4 releases
Uses new Rust 2024
| 0.1.4 | Apr 15, 2026 |
|---|---|
| 0.1.3 | Apr 15, 2026 |
| 0.1.2 | Mar 5, 2026 |
| 0.1.1 | Mar 4, 2026 |
#255 in Authentication
730KB
14K
SLoC
ans-verify
Trust verification library for the Agent Name Service (ANS).
Overview
This crate implements the ANS trust verification flow, combining DNS lookups, transparency log badge retrieval, and certificate fingerprint comparison to verify agent identities.
Quick Start
use ans_verify::{AnsVerifier, CertIdentity, CertFingerprint, VerificationOutcome};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let verifier = AnsVerifier::builder()
.with_caching()
.build()
.await?;
// Server verification (client-side)
// After TLS handshake, construct CertIdentity from the server certificate
let server_cert = CertIdentity::from_der(&cert_der_bytes)?;
let outcome = verifier.verify_server("agent.example.com", &server_cert).await;
if outcome.is_success() {
println!("Server verified");
}
// Client verification (server-side mTLS)
let client_cert = CertIdentity::from_der(&client_cert_der)?;
let outcome = verifier.verify_client(&client_cert).await;
Ok(())
}
Verification Flow
Server Verification
When connecting to an ANS agent server:
- DNS lookup
_ans-badge.{fqdn}(fallback:_ra-badge) for the transparency log URL - Fetch badge from transparency log API
- Validate badge status (Active, Warning, Deprecated allowed)
- Compare server certificate fingerprint to badge attestation
- Compare certificate CN to badge agent host
- Optional: DANE/TLSA verification
Client Verification (mTLS)
When accepting mTLS connections from ANS agent clients:
- Extract FQDN from certificate CN, version from URI SAN
- DNS lookup by FQDN, match badge to certificate version
- Compare identity certificate fingerprint to badge attestation
- Compare ANS name from URI SAN to badge
Configuration
DNS Presets
use ans_verify::AnsVerifier;
let verifier = AnsVerifier::builder()
.dns_cloudflare() // or .dns_google(), .dns_quad9()
.build()
.await?;
Failure Policies
| Policy | Behavior |
|---|---|
FailClosed |
Reject on any error (default) |
FailOpenWithCache |
Allow if a cached badge exists within max staleness |
DANE/TLSA
use ans_verify::ServerVerifier;
let verifier = ServerVerifier::builder()
.with_dane_if_present() // verify TLSA if records exist
// or .require_dane() // fail if no TLSA records
.dane_port(8443) // custom port (default: 443)
.build()
.await?;
Badge Caching
let verifier = AnsVerifier::builder()
.with_caching() // enable Moka-based TTL cache
.build()
.await?;
Trusted RA Domains
Restrict badge URL fetches to known transparency log hosts. This prevents DNS-based redirections to attacker-controlled servers:
let verifier = ServerVerifier::builder()
.trusted_ra_domains(["tlog.example.com", "tlog2.example.com"])
.build()
.await?;
When configured, badge URLs discovered via DNS TXT records are validated before any HTTP request is made. URLs pointing to hosts not in the set are rejected with TlogError::UntrustedDomain. By default (None), all domains are allowed.
SCITT Verification
Enable with features = ["scitt"] for offline-capable verification using signed status tokens and Merkle inclusion receipts from the transparency log.
SCITT Flow
- Parse SCITT headers (
X-SCITT-Receipt,X-ANS-Status-Token) from the HTTP response - Verify the status token: COSE_Sign1 signature, expiry, agent status
- Match certificate fingerprint against the token's cert array
- Verify the receipt: COSE_Sign1 signature, Merkle inclusion proof
- Result:
ScittVerifiedwith tier (FullScittorStatusTokenVerified)
If SCITT headers are absent or the token is expired, the verifier falls back to badge-based verification (configurable via ScittTierPolicy).
use std::sync::Arc;
use ans_verify::{
AnsVerifier, ScittConfig, ScittHeaders, ScittKeyStore, ScittTierPolicy,
};
let key_store = Arc::new(ScittKeyStore::from_c2sp_keys(&root_keys)?);
let verifier = AnsVerifier::builder()
.with_caching()
.scitt_config(ScittConfig::new()
.with_tier_policy(ScittTierPolicy::ScittWithBadgeFallback))
.scitt_key_store(key_store)
.build()
.await?;
let headers = ScittHeaders::from_base64(
receipt_header.as_deref(),
status_token_header.as_deref(),
)?;
let outcome = verifier
.verify_server_with_scitt("agent.example.com", &server_cert, &headers)
.await;
Agent-Side Header Supply
Use ScittHeaderSupplier for agents to maintain fresh SCITT artifacts:
use ans_verify::{ScittHeaderSupplier, HttpScittClient};
let supplier = ScittHeaderSupplier::new(agent_id, scitt_client, key_store);
let headers = supplier.current_headers().await;
// headers.receipt_base64 → X-SCITT-Receipt
// headers.status_token_base64 → X-ANS-Status-Token
Inspect Live Artifacts
cargo run -p ans-verify --features scitt --example inspect_scitt -- \
--tlog https://transparency.ans.godaddy.com \
--agent-id b8a46f57-5599-4b4d-9a53-0313e5529694
Traits
Implement these traits for custom backends:
DnsResolver
#[async_trait]
pub trait DnsResolver: Send + Sync {
async fn lookup_badge(&self, fqdn: &Fqdn) -> Result<DnsLookupResult<BadgeRecord>, DnsError>;
async fn lookup_tlsa(&self, fqdn: &Fqdn, port: u16) -> Result<DnsLookupResult<TlsaRecord>, DnsError>;
// Default methods: get_badge_records(), find_badge_for_version()
}
TransparencyLogClient
#[async_trait]
pub trait TransparencyLogClient: Send + Sync {
async fn fetch_badge(&self, url: &str) -> Result<Badge, TlogError>;
async fn fetch_badge_by_id(&self, agent_id: Uuid) -> Result<Badge, TlogError>;
async fn fetch_audit(&self, agent_id: Uuid, limit: Option<u32>, offset: Option<u32>)
-> Result<AuditResponse, TlogError>;
}
ScittClient (feature = "scitt")
#[async_trait]
pub trait ScittClient: Send + Sync {
async fn fetch_receipt(&self, agent_id: Uuid) -> Result<Vec<u8>, ScittError>;
async fn fetch_status_token(&self, agent_id: Uuid) -> Result<Vec<u8>, ScittError>;
async fn fetch_root_keys(&self) -> Result<Vec<String>, ScittError>;
}
Testing
Mock implementations are provided behind the test-support feature flag:
[dev-dependencies]
ans-verify = { ..., features = ["test-support"] }
use ans_verify::{MockDnsResolver, MockTransparencyLogClient};
let dns = Arc::new(MockDnsResolver::new()
.with_records("agent.example.com", vec![badge_record]));
let tlog = Arc::new(MockTransparencyLogClient::new()
.with_badge("https://tlog.example.com/badge", badge));
let verifier = ServerVerifier::builder()
.dns_resolver(dns)
.tlog_client(tlog)
.build()
.await?;
Feature Flags
| Feature | Description |
|---|---|
rustls |
Enables AnsServerCertVerifier and AnsClientCertVerifier for rustls TLS integration |
scitt |
Enables SCITT verification: ScittKeyStore, verify_status_token, verify_receipt, ScittHeaderSupplier, HttpScittClient |
test-support |
Exposes MockDnsResolver, MockTransparencyLogClient, and MockScittClient for use in downstream integration tests |
License
MIT
Dependencies
~31–50MB
~777K SLoC