-
Notifications
You must be signed in to change notification settings - Fork 108
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inoculate host identity on first use #132
Comments
A good read on the (broader) topic: https://smallstep.com/blog/everything-pki/ |
Will be helpful when merged: |
Hi @blaggacao! We don't use
Does this help? cc @mmalone |
Heyo. Like @tashian said, we don't currently "do spiffe" but we can probably do what you need. There are a few different pieces of spiffe... If all you need is a host cert issued at deploy time and renewed automatically then you probably don't need spiffe at all. You can use the JWT mechanism @tashian mentioned above which is basically a "TOFU join token" mechanism, as you've described. If you want to name your host using an SVID/spiffe ID (e.g., We don't currently implement the spiffe workload attestation API or the federation APIs. I could see us some day implementing the federation APIs to become a "spiffe issuing authority", but I don't think it makes sense for us to re-implement the workload attestation APIs (that's what spire does). I am interested in documenting spiffe use cases, so if anyone has thoughts please do share! |
That is awesome! |
@blaggacao Just wanted to add here a link to our full docs on cert templates |
Looks like @Xe has solved the bootstrapping thinking in a similar way with "link local" (fixed, well-known) IP addresses: https://github.com/Xe/nixos-configs/blob/ec73a55b42836ef194a38c8bad5a938e11f3b979/hosts/lufta/bootstrap.nix /cc @Xe It would be nice if you could complement your thoughts / experiences |
That bootstrap file is used to build a kexec tarball so I can install NixOS on the server (or reinstall it on the server should my luck change). |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
You wrote in a commit message that some ssh prep is necesarry to put a specific host under deploy-rs control.
I've spent some time in the past to conceptually solve this issue and to inoculate an anonymous os image copied over to a host with identiy over a link local connection.
The idea is:
For inoculation, I'm using a spiffe workload identity attestation procedure based on a TOFU join token and a pre-existing declarative host definition, that's all.
Currently, this procedure is not quite nixified, yet. Should it be possible to pass arguments to deploy-rs, I don't see any reason why this workflow could not be made first-class.
I plan to rebase my little env on
divnix/devos
in the coming days and we'll see where that leads me to.The text was updated successfully, but these errors were encountered: