Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Key attestation support for cloud secure area keys. #777

Merged
merged 1 commit into from
Nov 14, 2024

Conversation

sorotokin
Copy link
Contributor

@sorotokin sorotokin commented Nov 13, 2024

Support openid4vci key attestations for cloud secure area.

Follow the logic for Android key attestations.

Other options considered: let cloud secure area create openid4vci-compatible attestation JWT. Rejected because we would need to modify CSA APIs to specifically accommodate openid4vci parameters (i.e. client id) and idiosyncrasies (i.e. openid4vci attestations are per-batch, not per-key).

Tested with both cloud and android keys.

@sorotokin sorotokin force-pushed the cloud-secure-area-attestation branch from aa6eec9 to 3055c5a Compare November 13, 2024 01:25
@sorotokin sorotokin requested a review from kdeus November 13, 2024 01:28
nonce: String,
trustedRootKeys: Set<ByteString>
) {
val x509Certs = chain.certificates
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Optional:
We have this same code block in validateKeyAttestation (and several other functions, such as validateCloudBindingKeyAttestation). Could we move it into a shared verifyCertChain function?

Actually, it looks like most of this is identical to validateCloudBindingKeyAttestation (except for some handling of the root cert). Is there a clean way to move most of it to shared functions?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Factored out verifyCertChain. Extension processing is going probably to be more sophisticated and different for different attestations (we need to extract some data as we validate as well). For iOS it will probably be a different format (not a cert chain) altogether. Not sure how much more common we want this to be.

@sorotokin sorotokin force-pushed the cloud-secure-area-attestation branch from 3055c5a to 36e8e61 Compare November 14, 2024 20:28
@sorotokin sorotokin merged commit e3d2252 into main Nov 14, 2024
5 checks passed
@sorotokin sorotokin deleted the cloud-secure-area-attestation branch November 14, 2024 20:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants