Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable LVI mitigation for SGX #430

Open
g2flyer opened this issue Aug 5, 2020 · 2 comments
Open

Enable LVI mitigation for SGX #430

g2flyer opened this issue Aug 5, 2020 · 2 comments

Comments

@g2flyer
Copy link
Contributor

g2flyer commented Aug 5, 2020

Is your feature request related to a problem? Please describe.

To harden the enclaves, it would be good to protect them against LVI attacks.

Describe the solution you'd like

Follow the steps in Section "Enable CVE-2020-0551 Mitigation" of the "Enclave Development Basics" Chapter (page 86ff in the Intel® Software Guard Extensions (Intel® SGX) SDK for Linux* OS -- Developer Reference )
[Note: this relies for ubuntu 18.04 on the upstream binutils For docker, we install intel's version distributed as part of the SDK in /opt/intel/sgxsdk.extras/external/toolset/ubuntu18.04 ...]

@g2flyer g2flyer added the feature label Aug 5, 2020
@g2flyer g2flyer added this to the MVP milestone Aug 5, 2020
@g2flyer
Copy link
Contributor Author

g2flyer commented Nov 4, 2020

Note: if you have a platform vulnerable to LVI, attestation verification will currently fail with isvEnclaveQuoteStatus=SW_HARDENING_NEEDED in the IAS verification report (e.g., you will encounter this error when you run on Azure Gen2 VMs.)

@mbrandenburger
Copy link
Contributor

Note: if you have a platform vulnerable to LVI, attestation verification will currently fail with isvEnclaveQuoteStatus=SW_HARDENING_NEEDED in the IAS verification report (e.g., you will encounter this error when you run on Azure Gen2 VMs.)

#610 tackels this

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants