Bridge member details

There was an error while trying to fetch the bridge member details.

Bridge member details


Public keys

The public key is [ verify ] [ manually verify ]

In order to verify 's public key, make sure you have curl installed and, in the command line, issue:

$
 

Paste the result of the command below, then click "Verify":

Parsed result for 's public key:

 
Public key MATCH!
Public key MISMATCH! Please try again.

powHSM

This member is running a powHSM device version [See on Github].

This member is running a powHSM device with a UI version [See UI on Github] and a Signer version [See Signer on Github].


Signer

Hash and parameters

This powHSM is running a Signer with hash , built using the following parameters (this hash can be verified by manually building the Signer from the source code using the given parameters):

Checkpoint
Minimum difficulty
Network

For instructions on how to verify the Signer hash by building the Signer with the given parameters, please read this document. For details on what the Signer is and what role it plays in powHSM, please read our concepts section.

SGX enclave

Hash and parameters

This powHSM is running an Intel SGX enclave with MRENCLAVE , built using the following parameters (this hash can be verified by manually building the firmware from the source code using the given parameters):

Checkpoint
Minimum difficulty
Network
Authorizers file [See on Github]

For instructions on how to verify the MRENCLAVE by building the firmware with the given parameters, please read this document. For details on what the Intel SGX enclave is and what role it plays in powHSM, please read our concepts section.

Public keys
Name Public key

(*) These keys use a different derivation path and are now deprecated. They will be removed altogether in future versions.

The SHA-256 hash of the public keys shown here has been dynamically computed on your browser using the CryptoJS library. If you want to double-check this computation, you can manually compute a SHA-256 of the concatenation of the underlying byte representation of each of these public keys, in the order shown. For this task, you can use any library or tool of your choosing. This resulting SHA-256 is present in the attestation shown next.

Message (hover for details)
0x
Message components
X509 Certificate summary
Raw certificate

Attestation

The signature shown above is a valid signature of the given message by the signer-hash-tweaked attestation key (shown further down). This has been dynamically verified on your browser using the Elliptic library. You can manually verify the validity of said signature using any library or tool of your choosing. The validity of this signature, together with the rest of the certification chain up to the root of trust (Ledger itself), constitutes proof of this signature being generated in an authentic Ledger device running a Signer App with the given hash.


User Interface (UI)

Hash and parameters

This powHSM is running a UI with hash , built using the following parameters (this hash can be verified by manually building the UI from the source code using the given parameters):

Authorized signer hash
Authorized signer iteration
Signer authorizers file [See on Github]

For instructions on how to verify the UI hash by building the UI with the given parameters, please read this document. For details on what the UI is and what role it plays in powHSM, please read our concepts section.

This powHSM is running a UI with hash . This hash can be verified by manually building the UI from the source code.

For instructions on how to verify the UI hash by building the UI, please read this document. For details on what the UI is and what role it plays in powHSM, please read our concepts section.

Attestation

The signature shown above is a valid signature of the given message by the UI-hash-tweaked attestation key (shown below). This has been dynamically verified on your browser using the Elliptic library. You can manually verify the validity of said signature using any library or tool of your choosing. The validity of this signature, together with the rest of the certification chain up to the root of trust (Ledger itself), constitutes proof of this signature being generated in an authentic Ledger device running a UI App with the given hash.


Attestation

The message digest shown above is contained in the enclave-generated SGX quote (shown next -- see the report data field). This has been dynamically verified on your browser using the CryptoJS library. You can manually verify said digest using any library or tool of your choosing. The inclusion of this digest in the SGX quote, together with the rest of the certification chain up to the root of trust (Intel itself), constitutes proof of this message being generated in an authentic Intel SGX enclave with the given MRENCLAVE (contained in the SGX quote shown next).


In the table above, the signature is a valid signature of the SHA-256 digest of the message in the same table, signed by the attestation public key from the table shown next. This has been dynamically verified on your browser using the CryptoJS and Elliptic libraries. You can manually verify said digest and signature using any library or tool of your choosing. On the other hand, the MRENCLAVE can be manually verified by building the powHSM SGX enclave from source as shown in the hash and parameters section above.


In the table above, the signature is a valid signature of the SHA-256 digest of the message in the same table, signed by the quoting enclave public key from the certificate shown next. On the other hand, the report data component of the signed message is the SHA-256 digest of the concatenation of the public key (without the 04 prefix) and the auth data fields when interpreted as hex-encoded byte arrays. This has been dynamically verified on your browser using the CryptoJS and Elliptic libraries. You can manually verify said digest and signature using any library or tool of your choosing.


In each of the X509 tables above, a summary of the contents of the corresponding X509 certificate is shown alongside its full PEM representation. From top to bottom, each of these certificates has been signed by the next, forming a certification chain that goes all the way to Intel SGX's root of trust certificate. Parsing and verification of each of these certificates has been dynamically performed on your browser using the Peculiar X509, CryptoJS and Elliptic libraries. You can also manually verify the validity of each of these certificates using any library of your choosing.

Message (hover for details)
0x
Public key

Ledger public key (root of trust)

Public key
[See on Ledger codebase]

In each of the Attestation public key and Device public key tables shown above, the signatures shown are valid signatures of the corresponding messages by the following table's public key. In both cases, the signed message contains the certified public key, as shown. The last table only shows the root of trust. The validity of this certification chain has been dynamically verified on your browser using the Elliptic library. You can manually verify these signatures using any library or tool of your choosing. The validity of this set of signatures constitutes part of the proof of validity of both the Signer and UI attestations shown above. For more information on the attestation process, see the Ledger documentation.