Skip to content

Conversation

@copybara-service
Copy link

Reject Android attestations chaining to the software root

Some older Android devices do not support Android Key Attestation with a hardware-backed key and fall back to using a software-based solution. These attestations chain up to a root certificate with CN = Android Keystore Software Attestation Root. These attestations are not considered trustworthy for use cases requiring hardware-backed keys.

To prevent accidental misconfiguration, this change also adds a check to ensure the software root is never configured as the main trust anchor.

@copybara-service copybara-service bot force-pushed the test_803547414 branch 5 times, most recently from 6ce1f20 to 17acc10 Compare November 19, 2025 18:24
Some older Android devices do not support Android Key Attestation with a hardware-backed key and fall back to using a software-based solution. These attestations chain up to a root certificate with CN = Android Keystore Software Attestation Root. These attestations are not considered trustworthy for use cases requiring hardware-backed keys.

To prevent accidental misconfiguration, this change also adds a check to ensure the software root is never configured as the main trust anchor.

PiperOrigin-RevId: 834371493
@copybara-service copybara-service bot merged commit ab49edf into main Nov 19, 2025
@copybara-service copybara-service bot deleted the test_803547414 branch November 19, 2025 19:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant