Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[algs][1] Support configurable algorithm suites for CA keys #43305

Merged
merged 2 commits into from
Jun 26, 2024

Conversation

nklaassen
Copy link
Contributor

@nklaassen nklaassen commented Jun 20, 2024

This PR continues the implementation of RFD 136 - Modern Signature Algorithms.

The current base branch nklaassen/algs-ca-merge-base merges both #43260 and #43152 which this PR depends on, I will update it to master once both of those merge.

This adds support for CAs to use the correct algorithm for the current configured algorithm suite when they generate new keys, during startup or a CA rotation. This works whether the CA is backed by software, HSM, GCP KMS, or AWS KMS keys, and I have tested it on each platform.

We currently don't support signing JWTs with anything other than RSA, so I reverted the algorithm for those keys to RSA in the -dev suites for now, I will update them to ECDSA after I add support.

I have not tested that every protocol and integration works with the new key algorithms. My plan is to incrementally add support for each protocol while updating the subject/client/server key generation and test each protocol as I go. I am not changing any defaults here, you will only start to see the new algorithms used for new CA keys if you manually configure your cluster_auth_preference.signature_algorithm_suite to balanced-dev, hsm-dev, or fips-dev. The default is still legacy.

@nklaassen nklaassen added the no-changelog Indicates that a PR does not require a changelog entry label Jun 20, 2024
@@ -275,7 +275,7 @@ func newAuthConfig(t *testing.T, log utils.Logger) *servicecfg.Config {
}
var err error
config.Auth.ClusterName, err = services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{
ClusterName: "testcluster",
ClusterName: "test-cluster",
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this just matches the cluster name used in lib/auth/keystore tests so that it's easier to find all the test keys in e.g. the AWS console

@nklaassen nklaassen marked this pull request as ready for review June 20, 2024 21:51
@github-actions github-actions bot requested review from greedy52 and tigrato June 20, 2024 21:51
@nklaassen nklaassen changed the base branch from nklaassen/algs-ca-merge-base to nklaassen/algs0 June 21, 2024 20:48
lib/auth/auth.go Show resolved Hide resolved
lib/auth/keystore/aws_kms.go Show resolved Hide resolved
lib/auth/keystore/aws_kms_test.go Show resolved Hide resolved
lib/auth/keystore/aws_kms.go Show resolved Hide resolved
@nklaassen
Copy link
Contributor Author

friendly ping @tigrato

Base automatically changed from nklaassen/algs0 to master June 26, 2024 16:32
@nklaassen nklaassen enabled auto-merge June 26, 2024 18:30
@nklaassen nklaassen added this pull request to the merge queue Jun 26, 2024
Merged via the queue into master with commit d7bc1cb Jun 26, 2024
40 checks passed
@nklaassen nklaassen deleted the nklaassen/algs1 branch June 26, 2024 18:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
no-changelog Indicates that a PR does not require a changelog entry size/md
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants