Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parse and verify the signed Attestation Document #4

Open
petreeftime opened this issue Dec 1, 2020 · 6 comments
Open

Parse and verify the signed Attestation Document #4

petreeftime opened this issue Dec 1, 2020 · 6 comments
Labels
enhancement New feature or request

Comments

@petreeftime
Copy link
Contributor

Given a COSE binary, provide an API to extract the Attestation Document from it and verify the signature against a given root(s) of trust.

@peiwenhu
Copy link

Hi, what's the status of this? Is there some existing library that helps verify an attestation document? thanks

@dreemkiller
Copy link

I have written something up that solves this issue for me, perhaps you will find it helpful (until AWS does it "officially" and "supported", in which case, definitely use theirs:
https://github.com/veracruz-project/nitro-enclave-attestation-document

@peiwenhu
Copy link

Thanks! That's very helpful

@paholg
Copy link

paholg commented Feb 15, 2022

@petreeftime would you accept a PR that incorporates @dreemkiller's solution?

@richardfan1126
Copy link

I had written similar code in Python for this purpose: https://github.com/richardfan1126/nitro-enclave-python-demo/blob/master/attestation_verifier/secretstore/attestation_verifier.py

Given that verifying attestation documents is mostly the task of an external component which doesn't directly work with NSM, should this feature included in nsm-lib? Or should it be included in some other external tools like Nitro CLI?

@dreemkiller
Copy link

I've also written some golang that does this: https://github.com/veracruz-project/go-nitro-enclave-attestation-document

I'm not sure the best place to put an "AWS Approved" parser/verifier.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

6 participants