Replies: 2 comments 3 replies
-
Hi @gzm55, This would be a nice feature to have. You may be able to get by using bash command substitution to call So far, we've chosen to add support for HSMs and cloud KMS that can work from any platform, before adding OS-specific options like the Linux kernel keyring or the macOS Keychain. I'm a developer advocate at smallstep. I'd love to hear how it's going for you with |
Beta Was this translation helpful? Give feedback.
-
Hi @tashian , we're trying step-ca for managing ssh login, k8s cert, sudo auth, etc., in our private cloud that cannot easily reach the public cloud KMS, yet not prepare a physical security room for the hardware HSM. we would like to control the attack surface asap, while the step-ca should very likely run on a linux machine, the keyring is a better choice to avoid the hdd side channel attack than password file, and easier to use than luks fs. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, can we support to integrate the step-ca with kernel keyring on linux? Specifically, we can use the password via a key description as the
cryptsetup
tool does. Such as:In addition, we should also use a thread-keyring to hold the password copy instead of a memory variable for reloading the configuration.
And last, if kernel supports, we could implement an x509
keyctl
KMS using kernelkeyctl_pkey_sign
syscalls.Beta Was this translation helpful? Give feedback.
All reactions