Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DEV] Update TPM-Manager to harvest Enrollment Keys rather than deposit JWTs #1

Open
alexlovelltroy opened this issue Aug 1, 2024 · 0 comments

Comments

@alexlovelltroy
Copy link
Member

As discussed in the design meeting on August 1st, we want to update our process for attestation and use that to bootstrap secure communication with the cloud-init server.

Today, the TPM-Manager uses a pre-shared authorized ssh-key to connect to the host and deposit a jwt that can be used with curl to download the payload needed for cloud-init. The orchestration of this connection is handled through ansible.

Instead of depositing a jwt for authentication, we would like to explore other ways of handling the verifiable identity of a node using the cryptographic functions of the TPM. The remote attestation process described and implemented as part of the go-attestation library appears well suited to our needs.

We would like to adapt the tooling in this repository to harvest Public Enrollment Keys from the TPMs in nodes and store them for verification of attestation reports at each boot (or even more frequently).

Once this ticket is completed, we can proceed to using the attestation agent to establish a secure channel for passing cloud-init data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant