←back to thread

169 points hunvreus | 2 comments | | HN request time: 0.419s | source
Show context
londons_explore ◴[] No.43653973[source]
Unmentioned: there are serious security issues with memory cloning code not designed for it.

For example, an SSL library might have pre-calculated the random nonce for the next incoming SSL connection.

If you clone the VM containing a process using that library, now both child VM's will use the same nonce. Some crypto is 100% broken open if a nonce is reused.

replies(7): >>43654026 #>>43654396 #>>43654513 #>>43654702 #>>43654894 #>>43655157 #>>43657321 #
sunshinekitty ◴[] No.43654513[source]
GCP’s ‘live migrations’ have been doing this for close to a decade or more. Must not be that big of a problem.
replies(2): >>43654524 #>>43657289 #
londons_explore ◴[] No.43654524[source]
It isn't a problem if you guarantee only one child of the clone lives on - which GCP does.
replies(1): >>43654845 #
1. matt-p ◴[] No.43654845[source]
How do we know that isn't enforced here too?
replies(1): >>43655491 #
2. jsnell ◴[] No.43655491[source]
Because their main selling point is to run the copies concurrently with the original.