Skip to content
This repository has been archived by the owner on Sep 25, 2024. It is now read-only.

[Hardening aspect] Rollback attack on CoCo guest private memory via swap #143

Open
ereshetova opened this issue Mar 12, 2024 · 0 comments
Open

Comments

@ereshetova
Copy link
Contributor

Summary

If a CoCo guest enables memory swapping to a disk, and assuming the disk is under control of host/VMM, it is possible to perform rollback attacks on CoCo guest private memory since no commonly used Linux disk protection mechanisms provide rollback protection (confidentiality and integrity of the disk can be guaranteed by using an off-shelf methods).

Solution

Currently none. If rollback attacks are a concern, then either memory swapping should be disabled in the guest kernel or the disk must be located outside of host/VMM control, i.e. by using a volume mounted from the network, etc.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant