Re: OT: AMD Eypc processor -- RAM encrypt/decrypt built in

2018-05-28 Thread Tomasz Rola
On Wed, May 09, 2018 at 08:29:14AM -0500, John McKown wrote: > This is interesting. Reminds me a bit of IBM's newest "Pervasive > Encryption". > > https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/ > [...] > > You simply cannot effectively read one VM's memory contents from a > different

Re: OT: AMD Eypc processor -- RAM encrypt/decrypt built in

2018-05-09 Thread Elardus Engelbrecht
John McKown wrote: >This is interesting. Reminds me a bit of IBM's newest "Pervasive Encryption". >https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/ Interesting. So to grab a CPU is needing this condition - available and correct Private Key. "The key is generated during power-up by the

Re: OT: AMD Eypc processor -- RAM encrypt/decrypt built in

2018-05-09 Thread Carmen Vitullo
Very cool indeed ! Carmen Vitullo - Original Message - From: "John McKown" To: IBM-MAIN@LISTSERV.UA.EDU Sent: Wednesday, May 9, 2018 8:29:14 AM Subject: OT: AMD Eypc processor -- RAM encrypt/decrypt built in This is interesting. Reminds me a bit of IBM's ne

OT: AMD Eypc processor -- RAM encrypt/decrypt built in

2018-05-09 Thread John McKown
This is interesting. Reminds me a bit of IBM's newest "Pervasive Encryption". https://www.theregister.co.uk/2017/06/20/amd_epyc_launch/ There are three modes. The one that is really interesting is the SEV mode, designed to be used when running a hypervisor. " Each VM is assigned an address space