Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Transport security based on symmetric key cryptography #133

Open
antonkharenko opened this issue Nov 18, 2015 · 1 comment
Open

Transport security based on symmetric key cryptography #133

antonkharenko opened this issue Nov 18, 2015 · 1 comment

Comments

@antonkharenko
Copy link
Member

Currently all transport messages are sent as plain data and as a result are vulnerable to different kinds of attacks (eavesdropping, tampering, or attempts to generate fake events) in case if malicious user can listen server-to-server communication. In order to introduce security level we want to support symmetric key cryptography which means that key is preliminary distributed on each node of the cluster (as part of configuration) and each message which sent over the network is encrypted/decrypted by this key.

Initial implementation should use the AES-128 standard. The AES standard is considered one of the most secure and modern encryption standards. Additionally, it is a fast algorithm, and modern CPUs provide hardware instructions to make encryption and decryption very lightweight.

Possible extensions of this feature may include (out of the scope for the initial implementation):

  • Support of different configurable encryption algorithms
  • Support of key rotation. Since we trust each node which has key in the cluster we can distribute via gossips new key. So for some time both keys will be active and then old key is removed after new key is converged over the cluster.
@martinfurmanski
Copy link

@antonkharenko Integrating an SSL handler into the netty pipeline is likely the easiest solution. You get a lot of value with minimal implementation effort. Just have to expose the all the configuration of the SSL context on the surface of scalecube. You get a lot of flexbility and security for free.

@ronenhamias ronenhamias transferred this issue from scalecube/scalecube-services Dec 22, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants