We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The attested TLS mechanism should be upgraded to include custom TLS extension. The content of the extension should be the attestation report.
The report data field of the attestation report should still have the hash of the public key, but it should also have a random nonce added to it.
The feature should align with: https://datatracker.ietf.org/doc/draft-fossati-tls-attestation/
Must-have
No response
The text was updated successfully, but these errors were encountered:
Please also do not forget in-handshake attestation. This one is extremely important and urgent!
Sorry, something went wrong.
This is a requirement for #160.
@SammyOina Please test as soon as PR is ready. This one is a priority.
danko-miladinovic
Successfully merging a pull request may close this issue.
Is your feature request related to a problem? Please describe.
The attested TLS mechanism should be upgraded to include custom TLS extension. The content of the extension should be the attestation report.
The report data field of the attestation report should still have the hash of the public key, but it should also have a random nonce added to it.
Describe the feature you are requesting, as well as the possible use case(s) for it.
The feature should align with: https://datatracker.ietf.org/doc/draft-fossati-tls-attestation/
Indicate the importance of this feature to you.
Must-have
Anything else?
No response
The text was updated successfully, but these errors were encountered: