Verifying Function Execution
In the Attesting Function Calls tutorial, we described how to use the Blocky AS CLI to attest a function call. The result was an enclave attestation and a transitive attestation that work together to attest the function execution. In this tutorial, we go over how to verify the claims made by these attestations to trust an execution of an attested function call.
Prerequisites
Install the Blocky AS CLI by following the Getting Started instructions.
Make sure you have Docker, jq, and yq installed on your system.
Create a
verification
directory and navigate into it by running:mkdir -p verification cd verification
(Optional) Review the Attesting Function Calls tutorial.
(Optional) Review Blocky AS Concepts page.
Overview
Trusting the execution of an attested function call means verifying that the function code was executed faithfully on given inputs and secrets, producing a specific output, while ensuring that intermediate function state and secrets are not leaked.
Let's define these goals more precisely as a set of guarantees:
- Guarantee 1: Attested function output is the result of an execution of a specific function on given inputs and secrets.
- Guarantee 2: The intermediate state of the function execution is not tampered with.
- Guarantee 3: The intermediate state of the function execution is not leaked.
- Guarantee 4: The secrets passed to the function are not leaked.
The Blocky AS attestations make these guarantees concrete through a set of claims. In the Attesting Function Calls tutorial we obtained out.json
that contains an enclave attestation enclave_attested_application_public_key
and a transitive attestation transitive_attested_function_call
. In the Attesting Function Calls tutorial we invoked a function on a local server running in dev mode, i.e. not on a TEE enclave. For this tutorial, we've prepared out.json containing attestations over the same "Hello World" function produced by a Blocky AS server running on an AWS Nitro Enclave TEE. Download it by running:
curl -o out.json https://docs.blocky.rocks/v0.1.0-beta.12/out.json
We can inspect the claims of the attestations in out.json by running
jq '.enclave_attested_application_public_key.claims.enclave_measurement' out.json
jq '.transitive_attested_function_call.claims' out.json
{
"platform": "nitro",
"code": "933fdfbf5a849ed07c0a8201f8813b8ab976f72e93722b3e4a28dbb41d2741fb581604845b6272b04a0fa5a8b59647bd.4b4d5b3661b3efc12920900c80e126e4ce783c522de6c02a2a5bf7af3a2b9327b86776f188e4be1c1c404a129dbda493.7e1fadfbec59aba9d45e3042fd322d5e61b3e849d7c7ea20084d946fce976d48773ae723c0e57e2d6311ff3667a3a8b5"
}
{
"hash_of_code": "9f644e9815fd94b44a0376718563353376b99feafd8fafe8ba1f59e746e073ea16388afb9be633566158dc62bc472ab8eaa39e44d4e0702797be34bc04f61fec",
"function": "helloWorld",
"hash_of_input": "a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26",
"output": "SGVsbG8sIFdvcmxkIQ==",
"hash_of_secrets": "9375447cd5307bf7473b8200f039b60a3be491282f852df9f42ce31a8a43f6f8e916c4f8264e7d233add48746a40166eec588be8b7b9b16a5eb698d4c3b06e00"
}
Together, these attestations claim that a Blocky AS server with an enclave image measurement code
ran on a platform
(in this case an AWS Nitro Enclave TEE) and invoked a function
(in this case helloWorld
) on a WASM binary with a hash of hash_of_code
using an input with a hash of hash_of_input
and secrets with a hash of hash_of_secrets
, producing an output encoded in base64 in the output
field (in this case, SGVsbG8sIFdvcmxkIQ==
, which decodes to Hello, World!
).
In this tutorial, we go over how to verify these claims are subject to the guarantees we defined above, and so how to trust the execution of the attested function call.
Verification Process
Step 1: Identify Blocky AS Release
To verify the claims made by the attestations, we need to identify the Blocky AS server implementation that produced the attestations. Let's parse out the attested Blocky AS code
and runtime platform
from the enclave_attested_application_public_key
enclave attestation in out.json by running:
jq -r '.enclave_attested_application_public_key.claims.enclave_measurement.platform' out.json > enclave_platform.txt
cat enclave_platform.txt
jq -r '.enclave_attested_application_public_key.claims.enclave_measurement.code' out.json > enclave_code.txt
cat enclave_code.txt
nitro
933fdfbf5a849ed07c0a8201f8813b8ab976f72e93722b3e4a28dbb41d2741fb581604845b6272b04a0fa5a8b59647bd.4b4d5b3661b3efc12920900c80e126e4ce783c522de6c02a2a5bf7af3a2b9327b86776f188e4be1c1c404a129dbda493.7e1fadfbec59aba9d45e3042fd322d5e61b3e849d7c7ea20084d946fce976d48773ae723c0e57e2d6311ff3667a3a8b5
The value in enclave_platform.txt
indicates the runtime platform of the Blocky AS server. In this example, it is nitro
, indicating that the Blocky AS server was running on an AWS Nitro Enclave TEE. The value in enclave_code.txt
is a measurement of the enclave image containing the Blocky AS server application running inside a TEE.
These values allow us to identify the Blocky AS server implementation that produced the attestations out.json. On the Releases page we list platform
and code
measurements for each Blocky AS release. We can download the code_measurement.toml file for the v0.1.0-beta.12
release by running:
curl -o code_measurement.toml https://docs.blocky.rocks/v0.1.0-beta.12/code_measurement.toml
and extract its measurements by running:
yq '.code_measurement[0].platform' code_measurement.toml > release_platform.txt
cat release_platform.txt
yq '.code_measurement[0].code' code_measurement.toml > release_code.txt
cat release_code.txt
nitro
933fdfbf5a849ed07c0a8201f8813b8ab976f72e93722b3e4a28dbb41d2741fb581604845b6272b04a0fa5a8b59647bd.4b4d5b3661b3efc12920900c80e126e4ce783c522de6c02a2a5bf7af3a2b9327b86776f188e4be1c1c404a129dbda493.7e1fadfbec59aba9d45e3042fd322d5e61b3e849d7c7ea20084d946fce976d48773ae723c0e57e2d6311ff3667a3a8b5
Now we can compare these measurements with:
diff enclave_platform.txt release_platform.txt
diff enclave_code.txt release_code.txt
When diff
calls produce no output, it means that the values are the same, and so the enclave attestation in out.json attests that it was produced by the Blocky AS server code available in the v0.1.0-beta.12
release.
Step 2: Identifying Release Code
Next, we need to identify the Blocky AS server source code behind the release. We use the v0.1.0-beta.12
release information, from the previous step, to form a S3 bucket URL, from which we can download and unpack the source code archive:
aws s3 cp s3://enclave-archive/$(cat release_platform.txt)/$(cat release_code.txt) delphi.tar.gz
tar -xzf delphi.tar.gz
The resulting delphi
folder contains the Blocky AS server source code in delphi/src.tgz
archive. We can use it to build the Blocky AS server enclave image and compute its measurement by running:
make -C delphi build
The reproducible build process produces a description of the enclave image file (delphi/output/eif-description.json
), which contains its measurements. We can parse these measurements and combine them into a single string by running:
jq -r '.Measurements | [.PCR0, .PCR1, .PCR2] | map(select(. != null)) | join(".")' delphi/output/eif-description.json > built_code.txt
cat built_code.txt
We can now compare the built_code.txt
with release_code.txt
parsed from the enclave_attested_application_public_key
.
diff built_code.txt release_code.txt
When diff
produces no output, the measurement of the enclave image file we built from source matches the one of the release.
Note that
delphi/LICENSES/BLOCKY-SARL-1_0.txt
contains source-available license for the Blocky AS server code, which allows you to inspect the code and to build it for the purpose of computing its measurements. It does not, however, allow you to modify, redistribute, or run the code.
Step 3: Inspect Blocky AS Implementation
For the claims made by the attestations to be meaningful, we need to inspect Blocky AS server code for each release to validate several properties of its implementation. These properties are:
- Property 1: Blocky AS server generates a unique public/private key pair on startup and retains control of the private key.
