Skip to content

Latest commit

 

History

History
61 lines (48 loc) · 2.81 KB

README.md

File metadata and controls

61 lines (48 loc) · 2.81 KB
Nitriding logo

GoDoc

This Go tool kit makes it possible to run your application inside an AWS Nitro Enclave. Let's assume that you built a Web service in Rust. You can now use nitriding to move your Rust code into a secure enclave, making it possible for your users to remotely verify that you are in fact running the code that you claim to run. Nitriding provides the following features:

  • Automatically obtains an HTTPS certificate (either self-signed or via Let's Encrypt) for clients to securely connect to your enclave over the Internet. Nitriding can act as a TLS-terminating reverse HTTP proxy for your application, so your application does not have to deal with obtaining certificates.

  • Automatically exposes an HTTPS endpoint for remote attestation. After having audited your enclave's source code, your users can conveniently verify the enclave's image by using a tool like verify-enclave and running:

    make verify CODE=/path/to/code/ ENCLAVE=https://enclave.com/enclave/attestation
    
  • Are you building an application that uses a protocol other than HTTP? If so, nitriding makes it possible to register a hash over your application's public key material which is subsequently included in the attestation document. This allows your users to verify that their connection is securely terminated inside the enclave, regardless of the protocol that you are using.

  • Provides an API to scale enclave applications horizontally while synchronizing state between enclaves.

  • AWS Nitro Enclaves only provide a highly constrained VSOCK channel between the enclave and its host. Nitriding creates TAP interface inside the enclave, allowing your application to transparently access the Internet without having to worry about VSOCK, port forwarding, or tunneling.

  • Automatically initializes the enclave's entropy pool using the Nitro hypervisor.

To learn more about nitriding's trust assumptions, architecture, and build system, take a look at our research paper.

More documentation