You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+17-4Lines changed: 17 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,15 @@
1
+
## Deprecation notice
2
+
3
+
This repository is going to be archived on 1st of October 2025.
4
+
5
+
After that, repository will remain available in a read-only state for historical reference, Intel will not be addressing issues, reviewing pull requests, or making any updates going forward.
6
+
7
+
If you are interested in building your own attestation infrastructure please refer to below solutions:
8
+
-[Intel SGX DCAP with ECDSA-based attestation](https://www.intel.com/content/www/us/en/developer/tools/software-guard-extensions/attestation-services.html)
# Intel® Software Guard Extensions and Intel® Trust Domain Extensions Data Center Attestation Primitives (Intel® SGX and Intel® TDX DCAP) Quote Verification Service
2
14
3
15
## Introduction
@@ -7,7 +19,6 @@ It can be used as a part of [SGX attestation](https://www.intel.com/content/www/
7
19
8
20
Service checks, that provided evidence comes from a genuine, non-revoked SGX/TDX capable platform on given TCB level and generates appriopriate JSON report. Based on that report and by verifying additional evidences (like: MRSIGNER, MRENCLAVE) client can decide whether to trust this enclave or not.
9
21
10
-
11
22
### Service architecture overview
12
23
13
24

@@ -32,6 +43,8 @@ QVS for demonstation purposes can be quickly configured and run with self-signed
Execute ```./build.sh```. This script will build QVL, QVS and SSS.
@@ -55,7 +68,7 @@ Using docker builders:
55
68
-[Docker](https://www.docker.com/) (tested with version 20.10.11)
56
69
Without docker:
57
70
-[Node.js](https://nodejs.org/en/) (tested with version 16.13.1) with `npm` and `cmake-js` addon
58
-
- install prerequisites from [QVL](https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationLibrary)
71
+
-download sources and install prerequisites from [QVL](https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationLibrary)
59
72
60
73
#### Install software dependencies
61
74
For Ubuntu 18.04, the following command can be used to install all necessary software dependencies:
@@ -75,7 +88,7 @@ The build was tested on Ubuntu 18.04 and 20.04.
75
88
76
89
Here, we assume that the [build prerequisites](#prerequisites-for-linux) are fulfilled.
77
90
78
-
Execute ```./build.sh```. This script will build QVL, QVS and finally will create Docker Images forQVS and SSS.
91
+
Execute ```./build.sh```. As the first argument you can provide path to QVL sources i.e. `./build.sh ../QVL` where `../QVL` is defualt. This script will build QVL, QVS and finally will create Docker Images forQVS and SSS.
79
92
As a result it creates two docker images:```qvs:latest``` and ```sss:latest```
|QVS_ATTESTATION_REPORT_SIGNING_CA_CERTIFICATE||URL encoded CAcertificate (inPEM format) ofQVS_ATTESTATION_REPORT_SIGNING_CERTIFICATE. As part of chain it will be returned in`X-IASReport-Signing-Certificate` header to enable verifying report. |
206
219
|QVS_ATTESTATION_REPORT_SIGNING_CERTIFICATE||URL encoded certificate (inPEM format) that Verification Crypto Service uses to sign reports. Also returned as part of chain in`X-IASReport-Signing-Certificate` header. |
207
-
|QVS_TRUSTED_ROOT_PUBLIC_KEY|3059301306072a8648ce3d020106082a8648ce3d030107034200040ba9c4c0c0c86193a3fe23d6b02cda10a8bbd4e88e48b4458561a36e705525f567918e2edc88e40d860bd0cc4ee26aacc988e505a953558c453f6b0904ae7394|Public keyofCA certificate that is root forPCK certificate chain |
220
+
|QVS_TRUSTED_ROOT_PUBLIC_KEY|\<root public key for https://api.portal.trustedservices.intel.com/provisioning-certification > | Subject Public Key Info of CA certificate that is root for PCK certificate chain |
0 commit comments