-
Notifications
You must be signed in to change notification settings - Fork 480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS node attestor needs to use different cert for different regions #2126
Comments
Thank you for opening this @xinlaini! I remember when we implemented the aws_iid attestor, and being surprised that the validation cert was defined statically on the documentation website. I'm again surprised to find that there are now different certs for some regions :) I feel like that wasn't the case when the plugin was implemented. At any rate, thanks again for opening this, I think it's clear that we need to pull in all the certs defined on the webpage you linked to, and choose the right cert based on region. |
Another interesting tidbit is that the current certificate expires next year. We'll need a plan in place for dealing with that as well. We'll go ahead and schedule this soon to give us time to come up with something. |
I submitted a draft PR addressing the two aspects of this issue: lack of support for several regions and the expiration of the currently used certificate (in June next year) The changes involve:
The issue with these changes is that they break backward compatibility. |
Update: the PR is ready, supports all regions, and is backward compatible. |
@maxlambrecht @evan2645 @azdagron is this fix available in 1.6.4 or will it only be available in 1.7.0? Also do we know which region the cert was hardcoded to previously? |
Answered in slack :) For posterity, this is 1.7.0 only and the key in reference is the main RSA key specified at https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/verify-signature.html.
|
We recently spun up an AWS vm in eu-south-1 (Milan), our existing spire-server (running from GCP) failed to attest the new VM with "cryptography signature verification failures".
It seems that the aws_iid plugin is using a hardcoded cert regardless of the region the aws vm lives in.
However, according to aws doc (for PKCS7 signature verification), milan region has a different DSA cert. I suspect the should have a different RSA cert for that region as well (which I believe is what aws_iid code is using).
It seems not correct to hard code the cert to be used for all region's node attestation.
The text was updated successfully, but these errors were encountered: