Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Tink signing backend for local signing #646

Closed
haydentherapper opened this issue Jun 14, 2022 · 0 comments · Fixed by #645
Closed

Add Tink signing backend for local signing #646

haydentherapper opened this issue Jun 14, 2022 · 0 comments · Fixed by #645
Assignees
Labels
enhancement New feature or request

Comments

@haydentherapper
Copy link
Contributor

Description

A Tink keyset will be encrypted with a remote KMS key, and on CA startup, the keyset will be decrypted and loaded into memory. Keys can be created and encrypted using https://github.com/google/tink/blob/master/docs/TINKEY.md.

There are two main benefits from this work: We can leverage this instead of KMSCA if we need to support a higher QPS, and Tink keysets use strong secure defaults. Keysets can be encrypted with AESGCM, do not rely on a KDF, cannot be brute-forced, and access to the key can be audited through cloud audit logs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant