se-attester: use SHA-512 for report data in IBM SEL#1469
Conversation
271d190 to
1033788
Compare
The Trustee PR is also set to depend on this one. To avoid the circular dependency, can this be mode so that se-attester uses sha384 hash algo with old Trustee that does not give you could |
Yeah, I am aware of it, unfortunately. For this, the attestation service should keep memorizing which hash algorithm is selected for the extra_params for each attestation challenge and pass the info to a verifier for validation of the report data, which leads to non-marginal changes. I think we can deal with it separately. Or does it make sense to make a fallback for the validation in the verifier side? What do you think @Xynnn007 about this?
Good idea! This also makes the unit tests look nice and clear. I will update the PR. Thanks! |
Let's first distinguish a few concepts before looking at what the current PR is doing. First, the current Attester abstracts the TEE's report retrieval capability into a black box. For architectures like TDX/SNP, there's a challenge parameter called As for So, in this PR, the change is for low-level black box to implement IBM SE's |
3273635 to
9b8555a
Compare
Xynnn007
left a comment
There was a problem hiding this comment.
LGTM! Thanks @BbolroC
Note that this is a breaking change for IBM SE architecture.
Also, with a deep diving to code, I realize now SE could now support composite attestation. The SeAttestationRequest.runtime_data_digest can be set in the kbs_protocol for IBM SE. This work can be done a separate PR.
|
btw let's merge this when confidential-containers/trustee#1338 is ready also, for there are breaking changes and we need the compability for both side. |
095dbe5 to
b9f82d4
Compare
ec00d6e to
d8694fe
Compare
|
Note that confidential-containers/trustee#1338 gets merged |
mythi
left a comment
There was a problem hiding this comment.
Looks OK. Have you tested this with existing Trustee releases?
Yes, I tested it with the latest push for both. It works. But not working with the current Trustee (the version before confidential-containers/trustee#1338 is merged) as @Xynnn007 explained above. |
Extract the process_runtime_digest() helper function from the SE attester into a general-purpose utility function. Signed-off-by: Hyounggyu Choi <Hyounggyu.Choi@ibm.com>
Use more secure SHA-512 algorithm for report data in IBM SEL instead of the fallback algorithm SHA-384. Signed-off-by: Hyounggyu Choi <Hyounggyu.Choi@ibm.com>
d8694fe to
aaed09f
Compare
This PR uses more secure SHA-512 algorithm for report data in IBM SEL instead of the fallback algorithm SHA-384.
As small refactor, it also extracts the process_runtime_digest() helper function from the SE attester into a general-purpose utility function.
Depends-on: confidential-containers/trustee#1338
Signed-off-by: Hyounggyu Choi Hyounggyu.Choi@ibm.com