Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document how to reconstruct JSON TCB object for signature verification #439

Open
DemiMarie opened this issue Oct 26, 2024 · 0 comments
Open

Comments

@DemiMarie
Copy link

A given JSON object has many forms that are semantically equivalent. However, digital signatures are always computed over binary data. Therefore, it is necessary to know which form Intel actually signed so that the signature can be correctly verified.

The obvious approach is:

  • Parse the incoming JSON into timestamps and hex-encoded binary data.
  • Decode the hex-encoded parts into binary data.
  • Reserialize the JSON using string concatenation to ensure that there is no whitespace and the key/value pairs have the correct order. Timestamps and hex-encoded binary data will never have metacharacters so there are no injection concerns.
  • Verify the signature.

Is this correct?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant