Monday, 2018-02-26

*** sjas_ has joined #kata-general05:09
*** sjas has quit IRC05:12
kata-dev-irc-bot<harshal.patil> What is the impact of Intel's TME and MKTME on runtimes based on virtual machine, such as kata?05:25
kata-dev-irc-bot<harshal.patil> https://software.intel.com/en-us/blogs/2017/12/22/intel-releases-new-technology-specification-for-memory-encryption05:25
kata-dev-irc-bot<harshal.patil> @james.o.hunt @xu05:25
kata-dev-irc-bot<harshal.patil> since you wont be able to decrypt the memory of an another process (in case of MKTME), does running container inside VM still  offering anything extra in terms of security? Even if container process exploits kernel vulnerability and escapes it won't be able to decrypt the memory pages (in MKTME) in my opinion.05:35
kata-dev-irc-bot<harshal.patil> I would like to know what this community thinks about the impact of TME and MKTME on runtime like these.05:35
kata-dev-irc-bot<xu> If you subscribed the mailing list, you will find there are a discussion on memory encryption  tech (but initiated for AMD similar tech).06:09
*** jodh has joined #kata-general07:55
*** jodh has joined #kata-general07:55
*** gwhaley has joined #kata-general09:12
*** sjas_ is now known as sjas11:27
*** gwhaley has quit IRC11:57
*** gwhaley has joined #kata-general13:37
*** openstack has joined #kata-general17:17
*** ChanServ sets mode: +o openstack17:17
*** jodh has quit IRC17:37
*** jodh has joined #kata-general17:37
*** jodh has quit IRC18:07
*** gwhaley has quit IRC18:15

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!