- Property 2: Blocky AS server enclave attestations attest the unique public key.
- Property 3: Blocky AS server uses its private key to sign transitive attestations of function calls executed by the Blocky AS server.
- Property 4: Blocky AS executes WASM binaries and faithfully attests the invoked function, its inputs, secrets, output, and hash of the WASM binary.
- Property 5: Blocky AS server does not allow tampering with the intermediate state of the function execution.
- Property 6: Blocky AS server does not leak the intermediate state of the function execution.
- Property 7: Blocky AS server does not leak the secrets passed to the function.
To verify the claims made by the attestations, we need to verify their signatures. As described on the Concepts page, Blocky AS generates a new public/private key pair encl_app_pub_key/encl_app_priv_key
on startup. The enclave attestation enclave_attested_application_public_key
attests the encl_app_pub_key
and is signed by the TEE hardware manufacturer's private key tee_priv_key
, which is the root of trust for TEE enclaves. The transitive attestation transitive_attested_function_call
, attesting the execution of a function, is signed by the encl_app_priv_key
attested in enclave_attested_application_public_key
.
Note that depending on your function implementation, you may need to verify additional properties, such as whether Blocky AS correctly implements random number generation, timestamp generation, and HTTPS request handling.
We can then validate Properties 1 through 7 by inspecting the source code in the delphi/src.tgz
archive. The validation of these properties should be done once per Blocky AS release and is akin to inspecting and auditing the implementation of a smart contract or of a blockchain node and relies on the availability of our code. This process can be done collectively by Blocky's users as well as auditors. If you'd like help in understanding a Blocky AS server implementation, please reach out to us on Telegram @blocky_rocks.
Step 4: Verify Attestation Signatures
To verify the claims made by the attestations, we need to verify their signatures. As validated in Step 2, Blocky AS generates a unique public/private key pair encl_app_pub_key/encl_app_priv_key
on startup. The enclave attestation enclave_attested_application_public_key
attests the encl_app_pub_key
and is signed by the TEE hardware manufacturer's private key tee_priv_key
, which is the root of trust for TEE enclaves. The transitive attestation transitive_attested_function_call
, attesting the execution of a function, is signed by the encl_app_priv_key
attested in enclave_attested_application_public_key
.
The out.json produced by the bky-as attest-fn-call
command is verified on output. So, if you've obtained out.json from bky-as
yourself, you know that
enclave_attested_application_public_key
signature is valid against the TEE hardware manufacturer's public keytee_pub_key
embedded in the Blocky AS CLItransitive_attested_function_call
signature is valid against theencl_app_pub_key
attested inenclave_attested_application_public_key
transitive_attested_function_call.claims
come from parsingtransitive_attested_function_call.transitive_attestation
and can proceed to Relating Attestation Claims to Blocky AS Guarantees.
We may also use the code in the release archive to build the
bky-as
CLI and compare its hash against the one installed on your machine. By inspecting the CLI code, you can convince yourself that it users the correct TEE root of trust public key and the correct processes to parse and verify Blocky AS attestations.
If you received out.json from a third party, or if you archived enclave_attested_application_public_key
and transitive_attested_function_call
in long-term storage, you may want to verify the signatures of the attestations yourself.
