16. May 2023 #1339
dimakuv
started this conversation in
Meeting notes
16. May 2023
#1339
Replies: 2 comments 16 replies
-
// I couldn't join the call so I only know what's in these notes.
How is that related to this case? I don't see any connection. In that case someone just put 10 unrelated changes inside a single commit, it doesn't matter if we merged or rebased it. |
Beta Was this translation helpful? Give feedback.
2 replies
-
On fully dropping Ubuntu 18.04 support, let's announce our plan on gitter channel to reach active users and see if anyone complains. |
Beta Was this translation helpful? Give feedback.
14 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Agenda
(please write your proposed agenda items in comments under this discussion)
Dmitrii: new API in RA-TLS to extract additional data (in addition to
/dev/attestation/quote
)? Case in point: the JSON Web Token (JWT) sent back by Microsoft Azure Attestation, see [Integrations/azure] Add RA-TLS/SecretProv libs for MAA contrib#38RA_TLS_MAA_JWT
(no need for changes in core Gramine repo)ra_tls_verify_callback_results
with a pointer to such blobs (needs changes in core Gramine repo)Dmitrii: removing support for Ubuntu 18.04 completely
Dmitrii: Syscall entry point in Gramine and XSAVE preservation problem
gramine/libos/src/arch/x86_64/syscallas.S
Lines 14 to 19 in 4946a0b
Benny: documentation reorganization PRs
Benny: 1 huge PR was split into several smaller PRs: 2 PRs already merged, 1 PR pending, then 1 more PR.
Woju: side note but the "linear commit history" decision is not working that well now. Woju votes for allowing merge commits. This is offtopic anyway, this discussion could be postponed for later.
Dmitrii: new API in RA-TLS to extract additional data
[ Dmitrii describes the problem as described in #1292 ]
Mona: this assumes that Gramine already got the JWT (token) from some peer/verifier. But how do we get the JWT from the peer in the first place?
Woju: What Dmitrii describes is that the token is the authentication credential that is used after the attestation, to gain access to some other resources.
Woju: Are there similar approaches to gain access to resources? Dmitrii: the only thing I know about is Edgeless Marblerun Premain trick; but this is only at startup and not generic enough.
Woju: I'd like to put things that are not part of the hardware contract/spec not under
/dev/attestation/
. So Woju would keep it outside of core Gramine.Woju: we can have a switch for RA-TLS generation of X.509 cert: that it shouldn't hard-code SGX quote path
/dev/attestation/quote
but it can have any path. So this path doesn't need to be under/dev/attestation/
, but it can be e.g. a tmpfs file/tmp/gramine/token
, populated beforehand by the app itself or by the RA-TLS variant.Mona: with Interoperable RA-TLS, we have an extensible format of the evidence inside the X.509 cert. So we could ask the Interoperable RA-TLS committee to add new evidence types like MAA JWT tokens. Then RA-TLS would need to also get the evidence type as the input (maybe a new function argument? or something like this).
Woju: we'd like to keep the RA-TLS general code (that is developed together with core Gramine) to be generic and usable by all those different plugins and verification schemes. So looks like we don't need changes in core Gramine, but need some generic changes to RA-TLS.
Dmitrii: Please check the Interoperable RA-TLS standard: https://confidentialcomputing.io/2023/03/06/unifying-remote-attestation-protocol-implementations/.
Removing support for Ubuntu 18.04 completely
Mariusz and Scott: can be aggressive and remove all the quirks of 18.04.
Beta Was this translation helpful? Give feedback.
All reactions