Skip to content
This repository has been archived by the owner on Jan 26, 2024. It is now read-only.
/ sev-guest Public archive

Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.

License

Notifications You must be signed in to change notification settings

AMDESE/sev-guest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

⚠ Deprecated ⚠

With the release of tooling by the VirTEE organization, this tool is now considered deprecated. Consult the following table for replacement tooling:

Technologies Replacement
Complete Library Support sev
Legacy SEV and SEV-ES sevctl
SEV-SNP Guest Tooling snpguest
SEV-SNP Host Tooling snphost

SEV-SNP Attestation Examples

This repository contains source, scripts, and configuration files for several open source tools that can be used together to demonstrate one way to perform remote attestation of SEV-SNP guests.

Note that these materials are intended for educational use only and come with no guarantee of fitness for any purpose.

Architectural Overviews

Architectural discussions and security considerations for each example are available in the docs directory. Currently, this repository contains the following examples:

  • SSH Key Exchange: Using remote attestation to securely exchange SSH public keys.
  • Encrypted Disk Unlock: Using remote attestation to retrieve a disk encryption key and unlock an encrypted root filesystem.

Example Setup

Installation instructions for the cloud host and the Guest Owner infrastructure are outlined below. Note that for simplicity, these two servers can be the same physical machine.

Future Work

Future updates to this repository will include additional examples of how to perform the following tasks:

  • Construct the ID Block for the SNP guest. (Done. Documentation pending. See sev-host-identity --help for more information.)
  • Verify the ID Block in the attestation report. (in progress)
  • Shift the attestation flow to the initrd and receive a disk encryption key. (Done. Documentation pending. See attestation/cryptsetup-initramfs)

Resources

  1. AMD SEV-SNP ABI Specification (PDF)
  2. AMD Signing Key (ASK) and AMD Root Key (ARK) Certificates for Milan Processors

About

Tools, scripts, and configuration files necessary to demonstrate an end-to-end remote attestation example with SEV-SNP.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published