Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revocation list handling #107

Open
Niederb opened this issue Oct 11, 2022 · 2 comments
Open

Revocation list handling #107

Niederb opened this issue Oct 11, 2022 · 2 comments

Comments

@Niederb
Copy link
Contributor

Niederb commented Oct 11, 2022

  • Part of the collateral are certificate revocation lists (CRL). I think they should be in X.509 format, but we should double check
  • Therefore we somehow need to parse them and I think our current dependency for certificate parsing does not support CRLs. Again we should double check
  • Probably we need a new dependency and have to make sure it works in our runtime (no_std/webassembly)
@Niederb Niederb transferred this issue from integritee-network/worker Oct 11, 2022
@Niederb
Copy link
Contributor Author

Niederb commented Nov 22, 2022

The CRL can be parsed with x509_cert but the problem is verifying the issuer certificate chain. I don't know yet how to solve this, but given that there are currently no revoked certificates for our setup this is less important than other verification checks.

@Niederb
Copy link
Contributor Author

Niederb commented Dec 20, 2022

Some notes regarding the root CA CRL:

  • The Intel Collateral API has not interface to get the root CA CRL (only for the PCK Certificate, see)
  • The URL for the root CA CRL is actually encoded in the certificate itself as cRLDistributionPoints and currently points to https://certificates.trustedservices.intel.com/IntelSGXRootCA.der
    • I think I would just hard-code this URL for now
  • Note that some of the code implies that it is available in the API under /rootcacrl but this does not seem to work…

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant