Encrypt /dev/attestation/keys/my_key with _sgx_mrenclave (makes sense?) #1878
-
Hey Gramine team, quick question, does it make any sense or is it even possible to receive a key from a secret provisioner and write it to a path that is a fs mount with encrypted key _sgx_mrenclave? We made it working using standard allowed files on path /dev/attestation/keys/my_key instead of fs.mount encrypted But we would like this 'wrap' key received by the secret provisioner to be encrypted as well by the _sgx_mrenclave, Why you may ask?
Thank you! |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
Hi @tiagorvmartins, thanks for your questions!
Yes, it is possible to write to the path
Sorry I did not understand: you'd like
I think your current usage of allowed files for |
Beta Was this translation helpful? Give feedback.
-
I think it does if your goal is continue using the enclave without the need to contact the provisioning server on each run (and if that's fine in your security model).
I don't see what Docker has to do with the security of this idea? Something is either inside Gramine or on the untrusted host, the whole Docker thing is within the untrusted host. |
Beta Was this translation helpful? Give feedback.
-
Thank you both that answered my question! |
Beta Was this translation helpful? Give feedback.
Hi @tiagorvmartins, thanks for your questions!
Yes, it is possible to write to the path
/dev/attestation/keys/
but the key name (in your casemy_key
) has to be specified somewhere in the manifest (e.g., in an encrypted mount wheremy_key
is used for encrypted files). Pls see some discussions here: #1412. May I know the usage ofmy_key
(i.e., is this for encrytped files or app-specific)?