| 18 Oct 2022 |
Linux Hackerman | and it decrypts the secret from secrets/$hostname/loki-password.gpg and copies it over at deployment time | 09:05:05 |
Shyim | Linux Hackerman: So I need the private gpg key on the machine right? :D | 09:05:44 |
Linux Hackerman | the advantage of this approach is that the secrets can theoretically not get copied to the nix store (in practice they do, because I use Flakes) | 09:05:53 |
Linux Hackerman | Shyim: only on the machine from which you're deploying | 09:06:01 |
Shyim | AHHH. cool | 09:06:43 |
Linux Hackerman | but I think I'll be switching to agenix or sops-nix at some point in the future, partly because this approach is colmena-specific and I'm not sure I want to stick with colmena | 09:06:57 |
Linux Hackerman | and partly because the secrets are persisted unencrypted on the target machines' disks, which I'd also prefer not to do | 09:07:26 |
Shyim | I currently join ssh and just do nixos-rebuild so. tbh: I don't care if it's in nix store. I just don't want to have them on Github publicly accessible as my nix files are public :D | 09:08:14 |
Linux Hackerman | both agenix and sops-nix copy the encrypted secrets to the store as part of the system closure, and they're encrypted to a key that lies on the machine (often the SSH host key) to be decrypted only to a ramfs at runtime | 09:08:37 |
Linux Hackerman | then again, having both the encrypted secrets and the unencrypted SSH host key on disk isn't much different from having the unencrypted secrets on disk I guess | 09:09:27 |
Linux Hackerman | the next-level thing would be to add a TPM and measured boot into the setup, but I'm nowhere near getting there lol | 09:10:05 |
@v:meowy.tech | In reply to @linus:schreibt.jetzt then again, having both the encrypted secrets and the unencrypted SSH host key on disk isn't much different from having the unencrypted secrets on disk I guess the various permissions on the file also matter, the nix store is world readable but the ssh host key probably isnt | 09:10:16 |
Linux Hackerman | right, but none of these approaches make the unencrypted secrets world-readable | 09:10:36 |