Conversation

Replying to
The server code putting them in the database is here: github.com/GrapheneOS/Att Extract script takes them out of the database and arranges them in the format at github.com/GrapheneOS/Att with the certificate chains in separate files. The filter_props.sh script in there is used too.
1
Replying to and
I could automate it way more than I currently do. At the moment, I just copy the certificate chains into a special local branch of Auditor and run that to output the relevant data and then test that it works properly. Need to do it for both the TEE and StrongBox certificates.
1
Replying to and
I think that GM1913 sample was the most recent valid sample submitted. There was also a Mi MIX 2S submission claiming to have a green boot state but the attestation information says that the bootloader isn't locked, so it's either broken or has some kind of rootkit on it.
1
Replying to and
Both devices with valid samples supported since version 11 are now supported by the new stable release:
Quote Tweet
Auditor app version 12 released: github.com/GrapheneOS/Aud This release adds support for the OnePlus 6 A6003 and OnePlus 7 Pro GM1913. See attestation.app/about and attestation.app/tutorial for info about the app and optional monitoring service.
1
Replying to
The verified boot key never changes and the fingerprint is a hash of it so it doesn't change unless there's an update to the algorithm used to calculate it which shouldn't really be done once a device is shipped. Make sure you have Auditor version 12 on both Auditee and Auditor.
2
Replying to and
4B9201B11685BE6710E2B2BA8482F444E237E0C8A3D1F7F447FE29C37CECC559 is the correct key for the OnePlus 7 Pro entry in the Auditor database based on your earlier sample. Maybe you're just using an earlier version on the device where you're seeing the error?
1