-
Notifications
You must be signed in to change notification settings - Fork 498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dynamic/templated Unix attestator registry entries #5937
Comments
We've discussed this a bit during the contributor sync yesterdqy. The threat model for SPIRE has the spire-agent as untrusted. We limit the SPIFFE IDs that it can request through the registration entries that it is authorized for (are either parented to it or to a node alias of it). The example given here seems a bit to broad in terms of what the agent will be able to attest. There wouldn't be any checks that there is actually an user running on the same node as the agent. If we do end up making something like this available, we want to make sure that there is still some level of control over who can request what SPIFFE ID. @calderonth In your deployment would you be able to validate from the server side (e.g. through a plugin interface that doesn' exit at the moment) that a given node (identified for example through its SPIFFE ID or the node selectors [e.g. |
Interesting. It was my understanding that the role of the unix workload attestator is indeed to provide some guarantees about the underlying workload that is requesting credentials from a given node. So For instance: I like the idea that the spiffe ID gets templated with plugin/node-level information such as you mentioned. |
My initial example was too simplistic, this is what I had in mind to constrain issuance only to certain nodes.
|
Hello,
Is there a way to template registration entries outside of K8s?
I am especially interested at the Unix workload attestator?
If we imagine a large-ish footprint, I wouldn't want to have to write 1:1 mappings for username->spiffe entries.
I can take advantage of Unix groups in selector but I'd want to preserve the original username in the generated SPIFFE claim.
For instance, the ability to build something like that would be super useful I think:
I am not (yet) familiar enough with the codebase to check if it's trivial or not to implement but it feels like this should be doable/add value to this workload attestator.
The text was updated successfully, but these errors were encountered: