|
| 1 | +--- |
| 2 | +# User change |
| 3 | +title: "Run an end-to-end Attestation with Arm CCA" |
| 4 | + |
| 5 | +weight: 3 # 1 is first, 2 is second, etc. |
| 6 | + |
| 7 | +# Do not modify these elements |
| 8 | +layout: "learningpathall" |
| 9 | +--- |
| 10 | + |
| 11 | +## Run the Key Broker Server |
| 12 | + |
| 13 | +The concept of a KBS is a common one in confidential computing, and there are multiple open-source implementations, including the [Trustee](https://github.com/confidential-containers/trustee) from the [CNCF Confidential Containers](https://confidentialcontainers.org/) project. The KBS in this learning path is part of the [Veraison](https://github.com/veraison) project. It has been created specifically for educational purposes and not designed for production use. Its aim is to be small and simple to understand. |
| 14 | + |
| 15 | +First, pull the docker container image with the pre-built KBS and then run the container: |
| 16 | + |
| 17 | +```bash |
| 18 | +docker pull armswdev/cca-learning-path:cca-key-broker-v1 |
| 19 | +docker run --rm -it armswdev/cca-learning-path:cca-key-broker-v1 |
| 20 | +``` |
| 21 | + |
| 22 | +Now within your running docker container, get a list of network interfaces: |
| 23 | + |
| 24 | +```bash |
| 25 | +ip -c a |
| 26 | +``` |
| 27 | + |
| 28 | +The output should look like: |
| 29 | + |
| 30 | +```output |
| 31 | +1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 |
| 32 | + link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 |
| 33 | + inet 127.0.0.1/8 scope host lo |
| 34 | + valid_lft forever preferred_lft forever |
| 35 | + inet6 ::1/128 scope host |
| 36 | + valid_lft forever preferred_lft forever |
| 37 | +20: eth0@if21: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default |
| 38 | + link/ether 02:42:ac:11:00:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0 |
| 39 | + inet 172.17.0.2/16 brd 172.17.255.255 scope global eth0 |
| 40 | + valid_lft forever preferred_lft forever |
| 41 | +``` |
| 42 | +Start the key broker server on the `eth0` network interface: |
| 43 | + |
| 44 | +```bash |
| 45 | +./keybroker-server -v --addr 172.17.0.2 |
| 46 | +``` |
| 47 | + |
| 48 | +The output should look like: |
| 49 | + |
| 50 | +```output |
| 51 | +INFO starting 16 workers |
| 52 | +INFO Actix runtime found; starting in Actix runtime |
| 53 | +INFO starting service: "actix-web-service-172.17.0.2:8088", workers: 16, listening on: 172.17.0.2:8088 |
| 54 | +``` |
| 55 | + |
| 56 | +With the key broker server running in one terminal, open up a new terminal in which you will run the key broker client. |
| 57 | + |
| 58 | +## Run the Key Broker Client |
| 59 | + |
| 60 | +In a new terminal, pull the docker container image which contains the FVP and pre-built software binaries to run the key broker client in a realm. |
| 61 | + |
| 62 | +```bash |
| 63 | +docker pull armswdev/cca-learning-path:cca-simulation-v1 |
| 64 | +``` |
| 65 | + |
| 66 | +Now run this docker container: |
| 67 | +```bash |
| 68 | +docker run --rm -it armswdev/cca-learning-path:cca-simulation-v1 |
| 69 | +``` |
| 70 | + |
| 71 | +Within you running container, launch the `run-cca-fvp.sh` script to run the Arm CCA pre-built binaries on the FVP: |
| 72 | + |
| 73 | +```bash |
| 74 | +./run-cca-fvp.sh |
| 75 | +``` |
| 76 | +The run-cca-fvp.sh script uses the screen command to connect to the different UARTs in the FVP. |
| 77 | + |
| 78 | +You should see the host Linux kernel boot on your terminal. You will be prompted to log in to the host. Enter root as the username: |
| 79 | + |
| 80 | +```output |
| 81 | +[ 4.169458] Run /sbin/init as init process |
| 82 | +[ 4.273748] EXT4-fs (vda): re-mounted 64d1bcff-5d03-412c-83c6-48ec4253590e r/w. Quota mode: none. |
| 83 | +Starting syslogd: OK |
| 84 | +Starting klogd: OK |
| 85 | +Running sysctl: OK |
| 86 | +Starting network: [ 5.254843] smc91x 1a000000.ethernet eth0: link up, 10Mbps, half-duplex, lpa 0x0000 |
| 87 | +udhcpc: started, v1.36.1 |
| 88 | +udhcpc: broadcasting discover |
| 89 | +udhcpc: broadcasting select for 172.20.51.1, server 172.20.51.254 |
| 90 | +udhcpc: lease of 172.20.51.1 obtained from 172.20.51.254, lease time 86400 |
| 91 | +deleting routers |
| 92 | +adding dns 172.20.51.254 |
| 93 | +OK |
| 94 | +
|
| 95 | +Welcome to the CCA host |
| 96 | +host login: root |
| 97 | +(host) # |
| 98 | +``` |
| 99 | +Use kvmtool to launch guest Linux in a Realm: |
| 100 | +```bash |
| 101 | +cd /cca |
| 102 | +./lkvm run --realm --disable-sve --irqchip=gicv3-its --firmware KVMTOOL_EFI.fd -c 1 -m 512 --no-pvtime --force-pci --disk guest-disk.img --measurement-algo=sha256 --restricted_mem |
| 103 | +``` |
| 104 | +You should see the realm boot. After boot up, you will be prompted to log in at the guest Linux prompt. Use root again as the username: |
| 105 | + |
| 106 | +```output |
| 107 | +Starting syslogd: OK |
| 108 | +Starting klogd: OK |
| 109 | +Running sysctl: OK |
| 110 | +Starting network: udhcpc: started, v1.36.1 |
| 111 | +udhcpc: broadcasting discover |
| 112 | +udhcpc: broadcasting select for 192.168.33.15, server 192.168.33.1 |
| 113 | +udhcpc: lease of 192.168.33.15 obtained from 192.168.33.1, lease time 14400 |
| 114 | +deleting routers |
| 115 | +adding dns 172.20.51.254 |
| 116 | +OK |
| 117 | +
|
| 118 | +Welcome to the CCA realm |
| 119 | +realm login: root |
| 120 | +(realm) # |
| 121 | +``` |
| 122 | + |
| 123 | +Now run the key broker client application in the realm. Use the endpoint address that the key broker server is listening on in the other terminal: |
| 124 | +```bash |
| 125 | +cd /cca |
| 126 | +./keybroker-app -v --endpoint http://172.17.0.2:8088 skywalker |
| 127 | +``` |
| 128 | +In the command above `skywalker` is the key name that is requested from the key broker server. After some time, you should see the following output: |
| 129 | +``` |
| 130 | +INFO Requesting key named 'skywalker' from the keybroker server with URL http://172.17.0.2:8088/keys/v1/key/skywalker |
| 131 | +INFO Challenge (64 bytes) = [0f, ea, c4, e2, 24, 4e, fa, dc, 1d, ea, ea, 3d, 60, eb, a6, 8f, f1, ed, 1a, 07, 35, cb, 5b, 1b, cf, 5b, 21, a4, bc, 14, 65, c2, 21, 3f, bf, 33, a0, b0, 7c, 78, 3a, a6, 32, c6, 34, be, ff, 45, 98, f4, 17, b1, 24, 71, 4f, 9c, 75, 58, 37, 3a, 28, ea, 97, 33] |
| 132 | +INFO Submitting evidence to URL http://172.17.0.2:8088/keys/v1/evidence/3974368321 |
| 133 | +INFO Attestation failure :-( ! AttestationFailure: No attestation result was obtained. No known-good reference values. |
| 134 | +``` |
| 135 | +You can see from the key broker client application output that the `skywalker` key is requested from the key broker server, which did send a challenge. The key broker client application uses the challenge to submit its evidence back to the key broker server, but it gets an attestation failure. This is because the server does not have any known good reference values. |
| 136 | + |
| 137 | +Now look at the key broker server output on the terminal where the server is running. It will look like: |
| 138 | + |
| 139 | +```output |
| 140 | +INFO Known-good RIM values are missing. If you trust the client that submitted |
| 141 | +evidence for challenge 1302147796, you should restart the keybroker-server with the following |
| 142 | +command-line option to populate it with known-good RIM values: |
| 143 | +--reference-values <(echo '{ "reference-values": [ "tiA66VOokO071FfsCHr7es02vUbtVH5FpLLqTzT7jps=" ] }') |
| 144 | +INFO Evidence submitted for challenge 1302147796: no attestation result was obtained. No known-good reference values. |
| 145 | +``` |
| 146 | +From the server output you will notice that it did create the challenge for the key broker application, but it complains that it has no known good reference values. It does however provide a way to provision the key broker server with known good values if the client is trusted. |
| 147 | +In a production environment, the known good reference value would be generated using a deployment specific process, but for demonstration purposes and simplification, you will use the value proposed by the key broker server. |
| 148 | + |
| 149 | +Now go ahead and terminate the running instance of the key broker server(ctrl+C) and restart it with the known good reference value. Notice here that you need to copy the `--reference-values` argument directly from the previous error message reported by the key broker. When running this next command, ensure that you are using exactly that value, for example:: |
| 150 | + |
| 151 | +```bash |
| 152 | +./keybroker-server -v --addr 172.17.0.2 --reference-values <(echo '{ "reference-values": [ "tiA66VOokO071FfsCHr7es02vUbtVH5FpLLqTzT7jps=" ] }') |
| 153 | +``` |
| 154 | + |
| 155 | +On the terminal with the running realm, re-run the key broker client application with the exact same command line parameters as before: |
| 156 | + |
| 157 | +```bash |
| 158 | +./keybroker-app -v --endpoint http://172.17.0.2:8088 skywalker |
| 159 | +``` |
| 160 | + |
| 161 | +You should now get a successful attestion as shown: |
| 162 | + |
| 163 | +```output |
| 164 | +INFO Requesting key named 'skywalker' from the keybroker server with URL http://172.17.0.2:8088/keys/v1/key/skywalker |
| 165 | +INFO Challenge (64 bytes) = [05, 9e, ef, af, 59, e5, 2d, 0f, db, d8, 24, 40, 1e, 0d, 09, c9, d4, 3c, 9e, 99, c5, 64, cf, e6, b9, 20, 29, be, d7, ec, ea, 9a, a3, 91, dc, 16, e6, b7, 0f, 39, 0f, 06, b6, cc, b6, 9f, 0e, 3a, da, 26, 57, 5c, ed, 7f, 11, 1f, 2b, 3c, 9e, aa, 8c, d6, bc, b8] |
| 166 | +INFO Submitting evidence to URL http://172.17.0.2:8088/keys/v1/evidence/2828132982 |
| 167 | +INFO Attestation success :-) ! The key returned from the keybroker is 'May the force be with you.' |
| 168 | +``` |
| 169 | + |
| 170 | +You have successfully run an end-to-end attestation flow with Arm CCA. |
| 171 | + |
| 172 | + |
| 173 | + |
| 174 | + |
0 commit comments