Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update multimaster_pki.rst #61962

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

ironman627
Copy link

Previous verbiage gave the impression that a separate "signing" server can be used to prevent the copying of private keys (ie. master.pem) across the network. The problem is that the process to generate a signature file requires both the master.pem (from the original master) and the master_sign.pem (from the signing master) to be on the same box. This would require either copying the appropriate pem file from one master to another. Unfortunately, there is no current way around copying the pem files if you are trying to implement a separate master signing server.
This process turns an existing master into a signing server to reduce overhead of auth-requests coming from minions attached to it.

What does this PR do?

Corrects the inference that a separate signing master server prevents the copying of private keys across the network.

@ironman627 ironman627 requested a review from a team as a code owner April 18, 2022 17:12
@ironman627 ironman627 requested review from Ch3LL and removed request for a team April 18, 2022 17:12
@welcome
Copy link

welcome bot commented Apr 18, 2022

Hi there! Welcome to the Salt Community! Thank you for making your first contribution. We have a lengthy process for issues and PRs. Someone from the Core Team will follow up as soon as possible. In the meantime, here’s some information that may help as you continue your Salt journey.
Please be sure to review our Code of Conduct. Also, check out some of our community resources including:

There are lots of ways to get involved in our community. Every month, there are around a dozen opportunities to meet with other contributors and the Salt Core team and collaborate in real time. The best way to keep track is by subscribing to the Salt Community Events Calendar.
If you have additional questions, email us at [email protected]. We’re glad you’ve joined our community and look forward to doing awesome things with you!

key-pair on a different system than the actual salt-master and create the public
keys signature there. Probably on a system with more restrictive firewall rules,
without internet access, less users, etc.
This process turns each master into a "signing" master server that helps reduce overhead for auth-requests coming from minions.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

so, while i agree this isn't about creating a separate signing master. as the original text wanted to allude to. I don't think this helps reduce auth requests in the slightest. and in fact requires more processing for auth keys. but it does add a layer of security.

Previous verbiage gave the impression that a separate "signing" server can be used to prevent the copying of private keys (ie. master.pem) across the network. The problem is that the process to generate a signature file requires both the master.pem (from the original master) and the master_sign.pem (from the signing master) to be on the same box. This would require either copying the appropriate pem file from one master to another. Unfortunately, there is no current way around copying the pem files if you are trying to implement a separate master signing server. 
This process turns an existing master into a signing server to reduce overhead of auth-requests coming from minions attached to it.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants