Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add meeting minutes for SVSM Development Call on January 15th, 2025 #41

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added Meetings/Data/state-persistence-csvsm-slides.pdf
Binary file not shown.
1 change: 1 addition & 0 deletions Meetings/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@

### January 2025

* [January 15th, 2025](devel-call-2025-01-15.md)
* [January 8th, 2025](devel-call-2025-01-08.md)

### December 2024
Expand Down
29 changes: 29 additions & 0 deletions Meetings/devel-call-2025-01-15.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# Meeting Minutes: SVSM Development Call (January 15th, 2025)

## Attendees:

Adam Dunlap, Christopher Oo, Cláudio Carvalho, Dionna Glaze, Geoffrey Ndu, Huibo Wang, James Bottomley, Jean, Joerg Roedel, Jon Lange, Nicolai Stange, Oliver Steffen, Peter Fang, Stefano Garzarella, Supreshna (HPE), Tom Lendacky, Tyler Fanelli, Vasant Karasulli

## Topics:

### Announcements

* No meeting on January 22nd, 2025, next meeting on January 29th.

### VTPM Persistence Presentation

* Geoffrey Ndu introduced a proposal for VTPM persistence, a different approach from current work.
* Jean presented a [security analysis](https://stringlytyped.github.io/publications/csvsm-proxy-security-analysis/)
of the current proposal and outlined their new proposal. [Slides](Data/state-persistence-csvsm-slides.pdf)
[Google Doc](https://docs.google.com/document/d/1DaTycUH0M2qU6lK0EF8d42g-e0CvBOD-3rxrk8lCea4/edit)
* Key points of the presentation:
* Maintaining confidentiality and authentication of persisted keys.
* Addressing the unique security challenges of CVMs.
* Ensuring backward compatibility with existing applications.
* Accommodating edge use cases with unreliable Internet connectivity.
* Discussion points:
* The role of an attestation bridge in ensuring end-to-end secure channel.
* The use of ephemeral vs. persistent EKs for attestation.
* The importance of binding attestation to specific CVM instances.
* The challenges of detecting rollback in CVM environments.
* The potential use of a rolling hash and counter to detect rollback.