Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forcing Rotation of SPIRE Trust Bundle #928

Closed
APTy opened this issue May 24, 2019 · 2 comments
Closed

Forcing Rotation of SPIRE Trust Bundle #928

APTy opened this issue May 24, 2019 · 2 comments

Comments

@APTy
Copy link
Contributor

APTy commented May 24, 2019

In case of a compromised UpstreamCA or self-signed SPIRE cluster, it is important to be able to quickly rotate the trust bundles and SVIDs of all downstream consumers, plus propagate the trust bundle change to any federated trust domains.

If the SPIRE server receives a new upstream root in the ca manager "prepare" step, it will push a new bundle update to all consumers; however, we still need to revoke the old (compromised) upstream root. But because many workloads still rely on the old upstream root, it may be prudent to speed up workload SVID renewal, to start making use of the new root as quickly as possible, so that the old one can be removed more expediently.

In the case of using the UpstreamCA plugin, this renewal may need to be synchronized across clusters.

@amartinezfayo
Copy link
Member

This part of the efforts to solve #1934.

@evan2645
Copy link
Member

Closing this out in favor of tracking the work in #1934 thank you for opening this @APTy!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants