Re: Secure deploy of keys

2023-01-16 Diskussionsfäden Diego Zuccato
Just did a quick test. Seems feasible to use clevis w/ tpm2 to securely bind credentials to a machine. The idea is: - in case of new install there are no machine-specific files - secrets gets generated as usual - once the machine is up & running, use ssh to run a script to encrypt the

Re: Secure deploy of keys

2023-01-16 Diskussionsfäden Diego Zuccato
Tks for the answer. Sorry for seeing it late but it went in the spam folder :( I didn't know clevis/tang, but it's really interesting (maybe a bit overkill in my scenario). Diego Il 15/12/2022 18:53, Robert Markula ha scritto: Am 15.12.22 um 18:15 schrieb Toomas Tamm via linux-fai: This

Re: Secure deploy of keys

2022-12-15 Diskussionsfäden Diego Zuccato
Il 15/12/2022 18:15, Toomas Tamm via linux-fai ha scritto: Some things that I can imagine that could mitigate such risks would be: - Inputting some secret on the physical machine during install (from the keyboard, USB stick, etc). This would defeat the idea of "fully automatic" install.

Re: Secure deploy of keys

2022-12-15 Diskussionsfäden Robert Markula
Am 15.12.22 um 18:15 schrieb Toomas Tamm via linux-fai: This message was wrapped to be DMARC compliant. The actual message text is therefore in an attachment. Hi Toom, unforunately I can't quote you directly, but regarding a rogue attacker mimicking the MAC of an install client: You have to

RE: Secure deploy of keys

2022-12-15 Diskussionsfäden Toomas Tamm via linux-fai
his would not prevent successful attacks, but possible breaches could be patched up, eg keys replaced afterwards. BR, Toomas -Original Message- From: linux-fai On Behalf Of Diego Zuccato Sent: kolmapäev, 14. detsember 2022 07:40 To: linux-fai@uni-koeln.de Subject: Re: Secure deploy of

Re: Secure deploy of keys

2022-12-14 Diskussionsfäden Robert Markula
Am 13.12.22 um 14:47 schrieb Diego Zuccato: Hello all. What's the recommended way to deploy (or re-deploy) security-sensitive objects (just to say one: private ssh key to avoid client warnings when redeploying a server)? You could use RedHat's Latchset framework [1] with Clevis (on the

Re: Secure deploy of keys

2022-12-13 Diskussionsfäden Diego Zuccato
Tks. Too bad I fear it's not applicable to my scenario. First because the network is public. Second because ssh is just one of the secrets I have to distribute (others are usually SaltStack key and Gluster certificate). I'm thinking that probably this is one of the few cases where a TPM is

Re: Secure deploy of keys

2022-12-13 Diskussionsfäden Andrew Ruthven
Hey, On Tue, 2022-12-13 at 14:47 +0100, Diego Zuccato wrote: > What's the recommended way to deploy (or re-deploy) security- > sensitive  > objects (just to say one: private ssh key to avoid client warnings > when > redeploying a server)? For things like ssh host keys I have a command that we

Re: Secure deploy of keys

2022-12-13 Diskussionsfäden Maximilian Stein
Hi all, What's the recommended way to deploy (or re-deploy) security-sensitive objects (just to say one: private ssh key to avoid client warnings when redeploying a server)? One solution that comes to my mind is to generate a local GPG key and then authorize it for using a pass store

Re: Secure deploy of keys

2022-12-13 Diskussionsfäden Andreas Heinlein
Hello, I would be very interested if you find any solutions. By design, the FAI config space has to be somewhere where it is accessible without access control (anonymous NFS or whatever), and everything within it obviously has to be readable. I guess you will need to find other solutions. As

Secure deploy of keys

2022-12-13 Diskussionsfäden Diego Zuccato
Hello all. What's the recommended way to deploy (or re-deploy) security-sensitive objects (just to say one: private ssh key to avoid client warnings when redeploying a server)? TIA -- Diego Zuccato DIFA - Dip. di Fisica e Astronomia Servizi Informatici Alma Mater Studiorum - Università di