Example Quote
Here’s a typical attestation quote from Phala Cloud:Hardware Fields
tee_tcb_svn
Trusted Computing Base Security Version Number Security patch level for TEE hardware components. Verify this matches the latest version to ensure no known vulnerabilities.mr_seam (MRSEAM)
Measurement of TDX-Module Cryptographic hash of the SEAM (Secure Arbitration Mode) firmware. Confirms the TDX firmware hasn’t been tampered with.mr_td (MRTD)
Measurement Register for Trust Domain Hash of the initial Trust Domain memory and configuration. Proves the TD was initialized with expected contents.seam_attributes
SEAM Firmware Attributes Configuration flags for SEAM firmware. Always zeros for Intel TDX.td_attributes
Trust Domain Attributes Configuration flags for the TD. Verifies the TD has expected security settings.xfam
eXtended Feature Activation Mask Controls which CPU extended features are accessible to the TD. Ensures proper security boundaries.Runtime Measurement Registers (RTMRs)
These registers contain hash chains of boot components.RTMR0
Virtual Hardware Measurement Measures the virtual hardware environment provided to the CVM.RTMR1
Linux Kernel Measurement Hash of the Linux kernel loaded during boot.RTMR2
Kernel Parameters Measurement Measurement of kernel command line and initrd.RTMR3
Application Measurement dstack-specific measurements including:- app-id: Relevant for KMS key derivation
- compose-hash: Hash of your Docker Compose configuration
- instance-id: Unique CVM instance identifier
- key-provider: Who distributed the root filesystem encryption keys
RTMR3 Hash Chain
RTMR3 uses a hash chain mechanism:Application-Specific Fields
report_data (reportData)
User-Provided Data (64 bytes) Custom data you attach to the quote. Common uses:- Public keys: Bind a public key to prove you control the private key
- Nonces: Challenge-response protocols
- Application state: Hash of configuration or state
mr_config_id, mr_owner, mr_owner_config
Configuration and Ownership Usually all zeros for dstack deployments. Reserved for advanced attestation scenarios.Which Fields Should I Verify?
Different verification levels require checking different fields: Quick Verification:report_data- Your challenge or public key- Use Cloud API for hardware verification
rt_mr3(RTMR3) - Your compose-hashreport_data- Custom data binding- Use Cloud API for hardware and OS
mr_td(MRTD) - OS initial statert_mr0throughrt_mr2- OS boot chainrt_mr3(RTMR3) - Application and KMS bindingtee_tcb_svn- Security patch levelmr_seam- TDX firmware measurement
- All measurements above
- On-chain governance verification
- Reproducible OS builds
- KMS attestation
Resources
- dstack Attestation Guide - How dstack implements attestation
- Intel TDX Specification - Official Intel documentation
- RTMR3 Calculator - Verify RTMR3 values
- Verification Script - Example verification code

