January 6, 2020

326 words 2 mins read

Managing server secrets at scale with a vaultless password manager

Managing server secrets at scale with a vaultless password manager

Ever wondered how to quickly and efficiently rollover all of your servers SSH keys or how to securely manage diskless systems? Ignat Korchagin outlines a simple approach that combines hardware support and a little cryptography to help operationalize the management of all the secrets in your cloud.

Talk Title Managing server secrets at scale with a vaultless password manager
Speakers Ignat Korchagin (Cloudflare)
Conference O’Reilly Velocity Conference
Conf Tag Build resilient systems at scale
Location New York, New York
Date October 2-4, 2017
URL Talk Page
Slides Talk Slides
Video

“There is no cloud. It’s just someone else’s computer.” Operating a large cluster, a data center, or a distributed network involves handling a lot of secrets. In almost all cases, you have to deal with at least four types of secrets for each piece of hardware: an SSH server key (or shell access key), a key to bootstrap your configuration management system, a disk encryption key, and some per-server credentials to access other services. And most of the time, these keys have to be set up before your configuration management kicks in, making the automation of this process more difficult. Security-wise, it’s important to control where and when those secrets are generated. Often, keys are generated by startup scripts. However, during initial boot (especially on diskless systems), the system may have a low entropy level in its internal random number generator, resulting in statistically weak generated keys. And once you have your keys, you need to store them securely. This presents a chicken-and-egg problem. An encrypted disk is a great solution, but guess what? You need a key to access an encrypted disk, and where do you store that? Also, where do you store keys for diskless systems? Ignat Korchagin outlines a simple approach that combines hardware support and a little cryptography to help operationalize the management of all the secrets in your cloud and unify and simplify secret management for your hardware fleet. Topics include:

comments powered by Disqus