The easiest way to verify these signatures is to use the bky-as
CLI. If you went through the Getting Started process, you should already have a config.toml
configured with the acceptable_measurements
for the current release. If you haven't, you can download a config file for this tutorial by running:
curl -o config.toml https://docs.blocky.rocks/v0.1.0-beta.12/config.toml
To verify previously obtained attestations, simply extract the raw enclave and transitive attestations from out.json, or your long-term storage, and pass them to bky-as verify-fn-call
command by running:
jq '{
enclave_attested_application_public_key: .enclave_attested_application_public_key.enclave_attestation,
transitive_attested_function_call: .transitive_attested_function_call.transitive_attestation
}' out.json | bky-as verify-fn-call > verified.json
cat verified.json
{"enclave_attested_application_public_key":{"enclave_attestation":"{"platform":"nitro","platform_attestations":["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","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"]}","claims":{"enclave_measurement":{"platform":"nitro","code":"933fdfbf5a849ed07c0a8201f8813b8ab976f72e93722b3e4a28dbb41d2741fb581604845b6272b04a0fa5a8b59647bd.4b4d5b3661b3efc12920900c80e126e4ce783c522de6c02a2a5bf7af3a2b9327b86776f188e4be1c1c404a129dbda493.7e1fadfbec59aba9d45e3042fd322d5e61b3e849d7c7ea20084d946fce976d48773ae723c0e57e2d6311ff3667a3a8b5"},"public_key":{"curve_type":"p256k1","data":"BKL71PB/7FsZi2PB7x+RbmRXAKJlDjI00IrtSA2655hG6xV3M8t9CBHbFhnQiVT4YhTNAV56o4vMhXBqULmqf+s="}}},"transitive_attested_function_call":{"transitive_attestation":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA5ZjY0NGU5ODE1ZmQ5NGI0NGEwMzc2NzE4NTYzMzUzMzc2Yjk5ZmVhZmQ4ZmFmZThiYTFmNTllNzQ2ZTA3M2VhMTYzODhhZmI5YmU2MzM1NjYxNThkYzYyYmM0NzJhYjhlYWEzOWU0NGQ0ZTA3MDI3OTdiZTM0YmMwNGY2MWZlYwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKaGVsbG9Xb3JsZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgGE2OWY3M2NjYTIzYTlhYzVjOGI1NjdkYzE4NWE3NTZlOTdjOTgyMTY0ZmUyNTg1OWUwZDFkY2MxNDc1YzgwYTYxNWIyMTIzYWYxZjVmOTRjMTFlM2U5NDAyYzNhYzU1OGY1MDAxOTlkOTViNmQzZTMwMTc1ODU4NjI4MWRjZDI2AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1IZWxsbywgV29ybGQhAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAOTM3NTQ0N2NkNTMwN2JmNzQ3M2I4MjAwZjAzOWI2MGEzYmU0OTEyODJmODUyZGY5ZjQyY2UzMWE4YTQzZjZmOGU5MTZjNGY4MjY0ZTdkMjMzYWRkNDg3NDZhNDAxNjZlZWM1ODhiZThiN2I5YjE2YTVlYjY5OGQ0YzNiMDZlMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQSayx2f2upemMDO3gPTDfyvTzglL5iyx1yrgBspMkjmOHKEOGqNikOddUkeB31ibN5kvp/aoushZ1Ie7CW6x3h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==","claims":{"hash_of_code":"9f644e9815fd94b44a0376718563353376b99feafd8fafe8ba1f59e746e073ea16388afb9be633566158dc62bc472ab8eaa39e44d4e0702797be34bc04f61fec","function":"helloWorld","hash_of_input":"a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26","output":"SGVsbG8sIFdvcmxkIQ==","hash_of_secrets":"9375447cd5307bf7473b8200f039b60a3be491282f852df9f42ce31a8a43f6f8e916c4f8264e7d233add48746a40166eec588be8b7b9b16a5eb698d4c3b06e00"}}}
Notice that verified.json
is identical in content to out.json
by running:
diff <(jq -S '.' out.json) <(jq -S '.' verified.json)
When the bky-as verify-fn-call
command succeeds, you know that the points 1-3 above hold true for attestations in verified.json
.
Relating Attestation Claims to Blocky AS Guarantees
Let's put all the pieces together and relate the claims made by the attestations in out.json to the guarantees we defined in the Overview section of this tutorial.
From Step 4, we know that the enclave_attested_application_public_key
attestation was signed by the TEE hardware manufacturer's private key tee_priv_key
, which is the root of trust for TEE enclaves. As a consequence, we know that the enclave_attested_application_public_key
was generated inside a TEE.
