-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
authentication: separate client keys per suite #3445
Comments
Please put this on hold until #3389 is merged, because the network code has been refactored (due to the new PUB/SUB pattern using the same security & logic). |
No probs, will hold off until that is all done :) |
(#3389 is merged) |
Quick question, should we delete keys when the suite shuts-down or is it good enough to override the keys at (re)start? Once the suite has shutdown I don't think there is a security issue with having the old keys kicking about as there is no longer a server listening, besides they are FS protected anyway. You could make the argument that if someone got access to your keys they could brute force them then use that to decrypt previously captured network traffic, with Cylc this isn't likely to get you anywhere (unless a suite is passing API keys via cylc message or something stupid like that). I think curve has some kinda forward protection which helps prevent this. |
I don't think we need to worry about deleting keys (and I can't see any way to do it reliably). |
Follow on to #3359
Create client keys per suite and store in the
cylc-run
directory.~/.cylc/auth
to~/cylc-run/<SUITE NAME>/.service/auth
, simplify directory structure.The text was updated successfully, but these errors were encountered: