-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cca: Get the evidence from EAR (EAT Attesation Result) #241
Conversation
also cc other reviewers for review, cc @Xynnn007 @fitzthum @jialez0 this is replacement of the confidential-containers/attestation-service#159 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @chendave Only some small nits
7e78c87
to
3ae3097
Compare
@@ -130,156 +154,104 @@ impl Verifier for CCA { | |||
warn!("CCA currently does not support parse `cca_realm_personalization_value`. Init data hash check skipped."); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we support to verify this item after this PR?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, I will push one additional commit to fix it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
pls see: 90fb4b6
54dc0ab
to
65a0379
Compare
CCA validation by the Verasion has some overlapping with the RVPS, the similar validation has been done by the Verasion already. So the validation of evidence in CoCo is not needed in theory. The parse of the CCA token here is to align with other verifier, e.g. TDX, and to support RVPS if that is the case of future planning. NOTE that each of the value we get from EAR is base64 encoded hex value. So, the reference value that are registered for RVPS are expected to be base64 encoded hex value as well. [1] https://datatracker.ietf.org/doc/draft-ietf-rats-ar4si/ Signed-off-by: Dave Chen <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Can we merge this? or anything else I can do? |
Now, the init data will be checked against the value from CCA token. Signed-off-by: Dave Chen <[email protected]>
CCA validation by the Verasion has some overlapping with the RVPS, the similar validation has been done by the Verasion already. So the validation of evidence in CoCo is not needed in theory.
The parse of the CCA token here is to align with other verifier, e.g. TDX, and to support RVPS if that is the case of future planning.
NOTE that each of the value we get from EAR is base64 encoded hex value. So, the reference value that are registered for RVPS are expected to be base64 encoded hex value as well.
[1] https://datatracker.ietf.org/doc/draft-ietf-rats-ar4si/