Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generate New TLS Material for Secure Communication with Nested Auraed Cells #455

Open
izissise opened this issue Mar 14, 2023 · 1 comment

Comments

@izissise
Copy link
Contributor

After and if #443 is merged, the communication channel between the auraed daemon and nested auraed cells will be open and unencrypted, which poses a potential security risk. To address this issue, we propose generating new TLS material and providing a TLS certificate to each new nested auraed cell for secure communication with the auraed daemon.

The nested auraed cells are spawned using fork/exec, which presents a challenge in passing the TLS certificate from the auraed daemon to the nested auraed cells.

If it is indeed a security risk, we need to choose which IPC we'll use to pass the certificate.

My guess is the best contender is memfd.
it is a reference counted file in RAM which mean that we don't have to clean it once the nested process is gone, and it is possible to pass opened FDs throught fork/exec barrier.

Any other solution or remarks are welcome,
Thanks for reading.

@krisnova
Copy link
Contributor

Also see #436 where we discuss the ethernet connection to nested guests

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants