!UUqahLbShAYkkrXmKs:matrix.org

DevOS

35 Members
Seeking help and geeking out together on https://github.com/divnix/devos & https://github.com/divnix/digga10 Servers

Load older messages


SenderMessageTime
25 Oct 2021
@tomberek:matrix.orgtomberek you can use exec to decrypt something for you at eval-time, but it would often leak into the /nix/store. You'd need a build-time exec. 18:14:45
@blaggacao:matrix.orgDavid Arnold (blaggacao)Good resume;18:15:07
@timdeh:matrix.org@timdeh:matrix.org * we use a vault-plugin for our tfstate atm 18:15:08
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Good resume!18:15:13
@blaggacao:matrix.orgDavid Arnold (blaggacao) To de-throne the sheesy magic addition to manage configs, build time exec might be what's needed, though. 18:15:50
@timdeh:matrix.org@timdeh:matrix.orgThat opens up a pretty huge can of impure worms though18:16:14
@blaggacao:matrix.orgDavid Arnold (blaggacao)For all that involves nixos or derivations, that would be very much self inflicting harm.18:16:38
@blaggacao:matrix.orgDavid Arnold (blaggacao) Yeah, sheesy's serverless approach to rotation is a bit of a pain, too. 18:17:49
@tomberek:matrix.orgtomberekThe idea is that decryption is either success or failure, so it's not impure, but either pure or impossible.18:17:53
@blaggacao:matrix.orgDavid Arnold (blaggacao) If we need identity, let's just use an attestor (such as vault or spiffe or step-ca). 18:18:22
@timdeh:matrix.org@timdeh:matrix.orgwhich reminds me, I also found this yesterday: https://openpgp-ca.org/18:18:44
@blaggacao:matrix.orgDavid Arnold (blaggacao)If we just need to assert identity, a SViD based aproach might be a bit more inferoperable.18:19:41
@blaggacao:matrix.orgDavid Arnold (blaggacao)SVID = Certificate of Identity (X509) + spiffe ID18:20:05
@blaggacao:matrix.orgDavid Arnold (blaggacao) SpiffeID: spiffe://com.mydomain/me/and/my/dog 18:20:41
@tomberek:matrix.orgtomberekSPIFFE is good, but like anything x509, complex.18:21:02
@blaggacao:matrix.orgDavid Arnold (blaggacao) All that credentials actually do is to establish identity (in a very old-fashoined way) 18:21:35
@timdeh:matrix.org@timdeh:matrix.orgyeah I was about to say, x509 might be the only format even more frustrating to use than gnupg 😅18:21:36
@blaggacao:matrix.orgDavid Arnold (blaggacao)X509 is very simple, and interpoerable with tls.18:22:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)* X509 is very simple, and interoperable with tls.18:22:17
@blaggacao:matrix.orgDavid Arnold (blaggacao) Sure you can have TLS and something else. But that looks like more complexity still due to an additional component. 18:22:47
@blaggacao:matrix.orgDavid Arnold (blaggacao)Ok, I'd agree that TLS is complex. 😎😆18:23:17
@blaggacao:matrix.orgDavid Arnold (blaggacao)But what is security at rest without security in motion?18:23:33
@tomberek:matrix.orgtomberek(going slightly off-topic): i'm sad that client x509 certs never got better UI support in browsers/ecosystem18:24:24
@tomberek:matrix.orgtomberekwe now have FIDO2/U2F instead18:25:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)& Webauthn18:25:43
@blaggacao:matrix.orgDavid Arnold (blaggacao)* & `webauthn`18:26:00
@blaggacao:matrix.orgDavid Arnold (blaggacao)And JWTs 😕18:26:10
@blaggacao:matrix.orgDavid Arnold (blaggacao)

Circling back to secrets management.

Avery secrets management problem is in reality also an identity assertion problem.

18:27:09
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Circling back to secrets management. Every secrets management problem is in _reality_ also an identity assertion problem.18:27:18
@blaggacao:matrix.orgDavid Arnold (blaggacao)With some evolution on the application side (or a Smart wrapper), we can solve those problemas at the root.18:27:52

Show newer messages


Back to Room ListRoom Version: 6