-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use DCAP as the default RA type #70
Comments
So it seems the best way to implement this is to get parts of the collateral from the PCCS while hardcoding the others -> pub struct Collateral {
root_ca_crl: CertificateList, // <---- hardcode or query from the tcb-info contract
pck_crl_issuer_chain: Vec<Certificate>, // <---- query from PCCS
pck_crl: CertificateList, // <---- query from PCCS
tcb_issuer_chain: Vec<Certificate>, // <---- hardcode
tcb_info: String, // <---- query from tcb-info contract
qe_identity_issuer_chain: Vec<Certificate>, // <---- hardcode
qe_identity: String, // <---- hardcode
} To be able to query some of this data, we need to know the (many thanks to @amiller for inputs/suggestions) |
Now the question is who gets this data together and when. Ideally this is something that the |
Per recent discussions with @amiller and the team, it seems the PCCS service is expected to run on the host and we (Informal) will have total control over it. So for all practical purposes we could treat HTTP calls made by the enclave to this cacheing service as infallible. Later protocol deisgn work to make the system highly-available and fail-safe can handle failures. Also, the PCCS can be dockerized and the fetch for intermediate certificates can be done proactively or on demand. So the next steps would be ->
Some other points to consider ->
|
So I found the following options for getting the fmspc -> Option 1: Using the PCKIDRetrievalToolThis is one of the tools that Intel provides, but I am not sure if it's safe to call from inside the enclave. Option 2: Make a HTTP POST to the PCSSee https://api.portal.trustedservices.intel.com/content/documentation.html#pcs-certificate-v4-response Basically we call The problem with this is I'm not sure where to find the
Option 3: Link to Intel's C++ lib dynamically and call themBasically ->
See gramineproject/gramine#820 (Also not sure if this is safe) Other options
|
So, based on @amiller's inputs, this seems like the best way forward ->
|
Latest findings
What/how to impl
|
Acceptance Criteria
Depends on #100
Tasks
update=early
on fmspc (optional) #218The text was updated successfully, but these errors were encountered: