-
-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated pkiBundle generation #414
Comments
Why not run |
I'm not yet that proficient with Nix. So, I'm using nixos-anywhere to provision vm's to do destructive experiments. |
The problem of a native option is it's policy and there's too many policy to accommodate everyone's needs. Lanzaboote can provide various hooks and capabilities for everyone to implement their own policies, but it cannot contain a default policy, especially a dangerously insecure one (writing private key material on the target system). To automatically generate the PKI bundle, you can use the extra files feature of nixos-anywhere as mentioned in https://github.com/nix-community/nixos-anywhere/blob/main/docs/howtos/secrets.md. You generate the PKI bundle in your infrastructure in a secret location and you decide whether to move the public and private key altogether or only the public key information. Normally, a production deployment would never keep its private key locally and move it (and generate it) in a secure enclave, e.g. a TPM2 or a HSM. |
Thanks! Will try that |
Hello!
Is it possible to have such a flag, so the system will generate pkiBundle if that does not exist already?
Backstory:
I'm trying to automate the provisioning of NixOS using nixos-anywhere and I provide secrets using sops-nix. And this what I'm getting as a result:
The text was updated successfully, but these errors were encountered: