For a single node Kubernetes cluster on a physical device that has TPM, how do we securely provide access to the container so that it can establish TLS connection using the private key in TPM ? I understand the option if we store them in secrets those can be exposed, but they are not secure as if you can get access to the device, you can get to the secrets. so if the device has TPM that can secure the private key but the container that needs to establish the cert needs to access the private key securely. In windows world this is easier as the certificate manager stores them using the TPM provider framework and the .net application can just reference the certificate for TLS connections. This doesn't seem to be easier in the linux or the container world. Any ideas on how this can be achieved in linux would be helpful!
how to securely give access to the container to use private key stored in TPM
334 Views Asked by appcoder At
1
There are 1 best solutions below
Related Questions in KUBERNETES
- Timing Issue with Spring Boot Annotation Configuration
- LightAdmin - Customise parsing DateTime with app timezone
- Creating distribution with repackaged spring boot jar using gradle application plugin
- Spring Boot MVC non-role based security
- Add JVM args to spring boot application
- The method and() is undefined for the type HttpSecurity
- swagger ui not working for swagger version 2
- Spring IO Platform 2.0 - Themes/Changes?
- JPA findDistinctPropertyBy magic method doesn't work as expected when using spring-boot-starter-jpa
- Spring boot check external service status on boot
Related Questions in SECURITY
- Timing Issue with Spring Boot Annotation Configuration
- LightAdmin - Customise parsing DateTime with app timezone
- Creating distribution with repackaged spring boot jar using gradle application plugin
- Spring Boot MVC non-role based security
- Add JVM args to spring boot application
- The method and() is undefined for the type HttpSecurity
- swagger ui not working for swagger version 2
- Spring IO Platform 2.0 - Themes/Changes?
- JPA findDistinctPropertyBy magic method doesn't work as expected when using spring-boot-starter-jpa
- Spring boot check external service status on boot
Related Questions in TPM
- Timing Issue with Spring Boot Annotation Configuration
- LightAdmin - Customise parsing DateTime with app timezone
- Creating distribution with repackaged spring boot jar using gradle application plugin
- Spring Boot MVC non-role based security
- Add JVM args to spring boot application
- The method and() is undefined for the type HttpSecurity
- swagger ui not working for swagger version 2
- Spring IO Platform 2.0 - Themes/Changes?
- JPA findDistinctPropertyBy magic method doesn't work as expected when using spring-boot-starter-jpa
- Spring boot check external service status on boot
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Does it, though?
The all idea of a TPM (Trusted Platform Module) is to provide hardware-level security for cryptographic keys. That means, by design, TPM makes sure private keys are never exposed outside the TPM environment, even to the host operating system: the actual private key used for TLS connections is never directly accessible by any process, including those running in the container.
You can use a software in your container that can interact with the TPM on your host machine. That software should be able to communicate with the TPM.
Consider, for instance,
tpm2-tools
:You then mount the TPM device into the container. In Kubernetes, you can do this by modifying your pod specification:
Yes, the container is given controlled access to the TPM device (e.g.,
/dev/tpm0
) via a secure mounting point.But that only means the container can request the TPM to perform operations like signing or key generation, but it cannot directly access the private key. The actual cryptographic operation (like signing) happens inside the TPM, adhering to the security principles of TPM.
During a TLS handshake, the container's application (acting as a TLS client or server) needs to prove its identity, typically by signing a piece of data with its private key.
Instead of accessing the private key directly, the application requests the TPM to perform this signing operation.
The TPM receives the data, signs it internally, and returns the signature to the application.
That signature is then used in the TLS handshake process, authenticating the application without exposing the private key.
This assumes that the Kubernetes node hosting the TPM and container is secure. And the container's privileges should be minimized to reduce the attack surface.
To enable a container to perform TLS connections using a private key in the TPM without direct access to the key, you would typically use a combination of TPM-aware software and a proxy or intermediary service that interfaces between the container and the TPM.
The container needs software capable of interacting with the TPM. That might be a library or a daemon that understands TPM operations.
Since direct access to the TPM from the container might not be desirable or feasible, an intermediary service on the host can mediate this interaction.
That service communicates with the TPM to perform operations like signing or key generation and exposes these capabilities to the container, possibly through a local network service or API.
When the application in the container needs to establish a TLS connection, it communicates with the intermediary service for cryptographic operations.
The intermediary service requests the TPM to perform the necessary operations (like signing) and returns the results to the container application.
The container should have TLS libraries capable of integrating with this setup, allowing the application to use the cryptographic operations provided by the intermediary service for TLS handshakes.
As an example, consider using
tpm2-tss-engine
andnginx
in a container, withtpm2-tss-engine
serving as the intermediary for TLS operations.In the
nginx
configuration, specify the use of thetpm2-tss-engine
for SSL certificates.Your Dockerfile would be:
Your
nginx.conf
configuration (as seen in "nginx with TPM based SSL " by [Nonbei Alley](https://blog.salrashid.dev/about/, without Docker but withengine:tpm2tss
)) would be:(Note:
tpm2-software/tpm2-tss-engine
issue 39 on "Import existing keys into TPM for use with OpenSSL" is still pending)Similar to the previous approach, mount the TPM device into the container in your Kubernetes pod configuration.
Make sure the TPM device is accessible from the host where the Kubernetes pod is running.
That would allow the container to perform TLS operations using a private key in the TPM, with the actual cryptographic operations being handled securely by the TPM, mediated through the
tpm2-tss-engine
.True, many SDKs may not have built-in support for directly interacting with a TPM. That is particularly true for high-level frameworks like .NET Core.
An intermediary service can act as a bridge between the SDK and the TPM. That service would handle TPM interactions and present a more standard interface (like an API or a local network service) to the SDK.
The intermediary service could potentially establish the TLS connection on behalf of the .NET application, using the private key in the TPM for authentication. The .NET application would then communicate with this proxy service over a secure local connection.
The proxy or intermediary service needs access to the TPM device. That typically requires the container to have access to the host's TPM device (e.g., via a mounted
/dev/tpm0
).Having access to the TPM device might necessitate elevated privileges for the container. However, this should be minimized to what is strictly necessary for TPM interactions. Any container with elevated privileges and access to sensitive hardware like TPM must be securely configured and maintained.