Skip to main content

A verifier for the Blyss Confidential AI service

Project description

blyss_verifier is a Python package that verifies the confidentiality claims of the Blyss confidential AI service at enclave.blyss.dev. For more details, see this technical deep-dive.

Usage

Install with:

pip install --upgrade blyss-verifier

Verify the confidentiality claims of enclave.blyss.dev in a single command:

python -m blyss_verifier.verify

The verbose output (enabled with -v) includes more details on what images and hashes were computed and checked. You can check a different URL by supplying it at the command line with:

python -m blyss_verifier.verify https://example.com

You can also use the library from within a Python script:

from blyss_verifier.verify import verify_url
verify_url("https://enclave.blyss.dev")

Example run

A typical run of the script will produce output like this:

Verifying claims for https://enclave.blyss.dev:
✅ Attestation is signed by root AMD certificate at:
   https://kdsintf.amd.com/vcek/v1/Genoa/cert_chain (e6ecc853…d777aca3)

✅ Docker images match expected values:
   - Application: vllm/vllm-openai
   - UI: blintzbase/chatui
   - Shim: blintzbase/shim

✅ Disk is checked by dm-verity against the expected hash
   dm-mod.create="dmverity,,0,ro,0 …c51b4b94…809b8190… 1 panic_on_corruption"

✅ Attested kernel command line complies with protocol version v0.0.1

✅ Attested measurement matches expected measurement
   1ee2a500…3704131a == 1ee2a500…3704131a

✅ Certificate fingerprint matches attestation

✅ Included in at least two transparency logs:
   - Let's Encrypt 'Oak2024H1' log
   - Google 'Argon2024' log

✅ PASS

Let's break down what is happening in each step. For more details, please read our technical deep-dive.

✅ Attestation is signed by root AMD certificate at:
   https://kdsintf.amd.com/vcek/v1/Genoa/cert_chain (e6ecc853…d777aca3)

First, we check that the attestation presented by the service, at https://enclave.blyss.dev/.well-known/appspecific/dev.blyss.enclave/attestation.json, is correctly signed by a chain of certificates leading to the root AMD certificate. This ensures we are running genuine AMD secure hardware, and that all code is running inside and AMD SEV-SNP secure VM.

✅ Docker images match expected values:
   - Application: vllm/vllm-openai
   - UI: blintzbase/chatui
   - Shim: blintzbase/shim

The kernel command-line, which is attested, specifies the Docker images that the VM to launch at boot. Here, we check that these images are the ones we expect:

  • application: Runs LLM's, and contains the model and the hash of the model weights.
  • ui: Serves the web chat UI.
  • shim: Verifies GPU attestation, requests certficiates from Let's Encrypt, and proxies requests to the application.
✅ Disk is checked by dm-verity against the expected hash
   dm-mod.create="dmverity,,0,ro,0 …c51b4b94…809b8190… 1 panic_on_corruption"

The disk is hashed using dm-verity at boot, a Linux kernel module, and checked against a preset hash. The image contains a minimal Ubuntu installation supporting Docker and the NVIDIA Container Toolkit.

✅ Attested kernel command line complies with protocol version v0.0.1

A protocol specifes the set of disk hashes, Docker images and launch arguments, and firmware, initrd, and kernel hashes, that a client and server agree are valid for confidentiality to hold. We outline v0.0.1 of the protocol in protocol/v0.0.1.json, and leave future versions to be specified through between end users, service providers, and security researchers.

✅ Attested measurement matches expected measurement
   1ee2a500…3704131a == 1ee2a500…3704131a
✅ Certificate fingerprint matches attestation

The verifier checks that the TLS certificate presented by the server matches the one specified by the signed attestation report.

✅ Included in at least two transparency logs:
   - Let's Encrypt 'Oak2024H1' log
   - Google 'Argon2024' log

The verifier checks that the certificate issued by Let's Encrypt was properly included in Certificate Transparency logs, and a permanent record of its issuance is committed to the log.

✅ PASS

Finally, once verification passes, clients can be sure that:

  • The server's private key, used to establish all TLS connections to it, was generated on boot from inside the secure VM, and is inaccessible to Blyss or any other third party.
  • The server's GPU was in confidential computing mode, and all data transfers over PCIe were encrypted using keys known only to the secure VM and the GPU's secure hardware.
  • The contents of any interaction with the API are inaccessible to Blyss or any other third party.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

blyss-verifier-0.1.8.tar.gz (840.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

blyss_verifier-0.1.8-py3-none-any.whl (839.6 kB view details)

Uploaded Python 3

File details

Details for the file blyss-verifier-0.1.8.tar.gz.

File metadata

  • Download URL: blyss-verifier-0.1.8.tar.gz
  • Upload date:
  • Size: 840.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.5

File hashes

Hashes for blyss-verifier-0.1.8.tar.gz
Algorithm Hash digest
SHA256 41c90b8fbdbc6754810a39fc0b1a1baf64c09b2d3cf3dd1a4a1288da56b8578b
MD5 0b5f0c66f6f722ea076dd92bf2daadd5
BLAKE2b-256 82ee058d687fb72f76295511eb74120526cba5df4d18459f8b1049b93400ed63

See more details on using hashes here.

File details

Details for the file blyss_verifier-0.1.8-py3-none-any.whl.

File metadata

  • Download URL: blyss_verifier-0.1.8-py3-none-any.whl
  • Upload date:
  • Size: 839.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.5

File hashes

Hashes for blyss_verifier-0.1.8-py3-none-any.whl
Algorithm Hash digest
SHA256 805bb6f86deff1cd69fc16683ce8cce98f3012681989958c0e2b56f00f4b0816
MD5 b0ed6b491c7244181f8b572baf2f3d2a
BLAKE2b-256 972cbac5a4ecd1f40941cd8fa3f273a84f87655be5005ffedcbe0d1b0649fc71

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page