You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When sealing data, ego first uses oe_get_seal_key_by_policy to get product or unique seal key, then uses a standard go implementation of AES-GCM go encrypt the data.
However, after a deeper dive into OpenEnclave project, I found oe_get_seal_key_by_policy has flaw that it does not populate KeyID field when calling EGETKEY. And the function is not recommended (although not deprecated). The new recommended way of sealing is oe_seal/oe_unseal, which does populate KeyID. See the discussion here: openenclave/openenclave#4665
IMO, possible solutions would be either
persuade OE this function indeed has a use case,
and push OE an update to fix the flaw in oe_get_seal_key_by_policy,
or
abandon oe_get_seal_key_by_policy,
deprecate SealKey related functions in ego/enclave,
and use oe_seal/oe_unseal in ego/ecrypto package (is the sealed blob format compatible? )
The text was updated successfully, but these errors were encountered:
When sealing data, ego first uses
oe_get_seal_key_by_policy
to get product or unique seal key, then uses a standard go implementation of AES-GCM go encrypt the data.However, after a deeper dive into OpenEnclave project, I found
oe_get_seal_key_by_policy
has flaw that it does not populate KeyID field when calling EGETKEY. And the function is not recommended (although not deprecated). The new recommended way of sealing isoe_seal
/oe_unseal
, which does populate KeyID. See the discussion here: openenclave/openenclave#4665IMO, possible solutions would be either
oe_get_seal_key_by_policy
,or
oe_get_seal_key_by_policy
,oe_seal
/oe_unseal
in ego/ecrypto package (is the sealed blob format compatible? )The text was updated successfully, but these errors were encountered: