Expired SGX Attestation Collateral from Azure THIM

Bala Siva Sai Akhil Malepati 0 Reputation points
2024-08-19T08:22:22.1366667+00:00

When using Azure DCAP Library from Azure SGX Virtual Machines, Azure THIM is providing SGX Attestation Collateral which have expired and more than 1 year old.

For getting SGX Attestation Collateral from Azure THIM, when following is run as a curl command,

curl -X GET "https://global.acccache.azure.net/sgx/certification/v4/tcb?fmspc=00606a000000&clientid=production_client" | jq

The received SGX attestation collateral contains, Issue Date as "2023-02-27T18:50:29Z" and Next Update Date as "2023-03-29T18:50:29Z" which is more than an year old.

Whereas when a corresponding command is run directly on Intel Provisioning Certification Service (PCS),

curl -X GET "https://api.trustedservices.intel.com/sgx/certification/v4/tcb?fmspc=00606a000000" | jq

The received SGX attestation collateral contains, Issue Date as "2024-08-19T07:31:12Z" and next update date as "2024-09-18T07:31:12Z"

When "next update" date mentioned on the attestation collateral has passed the "current date", the attestation collateral is considered expired. So, practically the attestation collateral being returned by Azure THIM is expired and more than an year old.

Can you please resolve Azure THIM to provide non-expired latest attestation collateral or suggest us a solution to be able to get non-expired latest attestation collateral from Azure THIM and accordingly consume the same through Azure DCAP library.

Looking forward to for your response.

Thanks, and Regards,

Akhil

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
7,994 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Srinud 2,610 Reputation points Microsoft Vendor
    2024-08-21T09:46:36.5433333+00:00

    Hi Bala Siva Sai Akhil Malepati,

    Thank you for your patience.

    Could please confirm if you are using Microsoft Azure Attestation (MAA) for performing SGX attestation?

    As i checked with our internal team here is the response:

    • THIM stores all the Trusted Computing Base (TCBs) published by Intel to date in its storage and, by default, provides the minimum TCB that is supported based on the version and the FMSPC of the machine. In this case, THIM is returning the minimum supported TCB value, which is 14, whereas Intel provides a TCB value of 16, the latest TCB value released by Intel.
    • The default TCB baseline from THIM lags the latest baseline offered by Intel to prevent any attestation failure scenarios for ACC customers who require more time for patching platform software (PSW) updates. If a customer prefers to perform the SGX attestation against the latest TCB offered by Intel, they can perform timely roll out of platform software (PSW) updates and use the custom TCB baseline enforcement feature offered by Microsoft Azure Attestation (MAA)

    MAA offers the custom TCB baseline enforcement feature which empowers customers to perform SGX attestation against a desired TCB baseline. It is always recommended for Azure Confidential Computing (ACC) SGX customers to install the latest PSW version supported by Intel and configure their SGX attestation policy with the latest TCB baseline supported by Azure.

    Please find more details here - Custom TCB baseline enforcement for Azure Attestation users | Microsoft Learn

    If the information is helpful, please consider by clicking the "Accept Answer & Upvote" on the post.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.