Skip to content

Ambiguities in attested TLS specification #127

@muhammad-usama-sardar

Description

@muhammad-usama-sardar

Checking the documentation for attested TLS, I have the following questions:

  1. It is never mentioned whether the solution is pre-/intra-/post-handshake attestation.
  2. Why do you send nonce as SNI? This is mentioned in figures but never explained.
  3. Is certificate self-signed? If yes, skip questions 4 onwards. The documentation says:

The relying party uses the Cocos CLI to verify the self-signed (or CA-signed) certificate and the attestation report that is part of it.

But the two cases are quite different. Why do you "verify" a self-signed certificate?

  1. What is the "long-term identity" of the CC workload? How is "long-term identity" assigned to the CC workload? Which entity supplies this "long-term identity"? How is that Identity Supplier trusted?
  2. How is CA-certified Long-Term Key (LTK) injected in the Confidential Computing workload in the first place? Which entity generates the LTK and how is that entity trusted?
  3. How does the Verifying RP (RP+Verifier) get the public keys and reference values?

Metadata

Metadata

Labels

documentationImprovements or additions to documentationquestionFurther information is requested

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions