You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/docs/architecture/components/manifest.md
+55Lines changed: 55 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -305,6 +305,59 @@ Attributes specifies various attested properties of the TDX VM and is documented
305
305
306
306
The extended features available mask (`XFAM`) determines the set of extended features available for use by the guest and is documented in Section 3.4.2 (`XFAM`) in the [TDX ABI Spec].
307
307
308
+
### `ReferenceValues.tdx.AllowedPIIDs`
309
+
310
+
These are matched against the `PIID` field from the PCK certificate, as documented in section 1.3.5 of the [SGX PCK Spec].
311
+
If the list is empty or null, all PIIDs are accepted.
312
+
313
+
In case hardware is operated by you instead of a third party, or you are able to gain physical access to the hardware to audit it,
314
+
you can obtain the PIID with the following steps:
315
+
316
+
1. Install and run Intel's [`PCKIDRetrievalTool`].
317
+
This should place a CSV file in your working directory.
318
+
2. Retrieve the following fields from the CSV file:
319
+
-`EncryptedPPID`
320
+
-`PCE_ID`
321
+
-`CPUSVN`
322
+
-`PCE ISVSVN`
323
+
3. Use these values to [request a PCK certificate from Intel PCS](https://api.portal.trustedservices.intel.com/content/documentation.html#pcs-certificate-v4).
324
+
Note that the response contains intermediate certificates in the `SGX-PCK-Certificate-Issuer-Chain` header that are required to verify the PCK certificate's signature.
325
+
4. Verify that the PCK certificate chains back to Intel's root, for example with `openssl verify`.
326
+
5. Parse the PCK certificate to find the SGX extension address:
327
+
328
+
```sh
329
+
openssl asn1parse -in pck.pem
330
+
```
331
+
332
+
Example output, showing the extension address `624` right after its ASN.1 OID:
Copy the value shown after `[HEX DUMP]` into the `AllowedPIIDs` field.
353
+
354
+
:::warning
355
+
356
+
The EncryptedPPID must be retrieved from a machine by physically accessing it.
357
+
If you retrieve this value via a remote channel, your traffic could already be redirected to a hostile environment that allows an attacker physical access.
0 commit comments