Veraison in a TEE

Abstract Model

A Veraison services workload () runs in a TEE ().

 Keys

has its own attestation key pair .

At start-up, generates its signing key-pair .

  • :
  • :

where

Appraisal

We assume a pre-existing trust relationship between and , i.e.: trusts to be associated with .

When appraisal is requested by a relying party (or an attester, if in passport mode), replies with an attestation result that, along with the appraisal result for the submitted evidence (), contains the most recently obtained workload and key attestation:

  • :
  • :

The relying party (or an auditor in its stead) can verify that:

  • The key used to sign the attestation result matches the attested key ( is either published at a known location, or inlined in the attestation result);
  • The security state of platform and workload is as expected, and that their measurements are fresh enough.

This binding scheme guarantees that 's identities (both as a cryptographic signer, and as a piece of running code & configuration) cannot be separated, which prevents a forwarding attack where a rogue verifier can use platform evidence not correlated to the outer signing key -- obtained in some way from a genuine verifier -- to trick into thinking that platform and workload security state is as expected.

Note: if 's are paced with a frequency that is than the number of expected appraisals from the same , a hash of can be used instead, which reduces bandwidth requirements.

Nitro Instantiation

When run in a Nitro Enclave, the abstract protocol elements are instantiated using the following claims in the AttestationDocument payload:

  • : there is no such thing in Nitro, one has to trust AWS via the AWS Nitro Attestation PKI, which includes a root certificate for the commercial AWS partitions.
  • :
    1. pcrs["PCR0"] (Enclave image file),
    2. pcrs["PCR1"] (Linux kernel and bootstrap), and
    3. pcrs["PCR2"] (Application)
  • : public_key
  • : timestamp
  • : certificate

The complete AttestationDocument is provided below:

AttestationDocument = {
    module_id: text,               ; issuing Nitro hypervisor module ID
    timestamp: uint .size 8,       ; UTC time when document was created, in
                                   ; milliseconds since UNIX epoch
    digest: digest,                ; the digest function used for calculating the
                                   ; register values
    pcrs: { + index => pcr },      ; map of all locked PCRs at the moment the
                                   ; attestation document was generated
    certificate: cert,             ; the infrastructure certificate used to sign this
                                   ; document, DER encoded
    cabundle: [* cert],            ; issuing CA bundle for infrastructure certificate
    ? public_key: user_data,       ; an optional DER-encoded key the attestation
                                   ; consumer can use to encrypt data with
    ? user_data: user_data,        ; additional signed user data, defined by protocol
    ? nonce: user_data,            ; an optional cryptographic nonce provided by the
                                   ; attestation consumer as a proof of authenticity
}

cert = bytes .size (1..1024)       ; DER encoded certificate
user_data = bytes .size (0..1024)
pcr = bytes .size (32/48/64)       ; PCR content
index = 0..31
digest = "SHA384"

 Notes

  1. The signed AttestationDocument can be stored in the discovery API endpoint of the verification frontend in a ear-verification-key-attestation claim.
  2. We could use user_data in case we want to stash Veraison-specific data in the AttestationDocument, for example as a bstr-wrapped CBOR/JSON map.
  3. The nonce field is conveniently optional, which plays well with our timestamp-based freshness model.