!UUqahLbShAYkkrXmKs:matrix.org

DevOS

33 Members
Seeking help and geeking out together on https://github.com/divnix/devos & https://github.com/divnix/digga10 Servers

Load older messages


SenderMessageTime
25 Oct 2021
@blaggacao:matrix.orgDavid Arnold (blaggacao)* X509 is very simple, and interoperable with tls.18:22:17
@blaggacao:matrix.orgDavid Arnold (blaggacao) Sure you can have TLS and something else. But that looks like more complexity still due to an additional component. 18:22:47
@blaggacao:matrix.orgDavid Arnold (blaggacao)Ok, I'd agree that TLS is complex. 😎😆18:23:17
@blaggacao:matrix.orgDavid Arnold (blaggacao)But what is security at rest without security in motion?18:23:33
@tomberek:matrix.orgtomberek(going slightly off-topic): i'm sad that client x509 certs never got better UI support in browsers/ecosystem18:24:24
@tomberek:matrix.orgtomberekwe now have FIDO2/U2F instead18:25:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)& Webauthn18:25:43
@blaggacao:matrix.orgDavid Arnold (blaggacao)* & `webauthn`18:26:00
@blaggacao:matrix.orgDavid Arnold (blaggacao)And JWTs 😕18:26:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)

Circling back to secrets management.

Avery secrets management problem is in reality also an identity assertion problem.

18:27:09
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Circling back to secrets management. Every secrets management problem is in _reality_ also an identity assertion problem.18:27:18
@blaggacao:matrix.orgDavid Arnold (blaggacao)With some evolution on the application side (or a Smart wrapper), we can solve those problemas at the root.18:27:52
@blaggacao:matrix.orgDavid Arnold (blaggacao)* With some evolution on the application side (or a `SIGHUP`ing Smart Wrapper), we can solve those problemas at the root.18:28:09
@blaggacao:matrix.orgDavid Arnold (blaggacao) So: let's assert identity based on something (observable) that you are rather on what you know. 18:29:15
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Circling back to secrets management. Every secrets management problem is in _reality_ an identity assertion problem.18:29:38
@timdeh:matrix.org@timdeh:matrix.orghttps://github.com/mishajw/kipa?18:30:13
@blaggacao:matrix.orgDavid Arnold (blaggacao)Like a kernel-based hash of the app binary.18:30:17
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Like a kernel-provided hash of the app binary.18:30:44
@blaggacao:matrix.orgDavid Arnold (blaggacao)Or a combination of a bin-hash, a user / group.18:31:14
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Or a combination of a bin-hash, a user / group that the kernel reports about the execution environment of a process. I.e. tale-telling process stats.18:31:48
@blaggacao:matrix.orgDavid Arnold (blaggacao)I mean, the subject of identity are, in reality, processes, not hosts.18:32:38
@timdeh:matrix.org@timdeh:matrix.orgbut how do we use that exactly?18:34:15
@blaggacao:matrix.orgDavid Arnold (blaggacao)An attestor can map those fingerprints to an identity certificate.18:34:43
@blaggacao:matrix.orgDavid Arnold (blaggacao)* An attestor (vault, spiffe, step-ca) can (securely) map those fingerprints to an identity certificate.18:35:22
@blaggacao:matrix.orgDavid Arnold (blaggacao)(short-lived identity certificate ~5mins)18:35:48
@blaggacao:matrix.orgDavid Arnold (blaggacao)The good thing about X509, you can arrange for things to have tls and AuthC in one single artifact.18:36:56
@blaggacao:matrix.orgDavid Arnold (blaggacao)For example when using postgres 18:37:04
@blaggacao:matrix.orgDavid Arnold (blaggacao)Hence my pledge for the SVID spec.18:37:37
@blaggacao:matrix.orgDavid Arnold (blaggacao) There are X509-SVID & JWT-SVID. 18:37:58
@blaggacao:matrix.orgDavid Arnold (blaggacao) The one major blocker is actually that openssh last time I checked did not support atomic hot-reloading of cert context. In fact no hot-reloading, at all 18:39:33

Show newer messages


Back to Room ListRoom Version: 6