% because Google didn&#x27;t protect the VM, do you get a year&#x27;s worth of fees back or $50MM?
评论 #23832299 未加载
评论 #23832058 未加载
评论 #23832287 未加载
评论 #23833597 未加载
评论 #23839287 未加载
评论 #23834355 未加载
评论 #23846526 未加载
评论 #23834579 未加载
hlandaualmost 5 years ago
May as well note: SEV relies on AMD-signed vendor firmware blobs. This means that AMD, or anyone who can get their keys, can compromise the security of SEV.
评论 #23837166 未加载
yasoobalmost 5 years ago
They state in the press release:<p>&gt; With the beta launch of Confidential VMs, we’re the first major cloud provider to offer this level of security and isolation while giving customers a simple, easy-to-use option for newly built as well as “lift and shift” applications.<p>How is Google&#x27;s offering different from the Confidential Compute Microsoft already offers?[1]<p>[1] <a href="https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;solutions&#x2F;confidential-compute&#x2F;" rel="nofollow">https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;solutions&#x2F;confidential-com...</a>
评论 #23835452 未加载
评论 #23835365 未加载
评论 #23835314 未加载
bec123almost 5 years ago
If your data is sensitive you should not be sharing resources (cores&#x2F;memory) with other users, IMO.
评论 #23831570 未加载
评论 #23831629 未加载
评论 #23831615 未加载
mferalmost 5 years ago
&gt; Confidential VMs leverage the Secure Encrypted Virtualization (SEV) feature of 2nd Gen AMD EPYC™ CPUs<p>Powered by AMD. I wonder who will leverage this next.
eloffalmost 5 years ago
So what does SEV actually protect against?<p>Something like heartbleed would still happily decrypt and transmit confidential data.<p>Something like speculative side channel attacks would still speculate on the unencrypted memory right?<p>Rowhammer would still flip bits, but now one bit flipping would turn an entire 128 bit block into garbage when decrypted? It seems like that would at least make rowhammer a lot harder to exploit into a privilege escalation. ECC memory already gave some limited protection here.
评论 #23831865 未加载
2dvisioalmost 5 years ago
This seems a move to make people handling sensitive data (E.g. healthcare and insurance) make sure they have peace of mind and can tick the box “security and privacy” off? Even neutralising the potential issue of being linked with the omniscient google? How will MS and AWS respond will be interesting.
评论 #23832447 未加载
gchokovalmost 5 years ago
This is a terrible name. Assume everything else is not confidential!
评论 #23833668 未加载
zimmerfreialmost 5 years ago
This is using SEV-ES (SEV2) which is vulnerable to the severe attack described last year in [1], and unfixable due to the lack of antirollback functionality.<p>Only SEV-SNP [2] is supposed to address it, but only on new silicon which doesn&#x27;t exist yet, and that probably not even Google has.<p>So why is Google releasing this feature if it is so flawed?<p>[1] <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1908.11680.pdf" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1908.11680.pdf</a><p>[2] <a href="https:&#x2F;&#x2F;www.amd.com&#x2F;system&#x2F;files&#x2F;TechDocs&#x2F;SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf" rel="nofollow">https:&#x2F;&#x2F;www.amd.com&#x2F;system&#x2F;files&#x2F;TechDocs&#x2F;SEV-SNP-strengthen...</a>
评论 #23843331 未加载
rwmjalmost 5 years ago
Is SEV really a &quot;breakthrough technology&quot;? AMD was far from the first to do this, and you have to trust AMD to have implemented this correctly and not be backdoored or cooperating with the US government to believe it&#x27;s really secure.
评论 #23831964 未加载
评论 #23831620 未加载
blickentwapftalmost 5 years ago
I kind of assumed all my cloud computing resources were already private and confidential.<p>Not so?
评论 #23832051 未加载
评论 #23831718 未加载
评论 #23831731 未加载
cpercivaalmost 5 years ago
<i>Confidential Computing environments keep data encrypted in memory and elsewhere outside the central processing unit (CPU).</i><p>Aren&#x27;t Amazon&#x27;s Graviton 2 processors specified to do this too?
评论 #23835357 未加载
nemothekidalmost 5 years ago
Is this homomorphic encryption or something else?
评论 #23831777 未加载
评论 #23832606 未加载
maayankalmost 5 years ago
How is SEV compared to SGX?
评论 #23831708 未加载
评论 #23831604 未加载
I_am_tiberiusalmost 5 years ago
I guess a database as a service instance at Google will still be accessible for Google in a decrypted way?
评论 #23831889 未加载
algorithm314almost 5 years ago
It is funny that Kubernetes,Istio, Asylo etc are transliteration of greek words and Google has trademarks on them.
als0almost 5 years ago
It&#x27;s interesting that there&#x27;s no mention of Intel SGX in this blog post.
评论 #23832797 未加载
Illniyaralmost 5 years ago
Is there demand for such a thing? I mean what is the use case where one would want this level of security.
评论 #23831992 未加载
josephcsiblealmost 5 years ago
I don&#x27;t like this technology. If it works as claimed, it could be used for almost unbreakable DRM.
评论 #23832601 未加载