From Step 2, we know that the BUILT_CODE
measurement matches the RELEASE_CODE
measurement and from Step 1 we know that RELEASE_CODE
measurement matches the enclave_code.txt
measurement. As a consequence, we know that the enclave_code.txt
measurement matches the BUILT_CODE
measurement and that enclave_attested_application_public_key
was produced by code in delphi/src.tgz
archive.
Combining these facts, we know that the Blocky AS server ran on code in delphi/src.tgz
on a TEE.
From Step 3, we know the Blocky AS server code in delphi/src.tgz
has the following properties:
- Property 1: Blocky AS server generates a unique public/private key pair on startup and retains control of the private key.
- Property 2: Blocky AS server enclave attestations attest the unique public key.
- Property 3: Blocky AS server uses its private key to sign transitive attestations of function calls executed by the Blocky AS server.
- Property 4: Blocky AS executes WASM binaries and faithfully attests the invoked function, its inputs, secrets, output, and hash of the WASM binary.
- Property 5: Blocky AS server does not allow tampering with the intermediate state of the function execution.
- Property 6: Blocky AS server does not leak the intermediate state of the function execution.
- Property 7: Blocky AS server does not leak the secrets passed to the function.
From Step 4 and Properties 1 and 2 we know that enclave_attested_application_public_key
attests the unique public key encl_app_pub_key
of the Blocky AS server. Further, from Property 3 we know that transitive_attested_function_call
is signed by the unique private key encl_app_priv_key
of the Blocky AS server. Finally, from Property 4 we know that transitive_attested_function_call
claims represent the execution of a function in a WASM binary, which was executed by the Blocky AS server inside a TEE enclave.
Ultimately, we can proceed to demonstrate the guarantees of Blocky AS defined in the Overview section of this tutorial:
- Guarantee 1: Attested function output is the result of an execution of a specific function on given inputs and secrets, since
transitive_attested_function_call
contains thehash_of_code
,function
,hash_of_input
,hash_of_secrets
, andoutput
fields, which attest the function execution on a TEE. - Guarantee 2: The intermediate state of the function execution is not tampered with, since the function execution took place inside a TEE and Property 5 guarantees that the Blocky AS server does not allow tampering with the intermediate state of the function execution.
- Guarantee 3: The intermediate state of the function execution is not leaked since the function execution took place inside a TEE and Property 6 guarantees that the Blocky AS server does not leak the intermediate state of the function execution.
- Guarantee 4: The secrets passed to the function are not leaked, since the function execution took place inside a TEE and Property 7 guarantees that the Blocky AS server does not leak the secrets passed to the function.
Summary
OK, that was a lot of detail. Let's zoom out summarize the facts we learned in the verification process.
Simply put, attested function output:
jq -r '.transitive_attested_function_call.claims.output | @base64d' out.json
Hello, World!
was produced by invoking the:
jq -r '.transitive_attested_function_call.claims.function' out.json
helloWorld
function in a WASM binary that hashes to:
jq -r '.transitive_attested_function_call.claims.hash_of_code' out.json
9f644e9815fd94b44a0376718563353376b99feafd8fafe8ba1f59e746e073ea16388afb9be633566158dc62bc472ab8eaa39e44d4e0702797be34bc04f61fec
on input hashing to:
jq -r '.transitive_attested_function_call.claims.hash_of_input' out.json
a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26
and secrets hashing to:
jq -r '.transitive_attested_function_call.claims.hash_of_secrets' out.json
9375447cd5307bf7473b8200f039b60a3be491282f852df9f42ce31a8a43f6f8e916c4f8264e7d233add48746a40166eec588be8b7b9b16a5eb698d4c3b06e00
while ensuring that the intermediate state of the function execution is not tampered with and is not leaked, and that the secrets passed to the function are not leaked, since the function execution took place inside a TEE enclave.
Now you, or anyone else, with out.json
can verify these claims by following the verification process described in this tutorial, and so trust the execution of the attested function call.
Next Steps
You can store Blocky AS attestations to always demonstrate the veracity of the attested function output. You can also verify Blocky AS attestations on chain to use their output to trigger on-chain actions in your smart contracts.