!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

170 Members
46 Servers

Load older messages


SenderMessageTime
27 May 2022
@grahamc:nixos.org@grahamc:nixos.orgwhat's it for?13:42:06
@mic92:nixos.devMic92 (Old)For a customer13:42:31
@grahamc:nixos.org@grahamc:nixos.orgunless you're running your own Vault plugins, I would recommend using HCP Vault13:42:50
@mic92:nixos.devMic92 (Old)I might actually want this in future :)13:43:33
@grahamc:nixos.org@grahamc:nixos.org(I'd never run a vault instance for a customer)13:43:39
@grahamc:nixos.org@grahamc:nixos.orgre cfssl for TLS: trust in public TLS infrastructure is well established as a thing I do in other areas of my threat model, so I didn't feel the need to do so for this one13:53:27
@grahamc:nixos.org@grahamc:nixos.org * re cfssl for TLS: trust in public TLS infrastructure is well established as a thing I do in other areas of my threat model, so I didn't feel the need to run my own TLS CA for vault13:53:40
@mic92:nixos.devMic92 (Old)My initial motivation was that I could than limit egress to only specific targets if I have not to rely on letsencrypt14:14:14
@anthr76:mozilla.organthr76 left the room.14:37:40
@mic92:nixos.devMic92 (Old)
In reply to @grahamc:nixos.org
the vault agent caches some stuff but not everything
Ok. What information does vault not cache?
14:45:34
@grahamc:nixos.org@grahamc:nixos.orgI think some secrets are not cachable 14:45:45
@grahamc:nixos.org@grahamc:nixos.orgbut not sure14:45:47
28 May 2022
@mic92:nixos.devMic92 (Old) changed their display name from Mic92 to Mic92 (Old).10:26:54
@joerg:thalheim.ioMic92 joined the room.11:33:20
@mic92:nixos.devMic92 (Old) left the room.11:33:26
29 May 2022
@nospaces:fairydust.spacenospaces joined the room.18:25:14
30 May 2022
@florian:web3.foundationFlorian | W3F changed their display name from Florian | OoO -> 29.5. to Florian | W3F.09:04:49
31 May 2022
@joerg:thalheim.ioMic92Wow, reading this I get gnupg vibes: https://support.hashicorp.com/hc/en-us/articles/4407386653843-Vault-KV-V2-Secrets-Engine-Permission-Denied-16:35:35
@joerg:thalheim.ioMic92This is not well-designed.16:35:41
@joerg:thalheim.ioMic92I guess I should have read this here: https://www.vaultproject.io/docs/secrets/kv/kv-v2#acl-rules16:38:26
1 Jun 2022
@tinybronca:sibnsk.netunderpantsgnome joined the room.09:07:10
@joerg:thalheim.ioMic92 grahamc (he/him): are ec2 role tags supported (i.e. created with vault_aws_auth_backend_role_tag) supported by nixos-vault-service 13:38:44
@joerg:thalheim.ioMic92?13:38:45
@grahamc:nixos.org@grahamc:nixos.orgshould be, any auth method that vault agent supports13:39:06
@joerg:thalheim.ioMic92what do you usually use?13:39:53
@joerg:thalheim.ioMic92I have multi-region deployment so those normal iam methods wouldn't work13:40:25
@joerg:thalheim.ioMic92 Turns out I was also using vault_aws_auth_backend_role_tag wrong in terraform but it is also impossible to use because it creates dependency cycles between the ec2 instances I am trying to create. 14:04:43
@joerg:thalheim.ioMic92It also seems that nixos-vault-service cannot be used with aws ec2 auth. Once there are two services that require a secret. The second instance cannot authenticate because of nonce missmatches15:07:52
@grahamc:nixos.org@grahamc:nixos.orgthat is surprising, we use it for aws ec, auth16:59:24
@joerg:thalheim.ioMic92Check out this: https://github.com/DeterminateSystems/nixos-vault-service/issues/5817:19:40

Show newer messages


Back to Room ListRoom Version: 6