Re: [PATCH] x86: re-initialize RNG seed when selecting kernel

2022-09-26 Thread Jason A. Donenfeld
Hi Peter, On Mon, Sep 26, 2022 at 7:05 PM Peter Maydell wrote: > > On Mon, 26 Sept 2022 at 17:53, Jason A. Donenfeld wrote: > > On both x86 and dtb-based archs, the seed in memory is zeroed out by the > > kernel after reading. So, as far as the guest is concerned, there's > > forward secrecy. Ex

Re: [PATCH] x86: re-initialize RNG seed when selecting kernel

2022-09-26 Thread Peter Maydell
On Mon, 26 Sept 2022 at 17:53, Jason A. Donenfeld wrote: > On both x86 and dtb-based archs, the seed in memory is zeroed out by the > kernel after reading. So, as far as the guest is concerned, there's > forward secrecy. Except! Except if the guest has someway of > re-requesting that seed from the

Re: [PATCH] x86: re-initialize RNG seed when selecting kernel

2022-09-26 Thread Jason A. Donenfeld
Hi Paolo, On Mon, Sep 26, 2022 at 06:07:43PM +0200, Paolo Bonzini wrote: > On Mon, Sep 26, 2022 at 3:45 PM Jason A. Donenfeld wrote: > > On Thu, Sep 22, 2022 at 5:28 PM Jason A. Donenfeld wrote: > > > We don't want it to be possible to re-read the RNG seed after ingesting > > > it, because this

Re: [PATCH] x86: re-initialize RNG seed when selecting kernel

2022-09-26 Thread Paolo Bonzini
On Mon, Sep 26, 2022 at 3:45 PM Jason A. Donenfeld wrote: > On Thu, Sep 22, 2022 at 5:28 PM Jason A. Donenfeld wrote: > > We don't want it to be possible to re-read the RNG seed after ingesting > > it, because this ruins forward secrecy. Currently, however, the setup > > data section can just be

Re: [PATCH] x86: re-initialize RNG seed when selecting kernel

2022-09-26 Thread Jason A. Donenfeld
On Thu, Sep 22, 2022 at 5:28 PM Jason A. Donenfeld wrote: > > We don't want it to be possible to re-read the RNG seed after ingesting > it, because this ruins forward secrecy. Currently, however, the setup > data section can just be re-read. Since the kernel is always read after > the setup data,