Skip to content
This repository has been archived by the owner on Mar 28, 2024. It is now read-only.

Commit

Permalink
More last-minute changes
Browse files Browse the repository at this point in the history
  • Loading branch information
rjzak committed Mar 27, 2024
1 parent 0687e6a commit 6c44498
Showing 1 changed file with 7 additions and 9 deletions.
16 changes: 7 additions & 9 deletions main.tex
Original file line number Diff line number Diff line change
Expand Up @@ -65,9 +65,6 @@ \section{Enarx}
\item Others can be supported, like ARM \href{https://www.arm.com/architecture/security-features/arm-confidential-compute-architecture}{CCA}, etc.
\end{itemize}
\item has a very small TCB (Enarx + Wasmtime, your workload)
\begin{itemize}
\item No third-party firmware in the guest.
\end{itemize}
\item is written in Rust
\item can run on Windows, macOS, and ARM Linux without a TEE\footnote{Without protection, for testing \& development}
\item open source project, Apache 2.0 licensed
Expand All @@ -79,8 +76,8 @@ \section{Enarx}
\begin{itemize}
\item Portability: The same binary works on different platforms (SGX or SNP, ARM or x86\_64, for example). The binary doesn't need to know, or care, which platform is in use.
\item Flexibility: Programming language options, including C/C++, Go, Rust, Typescript, Ruby, Zig, others.
\item Security: Wasi cannot open sockets or files, this has to be done on behalf of the WebAssembly runtime (Enarx uses \href{https://wasmtime.dev}{Wasmtime}), so there's no way the program could perform unknown network activity, or ``phone home'' without the operator's knowledge.
\item Confidential Computing provides data security, and the use of WebAssembly transforms the application into data, providing application security.
\item Security: Wasi cannot open sockets or files, this has to be done on behalf of the WebAssembly runtime (Enarx uses \href{https://wasmtime.dev}{Wasmtime}), no possibility for unexpected network activity.
\item Confidential Computing provides data privacy \& WebAssembly transforms the application into data, adding application privacy.
\end{itemize}
\end{frame}

Expand Down Expand Up @@ -146,7 +143,7 @@ \section{Attestation via CSR}

\subsection{AMD}
\begin{frame}{AMD}
The AMD CSR has a few additional items to check:
The AMD CSR Extension has a few additional items to check:
\begin{itemize}
\item Ensure unused parts of the report are zeroed
\item AMD has Policy Flags to check:
Expand All @@ -160,7 +157,7 @@ \subsection{AMD}

\subsection{Intel}
\begin{frame}{Intel}
Intel's format is rather different:
The Intel Extension has additional checks:
\begin{itemize}
\item The Intel TCB\footnote{Trusted Computing Base} report is sent as part of the CSR, and requires the ``fmspc''\footnote{Family-Model-Stepping-Platform Type-CustomSKU}, which identifies the hardware, and checks:
\begin{itemize}
Expand Down Expand Up @@ -203,7 +200,7 @@ \section{Workflow}
\only<1> {
\begin{enumerate}
\item Administrator deploys an application from Drawbridge by name \& hash
\item Enarx talks to Drawbridge and gets the URL of the Steward
\item Enarx contacts Drawbridge and gets the URL of the Steward
\item Enarx gets the hash of the intended workload
\item Enarx creates an empty Keep
\item Enarx asks the CPU for an attestation report with workload hash
Expand Down Expand Up @@ -240,11 +237,12 @@ \section{Drawbacks of CSR}
\begin{frame}{Drawbacks of Attestation via CSR}
The Steward CA has to be trusted:
\begin{itemize}
\item added the Steward CA to the operating system's list of CAs, or modify the 2nd party application to only allow this specific CA;
\item added the Steward CA to the operating system's list of CAs, or modify the 2\textsuperscript{nd} party application to only allow this specific CA;
\item any configuration of the Steward isn't known to the relying party:
\begin{itemize}
\item any allowed vulnerabilities in the firmware?
\item allowed versions of Enarx?
\item how to address configuration with non-Enarx-based attestation?
\end{itemize}
\end{itemize}
\end{frame}
Expand Down

0 comments on commit 6c44498

Please sign in to comment.