!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

87 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5129 Servers

Load older messages


SenderMessageTime
11 Jun 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgwhat's OIDC?06:44:38
@k900:0upti.meK900OpenID Connect, which is the thing Tailscale uses for auth06:44:49
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgso what does it mean to store a key for it on the TPM?06:46:02
@k900:0upti.meK900It's just auth06:46:10
@k900:0upti.meK900You sign a token with your private key06:46:16
@k900:0upti.meK900And send it to the server that knows your public key06:46:23
@k900:0upti.meK900So you can log in to Tailscale without any secrets ever being persisted outside the TPM06:46:43
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgoh that's a really cool idea actually06:47:01
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgthough usually people don't actually store shit in the tpm06:47:08
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgsince space there is very limited06:47:12
@elvishjerricco:matrix.org@elvishjerricco:matrix.organd I think it can only store tpm key hierarchy things?06:47:30
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut sealing a key is just as good06:48:01
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgor, no, you want to do the actual auth crypto on the tpm and never on the host06:48:17
@elvishjerricco:matrix.org@elvishjerricco:matrix.orghm06:48:23
@k900:0upti.meK900Yep06:48:26
@k900:0upti.meK900You should be able to06:48:32
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgyea I dunno the details well enough to be sure06:48:41
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut it sounds possible06:48:48
@k900:0upti.meK900 One problem with that is that I'm not sure you can authenticate as the same machine more than once on Tailscale 06:52:21
@k900:0upti.meK900At least with Headscale you have to manually remove the old node06:52:38
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgoh, wait, which level of auth are we talking about? The SSO thing where you actually login for the first time and add the node? Or the auth that occurs just be starting tailscaled back up again?06:53:37
@elvishjerricco:matrix.org@elvishjerricco:matrix.org * oh, wait, which level of auth are we talking about? The SSO thing where you actually login for the first time and add the node? Or the auth that occurs just by starting tailscaled back up again?06:53:50
@k900:0upti.meK900The SSO auth06:54:30
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgI see06:54:37
@k900:0upti.meK900The second auth just uses the token that's persisted on disk06:54:40
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgright I thought you were talking about persisting that token in the TPM instead somehow06:54:58
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbecause I'm guessing that token is generated locally and then certified by the SSO?06:55:42
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgIf it's generated locally you can do that part on the TPM and leave it there06:55:52
@k900:0upti.meK900I don't know if it is06:55:59
@k900:0upti.meK900But I don't think so?06:56:01

Show newer messages


Back to Room ListRoom Version: 6