2023-10-19
Date and Location
Oct 19, 2023 at 15:00-16:00 (EEST, UTC+3)
Location: Microsoft Teams
Attendees
Petteri Kivimäki (NIIS)
Raido Kaju (NIIS)
Aivar Meisterson
Jalmar Jerlei
Juhani Nuorteva
Oleksii Danyliuk
Teemu Theqvist
Tõnis Pihlakas
Discussion items
# | Item | Notes |
---|---|---|
1 | Summary of development activities | Summary of ongoing development activities. |
2 | Adding/removing Central Server nodes and rotating configuration sign keys without uploading a new configuration anchor to the Security Server manually | Currently, adding/removing Central Server nodes and rotating configuration sign keys requires generating a new configuration anchor and uploading it to the Security Server manually. This is not optimal since the new anchor must be uploaded by each and every Security Server admin before the changes are applied to all the Security Servers. It is possible to get rid of having to upload the new configuration anchor manually by publishing the anchor online and making the Security Server download it regularly (e.g., once a day). Alternative A
Publishing the configuration anchor online exposes the anchor for DNS-related threats. There are two options ways to mitigate the threats:
Alternative B Keep the configuration anchor as it is and do not publish it online. Instead, the information regarding Central Server nodes and global configuration sign keys is added to the global configuration. In this way, the Security Server gets the initial Central Server node URL(s) and global configuration sign key(s) from the configuration anchor when it's uploaded for the first time during the Security Server initialisation. As soon as the Security Server starts downloading the global configuration after initialisation, the Security Server starts using the information available in the global configuration. In this way, the Security Server has always up-to-date information since the information in the global configuration gets updated as soon as the Central Server configuration changes. Also, it's still possible to upload the configuration anchor to the Security Server manually too. Summary of the alternative B:
The X-Road Technical Committee has decided that adding/removing Central Server nodes and rotating configuration sign keys without uploading a new configuration anchor will be implemented using alternative B. |
3 | X-Road High Level Road Map 2024-2031 | An online presentation recorded at the X-Road Community Event 2023 is available here. |
4 | Open topics |
|
Next meetings |
|