-
Notifications
You must be signed in to change notification settings - Fork 64
Mutual Attestation #50
Comments
Hi, I believe you should first move all the crypto verifications to the enclave (that is the IAS response signature check here, and the message processing in the SP). Once this is done, you'll have to adapt a little bit the protocol provided by the SDK. I believe sending a quote from the second enclave containing a hash of Edit: to add some security, you may also sign your quote with the SPK key. |
actually, you donot check the value from peer enclave's mr_enclave, so which you are making a attestation maybe not that you want to connect. the question is how to distinguish the peer enclave's identity. and what you do same as a remote attestation. thanks ! |
An easier solution could be to:
This way you should be ensured all entities are correct (A=A' and B=B') and both are attested. |
@GuilhemN |
Isn't it sufficient to check mrsigner, prodid and isvsvn? |
|
Well it depends to what extent you trust your signature, if the private key you're signing with is well protected there is no way an attacker could create a fake enclave reproducing your mrsigner. Besides you can specify which enclave you are communicating with using the prodId (it is also protected by your signature and thus cannot be modified). |
yeah,if we can not guarantee that the private key is protected safely,so we need to check mrenclave value. in this way , we can not check the value of the peer's mrenclave, because mrenclave value need to be coded in enclave at building time for mutual attestation. thank for you reply |
Hi,
if we need to do a attestation between two enclaves from different platform that they all untrust each other, what's different from remote attestation.beacause our platform consists of multiple enclave services and most of the enclave-to-enclave RPC communications need bidirectional authentication.
thanks !
The text was updated successfully, but these errors were encountered: