Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configure CoCo runtimes with shared_fs=none #9676

Open
1 of 4 tasks
wainersm opened this issue May 20, 2024 · 1 comment
Open
1 of 4 tasks

Configure CoCo runtimes with shared_fs=none #9676

wainersm opened this issue May 20, 2024 · 1 comment
Labels
area/confidential-containers Issues related to confidential containers (see also CCv0 branch) enhancement Improvement to an existing feature needs-review Needs to be assessed by the team.

Comments

@wainersm
Copy link
Contributor

wainersm commented May 20, 2024

Which feature do you think can be improved?

The confidential runtime classes (qemu-coco-dev, qemu-snp, qemu-tdx, qemu-sev) are all configured with shared_fs=virtio-9p which actually represents a confidentiality flaw due the lack of a secure/trusted channels to share the host filesystem into the guest. Until we don't have a confidential mechanism to share host filesystem within the guest, it's suggested that CoCo runtimes are configure with shared_fs=none, i.e, not host sharing is allowed.

Once setting shared_fs=none, features like ConfigMap and Secrets resources will rely on files copied over the guest. We will need to test and fix any breakage with these features (as well as downward API and projected volumes).

How can it be improved?

Set shared_fs=none by default on qemu-coco-dev, qemu-snp, qemu-tdx and qemu-sev runtime configuration.toml file.

Additional Information

@fidencio actually first proposed that approach If I'm not mistaken and has already raised a PR for TDX: #9315 . From hist work we already have a list of test (so features) that break:

Work breakdown

@wainersm wainersm added enhancement Improvement to an existing feature needs-review Needs to be assessed by the team. area/confidential-containers Issues related to confidential containers (see also CCv0 branch) labels May 20, 2024
@wainersm
Copy link
Contributor Author

* [ ]  TEEs: Use shared_fs=none for SNP / SEV

@ryansavino @AdithyaKrishnan @fitzthum Could you own the enablement on AMD runtime classes? If this configuration change is also of your interest.

* [ ]  TEEs: Use shared_fs=none for non-TEE (qemu-coco-dev)

I'll be working on ^^^^

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/confidential-containers Issues related to confidential containers (see also CCv0 branch) enhancement Improvement to an existing feature needs-review Needs to be assessed by the team.
Projects
Issue backlog
  
To do
Development

No branches or pull requests

1 participant