-
Notifications
You must be signed in to change notification settings - Fork 7
Open
Labels
documentationImprovements or additions to documentationImprovements or additions to documentationquestionFurther information is requestedFurther information is requested
Description
Checking the documentation for attested TLS, I have the following questions:
- It is never mentioned whether the solution is pre-/intra-/post-handshake attestation.
- Why do you send nonce as SNI? This is mentioned in figures but never explained.
- Is certificate self-signed? If yes, skip questions 4 onwards. The documentation says:
The relying party uses the Cocos CLI to verify the self-signed (or CA-signed) certificate and the attestation report that is part of it.
But the two cases are quite different. Why do you "verify" a self-signed certificate?
- What is the "long-term identity" of the CC workload? How is "long-term identity" assigned to the CC workload? Which entity supplies this "long-term identity"? How is that Identity Supplier trusted?
- How is CA-certified Long-Term Key (LTK) injected in the Confidential Computing workload in the first place? Which entity generates the LTK and how is that entity trusted?
- How does the Verifying RP (RP+Verifier) get the public keys and reference values?
Reactions are currently unavailable
Metadata
Metadata
Labels
documentationImprovements or additions to documentationImprovements or additions to documentationquestionFurther information is requestedFurther information is requested