enclaveos/README.md

55 lines
1.8 KiB
Markdown
Raw Permalink Normal View History

2022-09-07 21:46:49 +00:00
# EnclaveOS #
2024-02-17 16:42:39 +00:00
<https://git.distrust.co/public/enclaveos>
## About ##
A minimal, immutable, and deterministic Linux unikernel build system targeting
various Trusted Execution Environments for use cases that require high security
and accountability.
This is intended as a reference repository which could serve as a boilerplate
to build your own hardened and immutable operating system images for high
security applications.
## Platforms ##
2022-09-07 21:51:25 +00:00
| Platform | Target | Status | Verified boot Method |
|----------------------------|:-------:|:--------:|:---------------------:|
2024-02-17 16:42:39 +00:00
| AWS Nitro Enclaves | aws | booting | Nitro attestation API |
2022-09-07 21:51:25 +00:00
| GCP Confidential Compute | gcp | research | vTPM 2.0 attestation |
| Azure Confidential VMs | azure | research | vTPM 2.0 attestation |
2024-02-17 16:42:39 +00:00
| Generic/Qemu | generic | research | vTPM 2.0 attestation |
## Features ##
* Immutability
* Root filesystem is a CPIO filesystem extracted to a RamFS at boot
* Minimalism
* < 5MB footprint
* Nothing is included but a kernel and your target binary by default
* Sample "hello world" included as a default reference
* Debug builds include busybox init shim and drop to a shell
* Determinism
* Multiple people can build artifacts and get identical hashes
* Allows one to prove distributed artifacts correspond to published sources
* Hardening
* No TCP/IP network support
* Favor using a virtual socket or physical interface to a gateway system
* Most unessesary kernel features are disabled at compile time
* Follow [Kernel Self Protection Project](kspp) recommendations
[ kspp]: https://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
## Development ##
### Requirements ###
* 10GB+ free RAM
* Docker 20+
* GNU Make
2024-02-17 16:42:39 +00:00
### Build
```
2024-02-17 16:42:39 +00:00
make