-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Present attestation architecture of keybroker
#33
Comments
@thomas-fossati I'm not a contributor to this repository, so I'm unable to add the labels |
keybroker
keybroker
Done! A couple of points on the logistics:
Thanks for an excellent proposal! |
Thanks, will do.
Probably about 30-45 min? |
Sounds very interesting. We have a very recently accepted project within the CCC Attestation SIG to work on the formalization of the CoCo KBS protocol. Related to that, what I would like to be emphasized in the talk is the following:
|
keybroker follows the KBS protocol. Most of its differences lie in reference value handling and registration. I'm actually experimenting with porting keybroker as a backend for coco-kbs (a replacement of attestation-service for our needs).
I'm not sure what you mean when you refer to VirTEE in this scenario. VirTEE is simply an organization to host open source TEE projects. If you're referring to keybroker, since it uses the KBS protocol, the secure channel establishment follows the method of coco-kbs. |
@tylerfanelli - thank you so much for presenting on 6/18/24. Can you possibly share your slides from the presentation so they can be added to the meeting materials in this repo? You can either submit a PR to this repo, or you can share the slides with me, and I can create a PR on your behalf. |
@gkostal Thanks for allowing me to present! I can create a PR with the slides. |
I recently spoke at the latest CCC TAC meeting on how we're building confidential computing support in existing container projects:
https://youtu.be/hSQC9GWvK-M?list=PLmfkUJc39uMjaB_I1dYW72I44kr9QzG_B&t=3355
In that presentation, I spoke a bit about the remote attestation server we built to support this work, known as
keybroker
.keybroker
is still in its infancy, but I'd like to present its architecture to the Attestation SIG if given the opportunity.keybroker
will become an official VirTEE-supported project at some point.https://github.com/tylerfanelli/keybroker
In the meantime, I will add some documentation to the
keybroker
repository showing its architecture; and specifically, what it does different than existing attestation server implementations.The text was updated successfully, but these errors were encountered: