-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Figure out whether the private key is encrypted when the container is suspended #7
Comments
@njriasan will work on this |
From what I have gather container pausing in Docker occurs through the freezer cgroup controller, described here. By default there doesn't seem to be anything encrypting the disk storage, but I will keep investigating to see if it is possible to do so. |
It does not seem of course like ecryptfs stores the keys to disk (it would be foolish to do so). This does provoke a few questions.
Question number 3 seems like the exact use case of hardware enclaves so I find it unsurprising that this a concern. I will continue to explore possible workaround as a point of comparison, but it seems like enclaves may be necessary for allowing a key to be fully paused. |
I think this also becomes an issue without suspending a container if for example a data page with the key that will be provided to ecryptfs just gets paged out. This is seeming more likely that enclaves are necessary to allow secure key transfer. |
I think we have to include it in the threat model and move on. Without hardware support I don't think you can do anything if the operating system tries to maliciously swap your program to disk. |
Since containers are essentially processes, suspension will dump memory to disk. But which disk? the encrypted disk or a disk that is accessible by the sysadmin?
The text was updated successfully, but these errors were encountered: