Tom Dohrmann Profile
Tom Dohrmann

@13erbse

Followers
205
Following
60K
Statuses
380

Joined February 2015
Don't wanna be here? Send us removal request.
@13erbse
Tom Dohrmann
28 days
(All opinions expressed in that talk are my own)
0
0
0
@13erbse
Tom Dohrmann
1 month
RT @orange_8361: The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 cc: @_splitline_
0
212
0
@13erbse
Tom Dohrmann
2 months
I just merged the 1000th commit into 🚀
Tweet media one
0
0
4
@13erbse
Tom Dohrmann
2 months
Tweet media one
0
0
5
@13erbse
Tom Dohrmann
2 months
@ffidencio @DKBarbarian i can't :///
Tweet media one
0
0
0
@13erbse
Tom Dohrmann
3 months
@LucGamesHD Happy Birthday!
1
0
1
@13erbse
Tom Dohrmann
3 months
@GabrielKerneis @blitzclone Contrast by @EdgelessSystems (built with Kata Containers) works like that. The launch measurements for the firmware and kernel+initrd+cmdline are calculated ahead of time. The kernel command line contains arguments to mount a dm-verity protected disk. Everything's attested :)
1
0
3
@13erbse
Tom Dohrmann
3 months
@GabrielKerneis @blitzclone I think most people just don't use vTPMs when full attestation is available. If you really want a vTPM, something like COCONUT SVSM or OpenHCL could be used in the future to provide a trusted TPM. More details on the preview:
1
0
0
@13erbse
Tom Dohrmann
3 months
@blitzclone @GabrielKerneis I mean kinda? It doesn't feel like that for the L2 VM as it's not even aware that it's running as a nested VM, but I certainly see the similarities as well.
0
0
0
@13erbse
Tom Dohrmann
3 months
@blitzclone @GabrielKerneis Kata Containers (the tech used in this particular preview) uses a fairly minimal kernel config and boot image to cut down on attack surfaces exposed by the guest running inside the confidential L2 VM (It probably could be a bit smaller, though).
0
0
0
@13erbse
Tom Dohrmann
3 months
@GabrielKerneis @blitzclone In the preview (so likely not plain Azure VMs), the L1 VMs can send requests to the PSP, so CloudHypervisor running on the L1 VM will forward any requests from the L2 VM to the PSP and back:
2
0
0
@13erbse
Tom Dohrmann
3 months
@npmccallum @SEJeff @_msw_ Azure's confidential containers preview uses Kata Containers with CloudHypervisor to spawn confidential L2 VMs on top of the regular non-confidential Kuberenetes VMs:
0
1
0
@13erbse
Tom Dohrmann
3 months
@blitzclone Nested VMs on Azure allow supplying the firmware and doing full attestation.
1
1
0
@13erbse
Tom Dohrmann
4 months
@SwiftOnSecurity The latest episode of controlled pod into terrain discusses some of the interactions between WiFi and TDWR (terminal doppler weather radar) and how to prevent them
@KyraCloudy
Admiral Cloudberg
4 months
My CPIT cohosts and I recorded a charity episode to support victims of Hurricanes Helene and Milton: Listen to us talk about search and rescue helicopters and terminal doppler weather radar, with all proceeds going to disaster relief.
0
0
1
@13erbse
Tom Dohrmann
4 months
@drivsholm @awesomekling I had the same experience. I don't think it really shaped me in any way.
0
0
1
@13erbse
Tom Dohrmann
4 months
@npmccallum I sent you a direct message.
0
0
0
@13erbse
Tom Dohrmann
4 months
@blitzclone @draskodraskovic @enarxproject @ElasticProject_ @KubeCon_ Is it, though? I have never heard an Intel employee say that, and it's not like SGX has been dead ever since it's been deprecated on client CPUs. They added new features not that long ago. As of today, TDX attestation requires SGX, so until they add other options, SGX can't leave
1
0
0