Assumptions
The monitoring protocol makes the following assumptions:
- Every enclave exposes an endpoint through a secure channel on which Auditors can make requests without the host being able to determine whether the request is coming from an Auditor or a User.
- Oyster enclave images use a standard wrapper over the intended application which exposes a HTTPS server and acts as a gateway to the application.
- All HTTPS communications happen through a single port.
- Similarly, all communications using other protocols like wss happen through gateways which have default endpoints that can be accessed by Auditors.