Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

create rootfs_key dynamically and seal it #149

Closed
4 tasks done
mythi opened this issue May 11, 2023 · 4 comments · Fixed by #312
Closed
4 tasks done

create rootfs_key dynamically and seal it #149

mythi opened this issue May 11, 2023 · 4 comments · Fixed by #312
Assignees

Comments

@mythi
Copy link
Contributor

mythi commented May 11, 2023

We have been waiting for #20 but in the mean time, let's work on something simpler to get rid of the static rootfs_key.

The proposal is to create rootfs_key dynamically and seal with with MRSIGNER key from Occlum's getkey ioctl().

Steps:

@dcmiddle
Copy link
Member

@piotrpalcz fyi

@Xynnn007
Copy link
Member

Let me try to understand this:

  1. Enclave-agent generates a key randomly, seal the key and then put the encrypted key to /run/enclave-cc/<containerd_id>
  2. runtime boot get the key from /run/enclave-cc/<containerd_id> and unseal it

This implies that the enclave-agent and runtime boot are signed by the same signer, right?

@mythi
Copy link
Contributor Author

mythi commented May 25, 2023

@Xynnn007 yes your summary is correct

@mythi mythi moved this to 🏗 In progress in CoCo Releases Jun 16, 2023
@ariel-adam
Copy link
Member

@mythi will this converge for release 0.7.0 (feature freeze 12th of July) or should we move this to 0.8.0?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
4 participants