How can challenger verify code executed inside the enclave ? #1129
Replies: 2 comments 2 replies
-
You mix a lot of different things here. Let's clear the terminology first.
Now, knowing this information, let's answer your question.
IAS doesn't verify this. IAS only verifies that the SGX quote was produced by a good well-known SGX hardware, which is up-to-date and runs good well-known QE. This job is done by the trusted machine itself -- it must check the SGX quote. Gramine provides mechanisms for this, the most important one being RA-TLS. In particular, there are two ways to check the SGX quote's enclave measurements:
|
Beta Was this translation helpful? Give feedback.
-
Thank you for your help. I'm still a bit confused about the check that is done by the challenger. RA-TLS creates a pipeline between the TEE and challenger. I assume that the challenger can send data and code to the TEE with this connection. But is it possible for the challenger to verify and use code that is already inside the TEE ? If yes, how can the challenger check that the code is not leaking secret data ? Does he need to have access to the code and check some kind of hashed value ? |
Beta Was this translation helpful? Give feedback.
-
Hey, this is a more high level question to understand how attestations work.
If I understand correctly, when SGX report is send over to the trusted machine, it has to be verified by IAS and the challenger is not able to extract information from this report. It is important for the challenger to be able to trust the code run inside the enclave. My question is: How can IAS verify that this code does not reveal any secret information and does what the challenger allows ?
Thank you
Beta Was this translation helpful? Give feedback.
All reactions