Replies: 10 comments
-
A good read on the (broader) topic: https://smallstep.com/blog/everything-pki/ |
Beta Was this translation helpful? Give feedback.
-
Hi @tashian, @mohe2015 relayed me to you: Do you think this host identity inoculation is a use case that can be implemented with |
Beta Was this translation helpful? Give feedback.
-
Will be helpful when merged: |
Beta Was this translation helpful? Give feedback.
-
Hi @blaggacao! We don't use
Does this help? cc @mmalone |
Beta Was this translation helpful? Give feedback.
-
Heyo. Like @tashian said, we don't currently "do spiffe" but we can probably do what you need. There are a few different pieces of spiffe... If all you need is a host cert issued at deploy time and renewed automatically then you probably don't need spiffe at all. You can use the JWT mechanism @tashian mentioned above which is basically a "TOFU join token" mechanism, as you've described. If you want to name your host using an SVID/spiffe ID (e.g., We don't currently implement the spiffe workload attestation API or the federation APIs. I could see us some day implementing the federation APIs to become a "spiffe issuing authority", but I don't think it makes sense for us to re-implement the workload attestation APIs (that's what spire does). I am interested in documenting spiffe use cases, so if anyone has thoughts please do share! |
Beta Was this translation helpful? Give feedback.
-
That is awesome! |
Beta Was this translation helpful? Give feedback.
-
@blaggacao Just wanted to add here a link to our full docs on cert templates |
Beta Was this translation helpful? Give feedback.
-
Looks like @Xe has solved the bootstrapping thinking in a similar way with "link local" (fixed, well-known) IP addresses: https://github.com/Xe/nixos-configs/blob/ec73a55b42836ef194a38c8bad5a938e11f3b979/hosts/lufta/bootstrap.nix /cc @Xe It would be nice if you could complement your thoughts / experiences |
Beta Was this translation helpful? Give feedback.
-
That bootstrap file is used to build a kexec tarball so I can install NixOS on the server (or reinstall it on the server should my luck change). |
Beta Was this translation helpful? Give feedback.
-
With #168 a first step has been done into this direction and is documented here. I have expanded on @Xe 's idea to define a custom systemd network to cover all ohysical wildcard-matches network interfaces and a mnemonic ipv6 link-local address /MulticastDNS to establish basic connectivity. Now we have free range to inoculate cryptografic identity on top of that bootstrappig. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
You wrote in a commit message that some ssh prep is necesarry to put a specific host under deploy-rs control.
I've spent some time in the past to conceptually solve this issue and to inoculate an anonymous os image copied over to a host with identiy over a link local connection.
The idea is:
For inoculation, I'm using a spiffe workload identity attestation procedure based on a TOFU join token and a pre-existing declarative host definition, that's all.
Currently, this procedure is not quite nixified, yet. Should it be possible to pass arguments to deploy-rs, I don't see any reason why this workflow could not be made first-class.
I plan to rebase my little env on
divnix/devos
in the coming days and we'll see where that leads me to.Beta Was this translation helpful? Give feedback.
All reactions