-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
hsmdaemon install consistency and accuracy #3710
Conversation
Backports needed. |
@jnweiger see inline
Please correct your changes accordingly ! @EParzefall FYI |
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
I think I also encountered the issue that when you do the steps described in the docs ownCloud defaults to user-key encryption. |
Can you bring some light into that what you mean. What needs to be changed where? |
my proposal - change from user to master key in hsm, see my comment in the issue referenced by @IljaN |
I am working on a rewrite including the user/master key fix, will push soon. |
#3717 (Decryption tests for HSM Daemon) |
3ae96aa
to
f998dca
Compare
The last commit is a first rework and needs language checking. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
2e59398
to
2d019ef
Compare
Squashed rebased and pushed. Starting next fixes tomorrow. |
@IljaN fixed, default now is masterkey |
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
modules/admin_manual/pages/configuration/server/security/hsmdaemon/index.adoc
Outdated
Show resolved
Hide resolved
…emon/index.adoc Co-authored-by: Phil Davis <[email protected]>
…emon/index.adoc Co-authored-by: Phil Davis <[email protected]>
Implemented |
This document appears to be generally working.
But it has several smaller defects:
./hsmdaemon install
actually creates a service file with the current PWD hardcoded. No path lookup is ever done during service invocation. It is safer to use the install subcommand with the binary that was placed in the final destination, e.g./usr/local/bin/hsmdaemon install
As this manual is in the public, I miss some instruction how to actually obtain the hsmdaemon code. It is not opensource. Maybe ooint to the consulting team?