-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create types for validation of an SNP attestation #2
Comments
jsyk we are thinking we might want to use this library to help implement this confidential-containers/trustee#191 for the Confidential Containers Attestation Service. This will require SNP support. Is that something you are planning on adding at some point? We might also be able to contribute something here. |
@tylerfanelli like @fitzthum mentioned, I have code I would be more than happy to provide some PRs for to help integrate SNP support. |
Hi @fitzthum and @larrydewey . I'm actually working on SNP attestation support in libkrun at the moment, much of that work would fit well into this library. Yes, I'd be very interested in receiving some PRs to help with SNP support. Likewise, I have some contributions as well that are upcoming. |
Shameless plug: just pointing out that there's a Python package/utility to compute SNP measurements at https://github.com/IBM/sev-snp-measure . It doesn't work as-is for libkrun because memory structures are different (maybe I can add support, PRs welcome ;-), but it should have all the building blocks. Might be helpeful as another reference implementation. |
Yeah there's a question about scope here. It's one thing to verify the signature of the report, but we will also want to verify the launch digest (what @dubek's Python package does). Is this in scope of this crate? It would require taking in the full fw binary, possibly some hashes for direct boot stuff, and the CPU count, and calculating the running hash of the VMSAs and the fw. |
I'd say so. For plain SEV, @tylerfanelli @crobinso What do you think? |
Agreed. This would be helpful as well, I'll look into adding this.
Or perhaps split session into
|
enarx-archive/sev#75
The text was updated successfully, but these errors were encountered: