Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Present attestation architecture of keybroker #33

Open
tylerfanelli opened this issue Apr 9, 2024 · 7 comments
Open

Present attestation architecture of keybroker #33

tylerfanelli opened this issue Apr 9, 2024 · 7 comments
Labels
close candidate Issue that looks ready to close need slides Presenter has yet to share slides for upload [track] attestation architectures Attestation architectures [track] open source software [Track] OSS software stacks for attestation

Comments

@tylerfanelli
Copy link

tylerfanelli commented Apr 9, 2024

I recently spoke at the latest CCC TAC meeting on how we're building confidential computing support in existing container projects:

https://youtu.be/hSQC9GWvK-M?list=PLmfkUJc39uMjaB_I1dYW72I44kr9QzG_B&t=3355

In that presentation, I spoke a bit about the remote attestation server we built to support this work, known as keybroker. keybroker is still in its infancy, but I'd like to present its architecture to the Attestation SIG if given the opportunity. keybroker will become an official VirTEE-supported project at some point.

https://github.com/tylerfanelli/keybroker

In the meantime, I will add some documentation to the keybroker repository showing its architecture; and specifically, what it does different than existing attestation server implementations.

@tylerfanelli
Copy link
Author

@thomas-fossati I'm not a contributor to this repository, so I'm unable to add the labels open source software and attestation architectures.

@tylerfanelli tylerfanelli changed the title Present attestation architecture for keybroker Present attestation architecture of keybroker Apr 9, 2024
@thomas-fossati thomas-fossati added [track] open source software [Track] OSS software stacks for attestation [track] attestation architectures Attestation architectures labels Apr 9, 2024
@thomas-fossati
Copy link
Contributor

@thomas-fossati I'm not a contributor to this repository, so I'm unable to add the labels open source software and attestation architectures.

Done!

A couple of points on the logistics:

  • I have pencilled you in on the 7th of May, if that doesn't work for any reason let us know.
  • How much time do you need (including Q&A)?

Thanks for an excellent proposal!

@tylerfanelli
Copy link
Author

  • I have pencilled you in on the 7th of May, if that doesn't work for any reason let us know.

Thanks, will do.

  • How much time do you need (including Q&A)?

Probably about 30-45 min?

@muhammad-usama-sardar
Copy link
Contributor

keybroker is still in its infancy, but I'd like to present its architecture to the Attestation SIG if given the opportunity.

Sounds very interesting. We have a very recently accepted project within the CCC Attestation SIG to work on the formalization of the CoCo KBS protocol. Related to that, what I would like to be emphasized in the talk is the following:

  • Motivation: Given a well-known CoCo KBS attestation protocol, why is there a need for VirTEE keybroker? or in other words, what exactly is missing in CoCo KBS attestation protocol that VirTEE would help in improving the ecosystem? or maybe what is the limitation of CoCo KBS attestation protocol that you are trying to address via VirTEE?
  • Attestation Protocol: How is the secure channel established in VirTEE? Does it use pre-handshake attestation/post-handshake attestation/intra-handshake attestation? or by infancy, did you mean that it is only the architecture that you would like to present?

@tylerfanelli
Copy link
Author

  • Motivation: Given a well-known CoCo KBS attestation protocol, why is there a need for VirTEE keybroker? or in other words, what exactly is missing in CoCo KBS attestation protocol that VirTEE would help in improving the ecosystem? or maybe what is the limitation of CoCo KBS attestation protocol that you are trying to address via VirTEE?

keybroker follows the KBS protocol. Most of its differences lie in reference value handling and registration. I'm actually experimenting with porting keybroker as a backend for coco-kbs (a replacement of attestation-service for our needs).

  • Attestation Protocol: How is the secure channel established in VirTEE? Does it use pre-handshake attestation/post-handshake attestation/intra-handshake attestation? or by infancy, did you mean that it is only the architecture that you would like to present?

I'm not sure what you mean when you refer to VirTEE in this scenario. VirTEE is simply an organization to host open source TEE projects. If you're referring to keybroker, since it uses the KBS protocol, the secure channel establishment follows the method of coco-kbs.

@gkostal
Copy link
Collaborator

gkostal commented Jul 16, 2024

@tylerfanelli - thank you so much for presenting on 6/18/24. Can you possibly share your slides from the presentation so they can be added to the meeting materials in this repo? You can either submit a PR to this repo, or you can share the slides with me, and I can create a PR on your behalf.

@gkostal gkostal added need slides Presenter has yet to share slides for upload close candidate Issue that looks ready to close labels Jul 16, 2024
@tylerfanelli
Copy link
Author

@gkostal Thanks for allowing me to present! I can create a PR with the slides.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
close candidate Issue that looks ready to close need slides Presenter has yet to share slides for upload [track] attestation architectures Attestation architectures [track] open source software [Track] OSS software stacks for attestation
Projects
None yet
Development

No branches or pull requests

4 participants