Skip to main content
Version: 2.13

Verify your cluster

Constellation's attestation feature allows you, or a third party, to verify the integrity and confidentiality of your Constellation cluster.

Fetch measurements

To verify the integrity of Constellation you need trusted measurements to verify against. For each node image released by Edgeless Systems, there are signed measurements, which you can download using the CLI:

constellation config fetch-measurements

This command performs the following steps:

  1. Download the signed measurements for the configured image. By default, this will use Edgeless Systems' public measurement registry.
  2. Verify the signature of the measurements. This will use Edgeless Systems' public key.
  3. Write measurements into configuration file.

The configuration file then contains a list of measurements similar to the following:

# ...
expected: "0f35c214608d93c7a6e68ae7359b4a8be5a0e99eea9107ece427c4dea4e439cf"
warnOnly: false
expected: "02c7a67c01ec70ffaf23d73a12f749ab150a8ac6dc529bda2fe1096a98bf42ea"
warnOnly: false
expected: "e6949026b72e5045706cd1318889b3874480f7a3f7c5c590912391a2d15e6975"
warnOnly: true
expected: "0000000000000000000000000000000000000000000000000000000000000000"
warnOnly: false
expected: "f0a6e8601b00e2fdc57195686cd4ef45eb43a556ac1209b8e25d993213d68384"
warnOnly: false
expected: "0000000000000000000000000000000000000000000000000000000000000000"
warnOnly: false
expected: "da99eb6cf7c7fbb692067c87fd5ca0b7117dc293578e4fea41f95d3d3d6af5e2"
warnOnly: false
expected: "0000000000000000000000000000000000000000000000000000000000000000"
warnOnly: false
expected: "d7c4cc7ff7933022f013e03bdee875b91720b5b86cf1753cad830f95e791926f"
warnOnly: true
expected: "0000000000000000000000000000000000000000000000000000000000000000"
warnOnly: false
# ...

Each entry specifies the expected value of the Constellation node, and whether the measurement should be enforced (warnOnly: false), or only a warning should be logged (warnOnly: true). By default, the subset of the available measurements that can be locally reproduced and verified is enforced.

During attestation, the validating side (CLI or join service) compares each measurement reported by the issuing side (first node or joining node) individually. For mismatching measurements that have set warnOnly to true only a warning is emitted. For mismatching measurements that have set warnOnly to false an error is emitted and attestation fails. If attestation fails for a new node, it isn't permitted to join the cluster.

The verify command


The steps below are purely optional. They're automatically executed by constellation apply when you initialize your cluster. The constellation verify command mostly has an illustrative purpose.

The verify command obtains and verifies an attestation statement from a running Constellation cluster.

constellation verify [--cluster-id ...]

From the attestation statement, the command verifies the following properties:

  • The cluster is using the correct Confidential VM (CVM) type.
  • Inside the CVMs, the correct node images are running. The node images are identified through the measurements obtained in the previous step.
  • The unique ID of the cluster matches the one from your constellation-state.yaml file or passed in via --cluster-id.

Once the above properties are verified, you know that you are talking to the right Constellation cluster and it's in a good and trustworthy shape.

Custom arguments

The verify command also allows you to verify any Constellation deployment that you have network access to. For this you need the following:

  • The IP address of a running Constellation cluster's VerificationService. The VerificationService is exposed via a NodePort service using the external IP address of your cluster. Run kubectl get nodes -o wide and look for EXTERNAL-IP.
  • The cluster's clusterID. See cluster identity for more details.

For example:

constellation verify -e --cluster-id Q29uc3RlbGxhdGlvbkRvY3VtZW50YXRpb25TZWNyZXQ=