Skip to content

Conversation

@deeglaze
Copy link
Contributor

This is not a complete solution because the initial SVSM attestation protocol only supports binding to a storage EK. Both "AK" and "gceAK" conflict with this. There is no attestation and verification flow in go-tpm-tools for AKs that are certified by a CA with ActivateCredential. It is out of scope of this PR to add support for that.

As for the proposed SVSM_ATTEST_SINGLE_SERVICE_EX protocol addition that I expect to be usable from Linux with a "manifest_selector" configfs report attribute (https://github.com/deeglaze/amdese-linux/commits/vtpm612ex/), we have yet to get any specification update from AMD on how far their SVSM spec will diverge from my proposal implemented in coconut-svsm/svsm#719

deeglaze added 2 commits June 5, 2025 22:47
Later versions of Linux use a unified configfs interface for providing
architecture-specific TEE attestations. This new message encodes required
attributes as their own fields and optional attributes as pairs of
attribute name and value, separated by binary or readable.
This is insufficient since the attestation key is not going to be the
L-1 endorsement key.
@deeglaze deeglaze requested a review from jkl73 June 15, 2025 18:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant