You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have followed the kms tool example doc and decrypt the cipher text successfully, but I can decrypt it outside the Nitro enclave either if I add additional actions (including Decrypt action) within KMS policies when creating the KMS.
Is there a way that we can check if the "Decrypt" action only exists inside the enclave role (if not refuse to use the KMS)? It's important for a Byzantine Fault Tolerance program.
The following is a example KMS policy file that worked for the kms tool example doc with debug mode but can Decrypt outside the enclave:
In production mode, the enclave PCR values are in the attestation document. When using this SDK for decrypting inside the enclave, a keypair is also generated and the public part is sent to the attestation endpoint. There you have the validation based on the enclave measurements against your policy. After that, the response is encrypted and sent back and can only be decrypted by the enclave.
I have followed the kms tool example doc and decrypt the cipher text successfully, but I can decrypt it outside the Nitro enclave either if I add additional actions (including Decrypt action) within KMS policies when creating the KMS.
Is there a way that we can check if the "Decrypt" action only exists inside the enclave role (if not refuse to use the KMS)? It's important for a Byzantine Fault Tolerance program.
The following is a example KMS policy file that worked for the kms tool example doc with debug mode but can Decrypt outside the enclave:
The text was updated successfully, but these errors were encountered: