Bug 2040638
Summary: | Libvirt needs to document how to validate a AMD SEV guest measurement | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Daniel Berrangé <berrange> |
Component: | libvirt | Assignee: | Daniel Berrangé <berrange> |
libvirt sub component: | General | QA Contact: | Luyao Huang <lhuang> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | unspecified | ||
Priority: | unspecified | CC: | coli, crobinso, jdenemar, jsuchane, lcheng, lmen, meili, pkrempa, virt-maint, xuzhang, yicui, zixchen |
Version: | 9.2 | Keywords: | Triaged |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | libvirt-9.0.0-1.el9 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-09 07:26:11 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2040646 |
Description
Daniel Berrangé
2022-01-14 10:53:32 UTC
Dan, there is this article for the AMD SEV setup, https://access.redhat.com/articles/4491591. Is there anything else you would suggest to document? This is covered in two upstream docs: https://libvirt.org/kbase/launch_security_sev.html#guest-attestation-for-sev-sev-es-from-a-trusted-host https://libvirt.org/manpages/virt-qemu-sev-validate.html both are included in the -docs RPM, so this should be sufficient to consider this bug addressed. Verify this bug with libvirt-docs-9.0.0-6.el9.x86_64: 1. check and review sev update in launch_security_sev.html # ls /usr/share/doc/libvirt-docs/html/kbase/launch_security_sev.html /usr/share/doc/libvirt-docs/html/kbase/launch_security_sev.html In this document, it include important steps/configs for sev guest measurement: a. If intending to attest the boot measurement, it is required to use a firmware binary that is stateless, as persistent NVRAM can undermine the trust of the secure guest. This is achieved by telling libvirt that a stateless binary is required ... <os type='efi'> <type arch='x86_64' machine='q35'>hvm</type> <loader stateless='yes'/> </os> ... b. Guest attestation for SEV/SEV-ES from a trusted host 2. check the man page of virt-qemu-sev-validate # man virt-qemu-sev-validate Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (libvirt bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:2171 |