Intel® Software Guard Extensions (Intel® SGX)
Discussion board focused on hardware-based isolation and memory encryption to provide extended code protection in solutions.

The delay attack towards the trusted time

SunnySun
Beginner
1,834 Views

Hi Intel

     Because the request/response packets are communicated in IPC when invoking sgx_get_trusted_time,  I wonder if these packets are vulnerable to delay attacks, i.e., the malicious OS intercept these packets and the measured elapsed time may not correct.

 

Moreover, if this kind of attack exists, I also wonder to know how to mitigate this attack.

 

Best regards,

 

SunnySun

 

Labels (3)
0 Kudos
1 Solution
JesusG_Intel
Moderator
1,820 Views

Hello SunnySun,


I will answer your questions related to trusted time and monotonic counters in this thread and will remove the previous thread.


Support for Intel SGX Platform Services was removed from all Linux-based platforms, including client platforms, beginning with Intel SGX SDK for Linux 2.9.

 

The Intel SGX API for monotonic counters is still part of the Intel SGX SDK for Windows and is supported on Windows 10 platforms via the Intel SGX Platform Software for Windows. The Intel SGX Platform Software for Windows is usually installed via Windows Update from the platform OEM.

 

The paper, Intel SGX Platform Services, describes in detail how the SGX SDK accesses hardware-based monotonic counters implemented in the Intel Converged Security and Management Engine (CSME), which is only available in client systems.

 

The sgx_get_trusted_time function includes a nonce argument. According to the Intel SGX Developer Reference for Windows: "The Enclave retrieves the time reference and the time source nonce using sgx_get_trusted_time." To guarantee that the time source does not change between two readings of sgx_get_trusted_time, compare the nonce from each reading - they should be the same.

 

Read more about protecting against replay attacks by referring to the section on the Sealed Data example in the Intel SGX Developer Reference for Windows.


These articles may also be interesting to you: 

What is the Role of the Intel® Software Guard Extensions (Intel® SGX) Platform Services Enclave (PSE) and how is it Invoked?

Unable to find Alternatives to Monotonic Counter Application Programming Interfaces (APIs) in Intel® Software Guard Extensions (Intel® SGX) for Linux* to Prevent Sealing Rollback Attacks


Sincerely,

Jesus G.

Intel Customer Support


View solution in original post

0 Kudos
5 Replies
JesusG_Intel
Moderator
1,821 Views

Hello SunnySun,


I will answer your questions related to trusted time and monotonic counters in this thread and will remove the previous thread.


Support for Intel SGX Platform Services was removed from all Linux-based platforms, including client platforms, beginning with Intel SGX SDK for Linux 2.9.

 

The Intel SGX API for monotonic counters is still part of the Intel SGX SDK for Windows and is supported on Windows 10 platforms via the Intel SGX Platform Software for Windows. The Intel SGX Platform Software for Windows is usually installed via Windows Update from the platform OEM.

 

The paper, Intel SGX Platform Services, describes in detail how the SGX SDK accesses hardware-based monotonic counters implemented in the Intel Converged Security and Management Engine (CSME), which is only available in client systems.

 

The sgx_get_trusted_time function includes a nonce argument. According to the Intel SGX Developer Reference for Windows: "The Enclave retrieves the time reference and the time source nonce using sgx_get_trusted_time." To guarantee that the time source does not change between two readings of sgx_get_trusted_time, compare the nonce from each reading - they should be the same.

 

Read more about protecting against replay attacks by referring to the section on the Sealed Data example in the Intel SGX Developer Reference for Windows.


These articles may also be interesting to you: 

What is the Role of the Intel® Software Guard Extensions (Intel® SGX) Platform Services Enclave (PSE) and how is it Invoked?

Unable to find Alternatives to Monotonic Counter Application Programming Interfaces (APIs) in Intel® Software Guard Extensions (Intel® SGX) for Linux* to Prevent Sealing Rollback Attacks


Sincerely,

Jesus G.

Intel Customer Support


0 Kudos
SunnySun
Beginner
1,808 Views

Hello Jesus,

 

Thanks for your answer. Further, I also have some questions:

  1. I am still curious about why Intel suddenly removed the Intel SGX Platform Service from Linux-based platform beginning with Intel SGX SDK for Linux 2.9, while still retain the Intel SGX Platform Service on Windows platforms.  In my understanding, this service may have nothing to do with hardware but with software (e.g., the version of the SDK).
  2. What is the thinking behind the design, in which the server system does not support Intel Converged Security and Management Engine (CSME)?
  3. Moreover, on a Linux-based platform equipped with the 8th Gen Core-i7 CPU, If I now install the  Intel SGX SDK before Linux 2.9, can I use the trusted time and  monotonic counter via Intel SGX's API?

 

Sincerely,

SunnySun

0 Kudos
SunnySun
Beginner
1,807 Views

Hello Jesus,

 

I would like to add more to the Question 2 in my last reply.

  • What is the thinking behind the design, in which the server system does not support Intel Converged Security and Management Engine (CSME)?In the future, will Intel consider supporting CSME, trusted time, monotonic counters in SGX for server platforms in the future. 

Sincerely,

SunnySun

 

0 Kudos
JesusG_Intel
Moderator
1,792 Views

Hello SunnySun,


  1. OEMs must accept a license to support Platform Services. OEMs can accept this license on their Windows systems because the OS is pre-installed at the factory. However, due to how Linux is distributed and installed, the OEMs could not accept that license for Linux installations.
  2. Intel server products use Intel Server Platform Services for manageability. Servers and clients have different manageability needs that are addressed by different technologies.
  3. Intel does not recommend installing older versions of SGX software. As this is security software, you should always install the most recent version to get all the latest security and bug fixes. Also, you would need the Linux ME drivers, which Intel does not provide.
  4. We cannot comment on future roadmaps.


Sincerely,

Jesus G.

Intel Customer Support


0 Kudos
JesusG_Intel
Moderator
1,767 Views

This thread has been marked as answered and Intel will no longer monitor this thread. If you want a response from Intel in a follow-up question, please open a new thread.


0 Kudos
Reply