Base Attestation #1

Open
opened 2025-09-09 02:13:29 +00:00 by ryan · 0 comments
Owner
  • Client initiates TLS session, proxied from TCP/IP to vsock, with bootproofd
  • Ensure TLS session is bound properly by performing TLS Channel Binding with EKM as userdata in attestation document, helps with MITM
  • Client should request data from a service it wants to connect to, such as a HTTPS certfp, or Keyfork signing key
  • Client can access third-party endpoint or long-lived key to validate attestation
* Client initiates TLS session, proxied from TCP/IP to vsock, with bootproofd * Ensure TLS session is bound properly by performing TLS Channel Binding with EKM as userdata in attestation document, helps with MITM * Client should request data from a service it wants to connect to, such as a HTTPS certfp, or Keyfork signing key * Client can access third-party endpoint or long-lived key to validate attestation
Sign in to join this conversation.
No Label
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: public/bootproof#1
No description provided.