Add support for AuthN/AuthZ to Hegel/Tink Server workflows #507
Labels
help wanted
Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines.
kind/feature
Categorizes issue or PR as related to a new feature.
priority/awaiting-more-evidence
Lowest priority. Possibly useful, but not yet enough support to actually get it done.
Right now, Tinkerbell effectively trusts all MAC addresses coming in as the hardware it claims to be before supplying an image for PXE booting with tink-worker, and tink-worker eventually runs a workflow assigned to that machine's MAC address. The machine (via a workflow step) may call hegel and request additional machine information like boot scripts with secret information in them.
The PXE booted image hopefully won't contain anything secret, but the workflow or hegel metadata responses could contain boot-time secrets.
In order to prevent a MAC address spoof for a compromised machine from gaining anything other than a PXE booted image, it seems like integration for AuthN/Z to Hegel and possibly workflows could help to mitigate this threat.
TPMs might be a great solution here for machines that support it. In addition to the MAC/IP tuple stored in the hardware data, if a TPM device's public key was pre-registered or trusted on first use, sensitive data used in machine bootstrapping would be more resistant to a bad actor.
Current Behaviour
Expected Behaviour
Possible Solution
Add TPM attestation to calls to hegel or tink-server workflows
I'm mainly opening this as a tracking ticket, not a formal proposal
Relates to #134
The text was updated successfully, but these errors were encountered: