Oxide and Friends

Building a Quorum of Trust in the Oxide Rack

23 snips
Apr 4, 2026
Finch Foner, cryptography and distributed-systems engineer who implemented sans-IO protocol core and ZFS plumbing. Andrew Stone, systems engineer who led Trust Quorum design and Shamir-based key management. They talk about building a rack root of trust, choosing TLS over SPDM, Shamir secret sharing for disk keys, bootstrap vs full quorum designs, simulator-driven testing, and atomic ZFS key rotation.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Root Of Trust Anchors Sled Identity

  • Oxide uses a hardware Root of Trust (ROT) per sled to store private keys and provide an unforgeable identity for mutual authentication.
  • In manufacturing the ROT generates a keypair, sends a CSR to an online signer, and receives an injected cert tying serial and public key to the board.
INSIGHT

Choose TLS Then Layer Attestations

  • The team pivoted from implementing SPDM to using TLS for channel establishment and layering attestations separately.
  • SPDM coupled attestation and channel keys in ways that conflicted with Oxide's desire for separate keys and simpler timing, so they used TLS plus a CO_RIM attestation manifest.
INSIGHT

Quorum Lets Racks Boot Without A Password

  • Trust Quorum exists mainly to allow autonomous cold-boot decryption of disk pools without an operator present.
  • They split a rack secret into Shamir shares stored on sled-local M.2s so multiple sleds must cooperate to derive disk keys and decrypt U.2 drives.
Get the Snipd Podcast app to discover more snips from this episode
Get the app