You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: trustee-on-GCP/README.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,48 +5,52 @@ This guide provides step-by-step instructions for setting up remote attestation
5
5
6
6
## Prerequisites
7
7
8
-
1. Copy the pull secret from [Red Hat OpenShift](https://console.redhat.com/openshift/create/local) to ```~/.config/containers/auth.json``` into auths:quay.io:auth:<pull_secret>
8
+
1. Copy the pull secret from [Red Hat OpenShift](https://console.redhat.com/openshift/create/local) to `~/.config/containers/auth.json` under `auths:quay.io:auth:<pull_secret>`
3. Configure a subnet on GCP for the server and client by running ```./scripts/network_setup.sh```.
10
+
3. Configure a subnet on GCP for the server and client by running `./scripts/network_setup.sh`
11
11
12
12
13
-
## Deploy the trustee server (KBS)
13
+
## Deploy the Trustee Server (KBS)
14
14
15
-
1. Run ```./scripts/deploy-trustee.sh -k <SSH_KEY> -b ./trustee/trustee.bu```. This will start the KBS with the correct configuration (the name of this VM must match the hostname of the server, so it has to match `KBS_HOSTNAME` in `./scripts/rh-coreos/usr/libexec/aa-client`).
16
-
2. Access the VM via SSH, then run ```sudo /usr/local/bin/populate_kbs.sh```. This will add the refrence value to Trustee.
This will create the VM, perform attestation and decrypt the disk.
35
-
36
-
37
-
44
+
This will create the VM, perform attestation, and decrypt the disk using clevis-pin.
38
45
39
-
## Info about the kbs and kbs-client
40
46
41
-
I use this version of [trustee](https://github.com/iroykaufman/trustee/tree/addtpm) and the [guest component](https://github.com/iroykaufman/guest-components/tree/TPM-as-additional-device).
47
+
## Information About KBS, KBS-Client, and Clevis-Pin
42
48
43
-
Trustee includes [pr#851](https://github.com/confidential-containers/trustee/pull/851) with the following changes:
49
+
These are modified versions of [trustee](https://github.com/iroykaufman/trustee/tree/addtpm) and the [guest component](https://github.com/iroykaufman/guest-components/tree/TPM-as-additional-device) to support the TPM as an additional device.
44
50
45
-
1. The guest component encrypts the public part of the AK in ASN.1 format, but trustee unmarshals it. The unmarshal part was replaced with an ASN.1 decrypt method.
46
-
2. The TPM verifier does not check the nonce in the TPM because the `report_data` contains a digest of the `runtime_data` instead of the nonce. This is because the TPM is an additional device. This is a temporary solution.
51
+
The changes in the guest component are also included in [PR#1093](https://github.com/confidential-containers/guest-components/pull/1093), and the changes in Trustee are related to [PR#851](https://github.com/confidential-containers/trustee/pull/851), where the most significant change is the removal of the trusted Attestation Key (AK) list.
47
52
48
-
49
-
The changes in the guest component are included in this [PR#1093](https://github.com/confidential-containers/guest-components/pull/1093).
53
+
This uses a modified version of `clevis-pin-trustee` that adds AK before performing attestation. The source code is available here: [clevis-pin-trustee](https://github.com/iroykaufman/clevis-pin-trustee/tree/create-tpm-ak)
50
54
51
55
## Attestation Policy
52
56
@@ -57,7 +61,3 @@ The policy only checks hardware for both SEV-SNP and TPM.
0 commit comments