Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement the soporteremoto-feed package for libremesh #14

Open
germanferrero opened this issue Dec 6, 2019 · 1 comment
Open

Implement the soporteremoto-feed package for libremesh #14

germanferrero opened this issue Dec 6, 2019 · 1 comment
Assignees
Milestone

Comments

@germanferrero
Copy link
Collaborator

germanferrero commented Dec 6, 2019

The package should implement:

  • Installation of public certificate on pendrive plug.
  • Acceptance or rejection of ephemeral ssh keys announced on shared-state.
  • Contemplate persistence of soporteremoto configuration. We don't want to lose this configuration if the rpi gets broken. Maybe distributing and persisting the config on each node will help.
@germanferrero germanferrero added this to the APC-Labs milestone Dec 6, 2019
@germanferrero germanferrero self-assigned this Dec 10, 2019
@germanferrero
Copy link
Collaborator Author

germanferrero commented Dec 10, 2019

Implement the soporteremoto-feed package for libremesh #14

This package contains all the necessary software for a librerouter
to be included in a soporteremoto network, and receive support
in consecuence.

Installation of access-keys-signer certificate.

Unit Test:

  • Action: I do plug a pendrive with a pubCert file on it to the LR.
  • Result: The access-keys-signer gets written on /etc/config/soporteremoto

Installation of access key

Unit Tests:

  • Happy Path
    • Context:
      • access-keys-signer installed.
      • shared-state soporteremoto table with new (not installed) access-key signed with the access-keys-signer.
    • Action: execute script that reads shared-state soporteremoto table.
    • Result: the new key is added to ssh-client authorized-keys.
  • Not certificate installed.
    • Context:
      • access-keys-signer not installed.
      • shared-state soporteremoto table with new access-key.
    • Action: execute script that reads shared-state soporteremoto table.
    • Result: the new key is not added to ssh-client authorized-keys, a log is written to be consumed in the future with prometheus.
  • Certificate installed malicious key.
    • Context:
      • access-keys-signer installed.
      • shared-state soporteremoto table with new malicious bad signed access-key.
    • Action: execute script that reads shared-state soporteremoto table.
    • Result: the new key is not added to ssh-client authorized-keys, a log is written to be consumed in the future with prometheus.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants