2024-05-08 CCA - Attestation Verifier
Date and Time: May 8, 2024 14:00 UTC
Calendar invite? Register here and we’ll send you an invite shortly after you’ve registered.
Meeting and connection details
Join Zoom Meeting
https://linaro-org.zoom.us/j/99184594168?pwd=eklPZlBmUDB3VEd6VngxOWpMTXdvZz09
Meeting ID: 991 8459 4168
Passcode: 13371337
Find your local number: https://linaro-org.zoom.us/u/acGNPcsIS9
Attendees
Agenda
Meeting overview
Recording: We’ll record the meeting, if you object, please let us now. Link and password will be added to this page (see sections further down).
Goal with today’s meeting: Better understand what needs to be done and when, when it comes to leveraging the Arm Confidential Compute Architecture (CCA) in an Attestation Verifier architecture.
Background
Confidential Computing aims to provide users with an additional layer of protection by raising the standards above our traditional platforms. It will accomplish this by utilizing a combination of novel hardware and software features. Within the Arm architecture, this is the Arm Confidential Compute Architecture (CCA).
Although we anticipate using the hardware and writing software for it pose challenges, there is more too it. To be able to use this there is a need for an ecosystem around it as well. Imagine that a Cloud Service Provider (CSP) have invested in CCA capable hardware and tell their partners and customers that they can start using this. At that point the partners and customers will obviously ask:
How can we know for sure that you have hardware that is capable of this?
How can we know for sure that no-one have tampered the hardware?
How can we know for sure that the claims you give is in for of evidence are trustworthy?
How are we actually going to use this?
Are there services ready that we can use? How?
Interoperability: Is this working with other CC solutions from other architecture vendors?
… and so on.
The takeaway is that to be able to fully leverage CCA enabled devices, we will need an ecosystem around it! Working on that as soon as possible would probably make sense so that we have something ready to go whenever CCA enabled devices become widely available.
Remote ATtestation ProcedureS (RATS)
The draft-ietf-rats-architecture is a set of specifications for remote attestation that is developed by the IETF Remote ATtestation ProcedureS (RATS) Working Group. Their goal is to establish standard formats for describing evidence and attestation results, as well as the processes and protocols required to send attestation results to a relying party and evidence for evaluation to a verifier. They also want to standardize reference values and endorsement formats.
RFC9334 is the RFC release early 2023 that describes the Attestation Verification architecture.
Veraison
The Veraison project, builds software components for the construction of an Attestation Verification Service.
Would this be a good starting point for the work? If not why? Is there anything else that we can (re-)use to avoid having to rewrite everything from scratch?
Files, presentations and recording
Recording
Slides
Notes
In general, please see recording.
Chat
Please see recording.