You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-essentials/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ learning_objectives:
12
12
13
13
prerequisites:
14
14
- An AArch64 or x86_64 computer running Linux. You can use cloud instances, see this list of [Arm cloud service providers](/learning-paths/servers-and-cloud-computing/csp/).
15
-
- Completion of the [Introduction to CCA Attestation with Veraison](/learning-paths/servers-and-cloud-computing/cca-veraison) Learning Path.
15
+
- Completion of [Get Started with CCA Attestation and Veraison](/learning-paths/servers-and-cloud-computing/cca-veraison) Learning Path.
16
16
- Completion of the [Run an application in a Realm using the Arm Confidential Computing Architecture (CCA)](/learning-paths/servers-and-cloud-computing/cca-container/) Learning Path.
17
17
18
18
author_primary: Arnaud de Grandmaison, Paul Howard, and Pareena Verma
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-essentials/cca-essentials.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ The role of the KBS is to be a repository for encryption keys or other confident
20
20
21
21
The workload that runs inside the realm is a client of the KBS. It calls the KBS to request a secret, but the KBS does not return the secret immediately. Instead, it issues an attestation challenge back to the client. The client must respond with evidence in the form of a [CCA attestation token](/learning-paths/servers-and-cloud-computing/cca-container/cca-container/#obtain-a-cca-attestation-token-from-the-virtual-guest-in-a-realm).
22
22
23
-
When the KBS receives an attestation token from the realm, it needs to call a verification service that checks the token's cryptographic signature and verifies that it denotes a confidential computing platform. As you saw in the prerequisite reading [Introduction to CCA Attestation with Veraison Learning Path](/learning-paths/servers-and-cloud-computing/cca-veraison), Linaro provides such an attestation verifier for use with pre-silicon CCA platforms. This verifier is built from the open-source[Veraison project](https://github.com/veraison). The KBS calls this verifier to obtain an attestation result. The KBS then uses this result to decide whether to release the secrets into the realm for processing.
23
+
When the KBS receives an attestation token from the realm, it needs to call a verification service that checks the token's cryptographic signature and verifies that it denotes a confidential computing platform. As you saw in the prerequisite reading Learning Path [Get Started with CCA Attestation and Veraison](/learning-paths/servers-and-cloud-computing/cca-veraison), Linaro provides such an attestation verifier for use with pre-silicon CCA platforms. This verifier is built from the Open-Source[Veraison project](https://github.com/veraison). The KBS calls this verifier to obtain an attestation result. The KBS then uses this result to decide whether to release the secrets into the realm for processing.
24
24
25
25
For additional security, the KBS does not release any secrets in clear text, even after a successful verification of the attestation token. Instead, the realm provides an additional public encryption key to the KBS. This is known as a wrapping key. The KBS uses this public key to wrap, which here means encrypt, the secrets. The client workload inside the realm is then able to use its own private key to unwrap the secrets and use them.
26
26
@@ -32,6 +32,6 @@ The attestation verification service is hosted by Linaro, so it is not necessary
32
32
33
33
Figure 1 demonstrates the software architecture that you will construct to run the attestation example.
34
34
35
-

35
+

36
36
37
37
You can now proceed to the next section to run the end-to-end attestation example with the software components and architecture as described here.
Copy file name to clipboardExpand all lines: content/learning-paths/servers-and-cloud-computing/cca-essentials/example.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,11 +59,11 @@ INFO Actix runtime found; starting in Actix runtime
59
59
INFO starting service: "actix-web-service-172.17.0.2:8088", workers: 16, listening on: 172.17.0.2:8088
60
60
```
61
61
62
-
With the key broker server running in one terminal, open up a new terminal in which you will run the key broker client in the next step.
62
+
With the Key Broker Server running in one terminal, open up a new terminal in which you will run the Key Broker Client in the next step.
63
63
64
64
## Run the Key Broker Client
65
65
66
-
In the new terminal that you have just opened, pull the docker container image that contains the FVP and pre-built software binaries to run the key broker client in a realm.
66
+
In the new terminal that you have just opened, pull the docker container image that contains the FVP and pre-built software binaries to run the Key Broker Client in a realm.
INFO Submitting evidence to URL http://172.17.0.2:8088/keys/v1/evidence/3974368321
152
152
INFO Attestation failure :-( ! AttestationFailure: No attestation result was obtained. No known-good reference values.
153
153
```
154
-
You can see from the key broker client application output that the `skywalker` key is requested from the key broker server, which did send a challenge.
154
+
You can see from the Key Broker client application output that the `skywalker` key is requested from the Key Broker Server, which did send a challenge.
155
155
156
-
The key broker client application uses the challenge to submit its evidence back to the key broker server, but it receives an attestation failure. This is because the server does not have any known good reference values.
156
+
The Key Broker Client application uses the challenge to submit its evidence back to the Key Broker Server, but it receives an attestation failure. This is because the server does not have any known good reference values.
157
157
158
-
Now look at the key broker server output on the terminal where the server is running. It will look like this:
158
+
Now look at the Key Broker Server output on the terminal where the server is running. It will look like this:
159
159
160
160
```output
161
161
INFO Known-good RIM values are missing. If you trust the client that submitted
@@ -164,23 +164,23 @@ command-line option to populate it with known-good RIM values:
INFO Evidence submitted for challenge 1302147796: no attestation result was obtained. No known-good reference values.
166
166
```
167
-
From the server output, you can see that it did create the challenge for the key broker application, but it reports that it has no known good reference values.
167
+
From the server output, you can see that it did create the challenge for the Key Broker application, but it reports that it has no known good reference values.
168
168
169
-
It does however provide a way to provision the key broker server with known good values if the client is trusted.
169
+
It does however provide a way to provision the Key Broker Server with known good values if the client is trusted.
170
170
171
-
In a production environment, the known good reference value is generated using a deployment- specific process, but for demonstration purposes and simplification, you will use the value proposed by the key broker server.
171
+
In a production environment, the known good reference value is generated using a deployment- specific process, but for demonstration purposes and simplification, you will use the value proposed by the Key Broker Server.
172
172
173
-
Now go ahead and terminate the running instance of the key broker server using Ctrl+C and restart it with the known good reference value.
173
+
Now go ahead and terminate the running instance of the Key Broker Server using Ctrl+C and restart it with the known good reference value.
174
174
175
-
Notice here that you need to copy the `--reference-values` argument directly from the previous error message reported by the key broker.
175
+
Notice here that you need to copy the `--reference-values` argument directly from the previous error message reported by the Key Broker.
176
176
177
177
When running the next command, ensure that you are copying the exact value reported, for example:
0 commit comments