cohesix

Cohesix is an open-source high-assurance control-plane operating system built on the formally verified seL4 microkernel, designed to keep the trusted computing base intentionally small while enabling deterministic orchestration of edge GPU systems and auditable MLOps. Cohesix is "infrastructure for AGI".

View the Project on GitHub lukeb-aidev/cohesix

Example Secure Network Topology for Cohesix

AWS Queen + Individually Roaming Jetson Edge Workers


Purpose

This document defines the reference secure network topology for operating Cohesix with:

Security is achieved by architectural placement and capability control, not by embedding complex crypto stacks inside the seL4 VM.


High-Level Security Principles

  1. Edge devices initiate all connections
    • Jetsons never accept inbound connections.
    • This survives NAT, CGNAT, LTE, hotel Wi-Fi, etc.
  2. Queen is never publicly reachable
    • No public IP
    • No internet-facing ports
    • Only reachable via an encrypted overlay network
  3. Encryption lives outside the VM
    • VPN / tunnel terminates on the host
    • Cohesix VM sees plain TCP inside a trusted boundary
  4. Identity and authority are explicit
    • Each Jetson has a unique network identity
    • Each Jetson has a unique Cohesix auth token / role
    • Compromise of one edge node does not compromise the fleet

Components and Roles

Jetson Edge Device

Runs:

Does not run:

Rationale:


VPN Hub (AWS, Host-Level)

Runs:

Responsibilities:

Security note:


Cohesix Queen (AWS, seL4 VM)

Runs:

Network exposure:

Responsibilities:


Reference Topology

The following diagram expresses:

flowchart LR
  %% ========================
  %% Edge Devices
  %% ========================
  subgraph EDGE["Edge (Roaming Jetsons)"]
    J1["Jetson A<br />(host tools + workloads)"]
    J2["Jetson B<br />(host tools + workloads)"]
    JN["Jetson N<br />(host tools + workloads)"]
  end

  %% ========================
  %% Internet
  %% ========================
  subgraph NET["Public Internet"]
    I["Untrusted Network"]
  end

  %% ========================
  %% AWS
  %% ========================
  subgraph AWS["AWS VPC"]
    subgraph PUB["Public Subnet"]
      WG["WireGuard Hub<br />(UDP 51820)"]
    end

    subgraph PRIV["Private Subnet"]
      Q["Cohesix Queen<br />(seL4 VM)<br />No Public IP"]
    end
  end

  %% ========================
  %% Connectivity
  %% ========================
  J1 -->|Encrypted VPN<br />Outbound only| I
  J2 -->|Encrypted VPN<br />Outbound only| I
  JN -->|Encrypted VPN<br />Outbound only| I

  I --> WG

  WG -->|Plain TCP<br />VPN-only CIDR| Q

Connection Flow (Step-by-Step)

  1. Jetson boots
    • Establishes outbound VPN tunnel to AWS hub
    • Receives a stable VPN IP (e.g. 10.200.0.x)
  2. Jetson starts Cohesix host agent
    • Connects to Queen over VPN IP
    • Uses authenticated Cohesix console / Secure9P transport
  3. Queen validates identity
    • Network identity (VPN peer)
    • Cohesix auth token / ticket
    • Capability and namespace restrictions
  4. Operational traffic begins
    • Telemetry upload
    • Job fetch
    • Result submission

All traffic is encrypted on the wire, but remains simple and deterministic inside the VM.


Identity and Access Control

Network Layer

Cohesix Layer

Both layers are required. Either one alone is insufficient.


Failure and Compromise Model

Event Outcome
Packet sniffing on internet Encrypted, unreadable
Compromised Jetson Limited to its own role
Token leak No network reach without VPN
VPN key leak No authority without token
Queen compromise Out of scope (TCB breach)

Non-Goals (Explicitly Out of Scope)


Summary

This topology provides:

If you are deviating from this design, you should document: