[svsm-devel] SVSM Development Call - June 12th, 2024
James Bottomley
James.Bottomley at HansenPartnership.com
Wed Jun 12 14:20:03 CEST 2024
On Tue, 2024-06-11 at 20:46 +0000, Claudio Siqueira de Carvalho wrote:
> Hi,
>
> I would like to add two topics to the SVSM meeting agenda:
>
> - What does TPM locality[1] mean for the SVSM vTPM?
Well, unlike the physical TPM, which is locked to locality zero unless
you do a dynamic launch, the SVSM vTPM protocol supports any locality
(in that way it's the same as a vTPM attached to a VM). This would
allow us to operate userspace and the kernel at different localities
meaning there could be key sealing policies that won't allow a key to
unseal in the userspace locality (i.e. kernel only). Adding
functionality like this doesn't require the SVSM to police localities
(the kernel does it).
Policing localities is more problematic for the SVSM. It means that
the SVSM must ensure that a particular locality request comes from a
particular trust level. For instance in a dynamic launch, the TIS TPM
polices localities by replicating register access pages (one for each
locality) and then the chipset blocks access to some of them as the
boot continues.
The problem for the SVSM-vTPM is that it's hard to employ this type of
access sealing mechanism without an additional command and enlightening
all the OS components to use it, so unless there's a reason to reserve
a locality exclusively for the SVSM (say to unseal a provided secret
only for it)
> - Is there any SVSM boot event that we want to record in the TPM
> PCRs/Event log?
> E.g. a SVSM configuration, the OVMF hash, etc
OVMF records all the mandatory TCG measured boot events, including its
own measurement. This, unfortunately, includes the static core root of
trust (SCRT) measurement, which is supposed to be the first entry. We
could still add preceding SVSM measurements, but this would be a
technical spec violation.
Probably what needs to happen is that the SVSM-vTPM should be
responsible for the SCRT Measurement and OVMF should detect the
presence of the SVSM and assume it's been done. That would give us
scope for adding the SVSM configuration to the SCRT measurement.
Regards,
James
More information about the Svsm-devel
mailing list