Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

authentication: separate client keys per suite #3445

Closed
oliver-sanders opened this issue Nov 22, 2019 · 6 comments · Fixed by #3478
Closed

authentication: separate client keys per suite #3445

oliver-sanders opened this issue Nov 22, 2019 · 6 comments · Fixed by #3478
Assignees
Labels
security security-related issues
Milestone

Comments

@oliver-sanders
Copy link
Member

oliver-sanders commented Nov 22, 2019

Follow on to #3359

Create client keys per suite and store in the cylc-run directory.

  • Client keys only exist for the lifetime of the suite, otherwise they would never be removed which is dangerous.
  • Prevent the code from automatically re-generating client keys.
  • Move the client keys from ~/.cylc/auth to ~/cylc-run/<SUITE NAME>/.service/auth, simplify directory structure.
@oliver-sanders
Copy link
Member Author

Assigning @wxtim and @datamel to help us prioritise #3444.

@dwsutherland
Copy link
Member

Please put this on hold until #3389 is merged, because the network code has been refactored (due to the new PUB/SUB pattern using the same security & logic).

@datamel
Copy link
Contributor

datamel commented Nov 27, 2019

No probs, will hold off until that is all done :)

@hjoliver
Copy link
Member

(#3389 is merged)

@oliver-sanders
Copy link
Member Author

oliver-sanders commented Jan 7, 2020

Quick question, should we delete keys when the suite shuts-down or is it good enough to override the keys at (re)start?

Once the suite has shutdown I don't think there is a security issue with having the old keys kicking about as there is no longer a server listening, besides they are FS protected anyway. You could make the argument that if someone got access to your keys they could brute force them then use that to decrypt previously captured network traffic, with Cylc this isn't likely to get you anywhere (unless a suite is passing API keys via cylc message or something stupid like that). I think curve has some kinda forward protection which helps prevent this.

@dpmatthews
Copy link
Contributor

I don't think we need to worry about deleting keys (and I can't see any way to do it reliably).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security security-related issues
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants