Veraison in a TEE
Abstract Model
A Veraison services workload () runs in a TEE ().
Keys
has its own attestation key pair .
At start-up, generates its signing key-pair .
- :
- :
where
Appraisal
We assume a pre-existing trust relationship between and , i.e.: trusts to be associated with .
When appraisal is requested by a relying party (or an attester, if in passport mode), replies with an attestation result that, along with the appraisal result for the submitted evidence (), contains the most recently obtained workload and key attestation:
- :
- :
The relying party (or an auditor in its stead) can verify that:
- The key used to sign the attestation result matches the attested key ( is either published at a known location, or inlined in the attestation result);
- The security state of platform and workload is as expected, and that their measurements are fresh enough.
This binding scheme guarantees that 's identities (both as a cryptographic signer, and as a piece of running code & configuration) cannot be separated, which prevents a forwarding attack where a rogue verifier can use platform evidence not correlated to the outer signing key -- obtained in some way from a genuine verifier -- to trick into thinking that platform and workload security state is as expected.
Note: if 's are paced with a frequency that is than the number of expected appraisals from the same , a hash of can be used instead, which reduces bandwidth requirements.
Nitro Instantiation
When run in a Nitro Enclave, the abstract protocol elements are instantiated using the following claims in the AttestationDocument
payload:
- : there is no such thing in Nitro, one has to trust AWS via the AWS Nitro Attestation PKI, which includes a root certificate for the commercial AWS partitions.
- :
pcrs["PCR0"]
(Enclave image file),pcrs["PCR1"]
(Linux kernel and bootstrap), andpcrs["PCR2"]
(Application)
- :
public_key
- :
timestamp
- :
certificate
The complete AttestationDocument
is provided below:
AttestationDocument = {
module_id: text, ; issuing Nitro hypervisor module ID
timestamp: uint .size 8, ; UTC time when document was created, in
; milliseconds since UNIX epoch
digest: digest, ; the digest function used for calculating the
; register values
pcrs: { + index => pcr }, ; map of all locked PCRs at the moment the
; attestation document was generated
certificate: cert, ; the infrastructure certificate used to sign this
; document, DER encoded
cabundle: [* cert], ; issuing CA bundle for infrastructure certificate
? public_key: user_data, ; an optional DER-encoded key the attestation
; consumer can use to encrypt data with
? user_data: user_data, ; additional signed user data, defined by protocol
? nonce: user_data, ; an optional cryptographic nonce provided by the
; attestation consumer as a proof of authenticity
}
cert = bytes .size (1..1024) ; DER encoded certificate
user_data = bytes .size (0..1024)
pcr = bytes .size (32/48/64) ; PCR content
index = 0..31
digest = "SHA384"
Notes
- The signed
AttestationDocument
can be stored in the discovery API endpoint of the verification frontend in aear-verification-key-attestation
claim. - We could use
user_data
in case we want to stash Veraison-specific data in theAttestationDocument
, for example as a bstr-wrapped CBOR/JSON map. - The
nonce
field is conveniently optional, which plays well with our timestamp-based freshness model.