-
Notifications
You must be signed in to change notification settings - Fork 71
Use separate keys for payload mechanism and mTLS #1129
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report❌ Patch coverage is
Additional details and impacted files
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
sarroutbi
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes LGTM. Just a pair of naming and comments improvements
This allows algorithms other than RSA to be used for mTLS. The payload encryption mechanism requires an RSA key pair, so always generate an RSA key for the payload mechanism. This renames the 'nk_pub' and 'nk_priv' respectively as 'mtls_pub' and 'mtls_priv' when they are used for mTLS. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
|
I proposed an update to the test suite via RedHat-SP-Security/keylime-tests#900 |
sarroutbi
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes regarding naming. Rest of changes LGTM
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. When testing PQC algorithms, set ECDSA keys for the agent due to https://issues.redhat.com/browse/RHEL-117439. Once this is fixed, the special treatment for the agent mTLS should be removed. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. When testing PQC algorithms, set ECDSA keys for the agent due to https://issues.redhat.com/browse/RHEL-117439. Once this is fixed, the special treatment for the agent mTLS should be removed. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. When testing PQC algorithms, set ECDSA keys for the agent due to https://issues.redhat.com/browse/RHEL-117439. Once this is fixed, the special treatment for the agent mTLS should be removed. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
Previously, the agent supported only RSA key/certificate as the mTLS key because it was also used to encrypt data in the secure payload mechanism. With keylime/rust-keylime#1129, the agent is now able to use different algorithms for mTLS. When testing PQC algorithms, set ECDSA keys for the agent due to https://issues.redhat.com/browse/RHEL-117439. Once this is fixed, the special treatment for the agent mTLS should be removed. Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
This allows other algorithms to be used for mTLS.
The payload encryption mechanism requires an RSA key pair, so always generate an RSA key for the payload mechanism.
Fixes #1126