TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Engineering with Enclaves

48 点作者 agrinman大约 2 年前

6 条评论

mariojv大约 2 年前
Enclaves are really useful, but I wish AWS would support an SDK in Go or another language. The current one is written in C: <a href="https:&#x2F;&#x2F;github.com&#x2F;aws&#x2F;aws-nitro-enclaves-sdk-c">https:&#x2F;&#x2F;github.com&#x2F;aws&#x2F;aws-nitro-enclaves-sdk-c</a><p>There are some third party implementations available, but we&#x27;d worry too much about maintenance of those to use them. Something officially supported would really be helpful.
评论 #35434450 未加载
sudhirj大约 2 年前
My team and I are deploying a zero trust independently verifiable secret forwarding system on AWS Nitro Enclave, please ask me anything.<p>The idea is basic secret forwarding - you want to send a secret to many destinations, but find it too cumbersome to encrypt it with each destination’s public key, or you might not have all the public keys in hand.<p>To address this, we provide you with a code base running inside a Nitro Enclave. You have a KMS account, and you configure it to allow access only to 1) our code base hash AND 2) only when that signed code is running inside a certified Nitro Enclave.<p>The enclave bootstraps itself on first run by generating a key pair and encrypting the private key with a data key from KMS.<p>You can then send a secret to the enclave encrypted with its public key, and verifiably know exactly what’s going to happen. Only trusted code running inside the secure confines of the enclave would be able to decrypt and operate on the secret.<p>There’s lots of gotchas - if you make a server in the enclave remember to use a server that binds on the VSOCK AF and port; on the host run socat or a systemd socket unit to translate HTTP&#x2F;TCP calls into the enclave’s VSOCK. Make sure you enrich all requests passed into the enclave with all the data and encrypted artefacts it needs to work. Make sure to send the encrypted artefacts out from the enclave and store them safely.<p>We do this for cinema movie distribution - filmmakers just send their movie’s encryption key to this system, and it sends it out to the public key of each projector in each screen in each theatre in the world. And big studios can verify that their billion dollar movies aren’t going anywhere other than their chosen rules.
评论 #35436709 未加载
评论 #35439076 未加载
评论 #35437953 未加载
cryptonector大约 2 年前
Last I looked the NitroTPM product didn&#x27;t have anything like an Endorsement Key certificate or any mechanism for authenticating a public Endorsement Key. Discrete TPM chips usually have an EKcert. GCP&#x27;s vTPMs do not have an EKcert but Google provides a facility for looking up a guest&#x27;s EKpub. It&#x27;d be nice if NitroTPM also had this.<p>Also, it&#x27;s passingly strange to see PCRs mentioned with no mention of TPMs.
ggm大约 2 年前
I&#x27;d appreciate pointers to adversarial attack models on nitro. I find papers leveraging nitro to build higher order processing models, I think it looks good, but where&#x27;s the work to certify it in something analogous to FIPS? Nitro+FIPS searches suggest its hand-off to a card, not innately in the s&#x2F;w system itself so its the usual key leakage issue: the real key might not leak, but ability to operate the key may in some circumstances be as bad as leaking it: if a Nitro instance can be subverted, it can securely sign to the end of time for bad purpose.
bobbiechen大约 2 年前
Confidential computing is really exciting in terms of software workload identity! As mentioned in the article, the AWS Nitro Enclaves PCR0 is a runtime measurement of the enclave image file, which contains all the code that is running - in other words, a representation of &quot;something you are&quot; rather than &quot;something you have&quot; (a token, a certificate, etc.).<p>Side note - I work on confidential computing at Anjuna, would love to talk more.
giacaglia大约 2 年前
Nitro Enclaves seem super neat. For security focused people, it seems like a no-brainer. Great article!