Purpose
Many systems need to verify user claims or credentials while preserving privacy. The TLS attestation system allows these checks to happen inside a TEE, which then produces cryptographic proof that the verification occurred and passed. The verification frontend makes it easy for anyone to validate these proofs.What Gets Verified
When you paste a TLS attestation into the frontend, it verifies three critical properties:- The exact code that ran in the TEE matches a known, trusted hash. This confirms what verification logic executed.
- The specific claim or check being attested to was satisfied according to the TEE’s verification.
- The hardware executing the check was a legitimate TEE, verified against the hardware manufacturer’s root of trust public key.
Components
Verification Interface
The frontend provides a simple interface for verifying attestations:- Shows the expected code hash representing the verification logic that should have run
- Displays information about what claim was being verified
- Provides an input field for the attestation proof
- Includes a “Verify” button to trigger validation
Verification Results
Upon successful verification, the frontend confirms:- Code hash matches the open-source implementation, proving exactly what verification logic ran
- The specific check or claim being verified was satisfied inside the TEE
- Hardware authenticity is confirmed through the attestation chain back to the manufacturer
More Details
Attestation Structure
The attestation object contains:- Measurements of the code executed in the TEE
- Details of what was verified in the TLS session
- Hardware-signed proof of secure execution
- Chain of signatures linking to the hardware manufacturer’s root of trust
Verification Process
The frontend performs these checks:- Validates the signature chain back to the hardware manufacturer
- Verifies the code measurements match the expected verification logic
- Confirms the specific claim or check was satisfied
- Validates the hardware instance identifiers
Usage Instructions
- Navigate to the verification frontend
- Note the expected code hash that should have performed the verification
- Review what claim or check was being verified
- Paste the attestation proof
- Click “Verify” to validate the attestation
- Review the results confirming all security properties