Skip to content

Add support for validating Genoa attestations #7051

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 17 commits into from
Jun 13, 2025

Conversation

cjen1-msft
Copy link
Contributor

@cjen1-msft cjen1-msft commented Jun 11, 2025

This is a minimal PR to add the relevant root public keys for Genoa and Turin.
(Turin is currently disabled until we can validate it)

This means that we can validate the signatures on attestations from Genoa servers.

@cjen1-msft
Copy link
Contributor Author

cjen1-msft commented Jun 12, 2025

One possible point of contention is that we currently support attestation version 2. However since we can't get the model of the CPU from these attestations this PR just assumes that they are running on milan.

@achamayou
Copy link
Member

One possible point of contention is that we currently support attestation version 2. However since we can't get the model of the CPU from these attestations this PR just assumes that they are running on milan.

Is there any mention of this in the spec?

Can you update the title and description of the PR to say Genoa, since we aren't adding support for Turin in this PR? Have you been able to manually test this on Genoa? It would be great to set up a Genoa ACI pool as well.

@cjen1-msft cjen1-msft changed the title Add support for up to turin roots of trust Add support for validating Genoa attestations Jun 13, 2025
@cjen1-msft cjen1-msft enabled auto-merge June 13, 2025 10:21
@cjen1-msft cjen1-msft disabled auto-merge June 13, 2025 10:30
@achamayou achamayou enabled auto-merge June 13, 2025 12:04
@achamayou achamayou added this pull request to the merge queue Jun 13, 2025
Merged via the queue into microsoft:main with commit abf1048 Jun 13, 2025
15 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants