Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Strategy for TLS certs/keys in recursive Aurae daemon #328

Open
krisnova opened this issue Jan 28, 2023 · 3 comments
Open

Strategy for TLS certs/keys in recursive Aurae daemon #328

krisnova opened this issue Jan 28, 2023 · 3 comments
Assignees
Labels
Auraed The Aurae Daemon (gRPC Server)

Comments

@krisnova
Copy link
Contributor

The only thing we need to start auraed in a recursive pod is the PKI material.

There are some trade offs for having the container read from the host from a security perspective.

What is our strategy for getting the cert material into the pod?

  • Mount a volume into the pod from /etc/aurae/pki?
  • Copy the cert material at runtime during RunPodSandbox() with whatever material is on disk?
  • Automatically generate new cert material and keys for each pod from the server CA?

Maybe a better question is do we want to enforce strong identity at the Pod level? If so we likely want each Pod to bring their own Server cert and keys signed by the root CA.

CC @taniwha3 who is our resident TLS expert.

taniwha3: e.g. if something is providing network services, it should have a known identity that binds it to that role

@krisnova
Copy link
Contributor Author

Logs from recursive auraed running with Youki + musl in #308

2023-01-28T19:04:26.285113Z ERROR auraed: Err(Aurae requires a signed TLS certificate to run as a server, but failed to 
                    load: '/etc/aurae/pki/_signed.server.crt'. Please see https://aurae.io/certs/ for information on best 
                    practices to quickly generate one.

Caused by:
    No such file or directory (os error 2))

@krisnova
Copy link
Contributor Author

Following up on #308, the examples/pod*.ts file can be used to trigger this error against the main branch.

@JeroenSoeters
Copy link
Contributor

I'm actually running into this exact same issue with the VMs. We need a strategy for provisioning certificates for auraed instances running as PID 1 on VMs.

@MalteJ MalteJ self-assigned this Jan 23, 2024
@MalteJ MalteJ added the Auraed The Aurae Daemon (gRPC Server) label Jan 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Auraed The Aurae Daemon (gRPC Server)
Projects
None yet
Development

No branches or pull requests

3 participants