Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

runtime/keymanager: Support new key manager status fields #5432

Merged

Conversation

peternose
Copy link
Contributor

@peternose peternose commented Nov 7, 2023

Oasis Core 23.0.x introduced support for master secret rotations, adding three new fields to the key manager status. Although these fields are omitted when empty, they can still cause issues. When one of the new key managers registers, the consensus sets the runtime signing key, causing problems for the old key managers. As a result, the old key managers are not able to re-register anymore because enclave re-initialization will fail to verify whether the new policy was published in the consensus layer, due to the inability to decode the key manager status. In contrast, generation and rotation epoch do not create such problems since master secret generations are not enabled by default.

Added also generation and rotation epoch, even though these fields do not cause problems.

Backports: #5421, #5348

@peternose peternose force-pushed the peternose/stable/22.2.x/support-new-km-status-fields branch from e3a385a to cf9c097 Compare November 7, 2023 17:11
@peternose peternose added c:key management Category: key management c:backport Category: backport to stable branch labels Nov 7, 2023
@peternose peternose force-pushed the peternose/stable/22.2.x/support-new-km-status-fields branch 2 times, most recently from 8e1b058 to 535d064 Compare November 7, 2023 17:19
Copy link

codecov bot commented Nov 9, 2023

Codecov Report

Merging #5432 (9f8232c) into stable/22.2.x (5d72200) will increase coverage by 0.13%.
Report is 5 commits behind head on stable/22.2.x.
The diff coverage is n/a.

@@                Coverage Diff                @@
##           stable/22.2.x    #5432      +/-   ##
=================================================
+ Coverage          66.58%   66.72%   +0.13%     
=================================================
  Files                472      472              
  Lines              51668    51668              
=================================================
+ Hits               34404    34473      +69     
+ Misses             13035    12959      -76     
- Partials            4229     4236       +7     

see 50 files with indirect coverage changes

buberdds and others added 4 commits November 9, 2023 11:05
This vulnerability does not affect our current use of the library.
 This vulnerability is removed in Oasis Core 23.0.x.
Oasis Core 23.0.x introduced support for master secret rotations,
adding three new fields to the key manager status. Although these
fields are omitted when empty, they can still cause issues. When
one of the new key managers registers, the consensus sets the runtime
signing key, causing problems for the old key managers. As a result,
the old key managers are not able to re-register anymore because
enclave re-initialization will fail to verify whether the new policy
was published in the consensus layer, due to the inability to decode
the key manager status. In contrast, generation and rotation epoch
do not create such problems since master secret generations are not
enabled by default.
@peternose peternose force-pushed the peternose/stable/22.2.x/support-new-km-status-fields branch 2 times, most recently from ba1fe75 to e0c1cf7 Compare November 9, 2023 10:37
@peternose peternose force-pushed the peternose/stable/22.2.x/support-new-km-status-fields branch from e0c1cf7 to 9f8232c Compare November 9, 2023 10:50
@peternose peternose merged commit c4d5b83 into stable/22.2.x Nov 17, 2023
6 checks passed
@peternose peternose deleted the peternose/stable/22.2.x/support-new-km-status-fields branch November 17, 2023 00:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:backport Category: backport to stable branch c:key management Category: key management
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants