You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tailscale/tka
Anton Tolchanov 01847e0123 ipn/ipnlocal: discard node keys that have been rotated out
A non-signing node can be allowed to re-sign its new node keys following
key renewal/rotation (e.g. via `tailscale up --force-reauth`). To be
able to do this, node's TLK is written into WrappingPubkey field of the
initial SigDirect signature, signed by a signing node.

The intended use of this field implies that, for each WrappingPubkey, we
typically expect to have at most one active node with a signature
tracing back to that key. Multiple valid signatures referring to the
same WrappingPubkey can occur if a client's state has been cloned, but
it's something we explicitly discourage and don't support:
https://tailscale.com/s/clone

This change propagates rotation details (wrapping public key, a list
of previous node keys that have been rotated out) to netmap processing,
and adds tracking of obsolete node keys that, when found, will get
filtered out.

Updates tailscale/corp#19764

Signed-off-by: Anton Tolchanov <anton@tailscale.com>
6 months ago
..
aum.go
aum_test.go
builder.go
builder_test.go
chaintest_test.go all: use Go 1.22 range-over-int 8 months ago
deeplink.go
deeplink_test.go
key.go
key_test.go
scenario_test.go
sig.go ipn/ipnlocal: discard node keys that have been rotated out 6 months ago
sig_test.go ipn/ipnlocal: discard node keys that have been rotated out 6 months ago
state.go
state_test.go
sync.go all: use Go 1.22 range-over-int 8 months ago
sync_test.go
tailchonk.go all: use Go 1.22 range-over-int 8 months ago
tailchonk_test.go
tka.go ipn/ipnlocal: discard node keys that have been rotated out 6 months ago
tka_test.go