-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spec: Store spiffeID of NSE in NetworkSerivceEndpoint message #148
Comments
@NikitaSkrynnik Could you also add proto examples to clarify options? # TODO |
denis-tingaikin
changed the title
Proposal: Store spiffeID of NSE in NetworkSerivceEndpoint message
Spec: Store spiffeID of NSE in NetworkSerivceEndpoint message
Oct 27, 2022
This was referenced Nov 23, 2022
Subtasks
|
Seems like completed by #148 (comment) @NikitaSkrynnik Thanks! |
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 13, 2022
Authorization has been introduced as part of v1.7.0-rc.1 networkservicemesh/api#148 These changes are then now require to register a NS or NSE.
12 tasks
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 16, 2022
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled in nsmgr.
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 20, 2022
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled.
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 20, 2022
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled.
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 20, 2022
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled.
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Dec 20, 2022
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled
uablrek
pushed a commit
to Nordix/Meridio
that referenced
this issue
Jan 4, 2023
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Jan 9, 2023
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled
LionelJouin
added a commit
to Nordix/Meridio
that referenced
this issue
Jan 9, 2023
Authorization has been introduced as part of v1.7.0. networkservicemesh/api#148 These changes are then now require to register a NS or NSE if registry policies are enabled
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Current implementation of authorization for registry may be insecure when registry restarts.
Current behavior
When NSE goes to registry to register itself, registry stores it's spiffeID in a map. Registry uses this map to check that different spiffeIDs don't register NSEs with the same names. When registry restarts, the map is removed, and bad NSE has a possibility to register itself under the name of a good NSE.
Solution
path
, which is private and constracted during Registeration of Endpoint. Authorize chain element can get privatepath
from gRPC medatada and check policies.Options
We can store additional information in NSE CRD that can be helpful for future authorization cases. Also we can use NSE labels to store spiffeID.
Option 1: Store only NSE spiffeID in NSE CRD
Fixes registry security issue.
Option 2: Store a list of spiffeIDs in NSE CRD from the path that was constructed during initial NSE registration
Fixes registry security issue. It may be useful for authorization cases that we haven't considered yet
Option 3: Store spiffeID of NSE in NSE labels.
Fixes registry sequrity issue. Doesn't require any changes in API
The text was updated successfully, but these errors were encountered: