-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prevent fake Attestation Key #15
Comments
Correct. The attestation server MUST compute the cryptographic name of the client's EDIT: And as you noted elsewhere, the AK also must be |
Great response @nicowilliams The TCG requirement for AK as I know it is for the AK to be:
stClear is a nice addition that @osresearch clarifies in his FAQ as
|
@ernesto418 please see if the latest changes merged into master for the tutorials address your question If yes, confirm, so we could close this ticket as resolved. Thanks |
I think you refer to: d0cbddf#diff-e52a82c98b3ab3495218220dd008585165b7edfb9e2541aaacf1c3d8cd6f3d85 I didn't find in all the commit the words: That are the mandatory attributes to be asserted when generating the AK name to be used in Maybe it is explained in a different way, but I didn't find it. Therefore, I think it doesn't address the Issue |
It is important that the server validates the attributes of the Attestation Key when it receives the AKpub to verify that if it is loaded in the TPM, it is a genuine attestation key.
If not, the client could load an externally generated key with a well-known private key in the TPM and use it to sign externally a fake quote. Then, because it is loaded in the TPM, it would pass the Make/Activate_credential.
I was reading the Attestation Protocols and I didn't find anything related to it in the Readme.
The text was updated successfully, but these errors were encountered: