CAS Backup Controller
This Kubernetes controller ensures that other cluster nodes have a registered CAS backup. This enables CAS to be restarted on a different node of a Kubernetes cluster. Note that the CAS Backup Controller does NOT backup the CAS database: You need to explicitly back up the Kubernetes volume used by CAS.
Requirements
The CAS Backup Controller can run either locally (as a standalone container) or in a Kubernetes cluster. It requires two assets to run and register backups:
- Access to the Kubernetes cluster via a Kubernetes configuration file (whose default location is
~/.kube/config
), if running locally, or via a ServiceAccount, if running on a cluster. - The primary CAS owner identity via a SCONE CLI configuration file. The owner identity is created during the provisioning process of the primary CAS, and it is stored in the SCONE CLI configuration file (whose default location is
~/.cas/config
).
Please note that the primary CAS must have persistence enabled and be configured appropriately.
Quick start
For an end-to-end example, please check the Quick Start guide.
Background
CAS encrypts its database with an encryption key derived from the SGX private Seal Key, which is unique to the particular platform/machine. Although very secure, one practical effect of having the records encrypted this way is that they cannot be opened on other machines (since the private Seal Key is different). This is a limitation for production systems, mainly if they are managed by orchestration tools, such as Kubernetes, which assume the workloads to be fault-tolerant and have their deployment decoupled from specific infrastructure nodes.
To overcome this limitation, the user can securely register backup encryption keys through the CAS Backup feature, allowing the encrypted records to be opened on other machines.
The CAS Backup Controller automatically registers backup encryption keys from all the nodes in a Kubernetes cluster. This allows CAS to open its encrypted database even when migrated to another node in the cluster (e.g., to recover from a node failure).
Note that one needs to ensure that one always has at least one backup registered. Consider that the nodes of a Kubernetes cluster running on a set of servers S1. The backup controller registers backups for each server in S1. If one shuts down all nodes of a Kubernetes cluster, one needs to ensure when the cluster is started again on a new set of servers S2 that S1 and S2 have at least one server in common. If this cannot be guaranteed, one might need to register a backup on an additional server B such that one can use B to recover the CAS database.
How it works
The Controller relies on a SCONE CLI configuration file with an owner identity. This configuration file can be provided locally (--config path/to/config.json
) or injected via a session (--session session_name/service_name
). Since the SCONE CLI configuration holds sensitive information that could allow someone to impersonate the CAS owner, using a session is preferred.
The Kubernetes configuration is retrieved using load_kube_config
and load_incluster_config
functions to load the cluster configuration from the environment (be it a local KUBECONFIG file or a ServiceAccount token, if inside the cluster).
The Controller loop scans the nodes periodically, indexing them by their UID. Master nodes are skipped. If a selector label is defined (e.g., export SELECTOR_LABEL="sgx.k8s.io/has-sgx=true"
), all nodes that do not match the selector are also skipped.
Selected nodes are added to an internal, in-memory data structure to keep track of which nodes have registered backups and which nodes are still missing. The Controller skips selected nodes that are not schedulable at the moment until the next loop.
Ephemeral backup CAS resources are then deployed to selected nodes that are schedulable. When the CAS Pod is reported as "Ready", the Controller will try to register them as a backup for the primary CAS. If this operation fails, the error will appear in the Controller output, and the Controller will continue the loop (failed registrations are attempted again in the following loops). Regardless of the outcome, ephemeral backup CAS resources are deleted right after the registration operation. If it fails, new ephemeral backup CAS resources will be created in the next loop.
Please note that the primary CAS requires all registered backup CAS to have a TCB (Trusted Computing Base) in an equal or better state.
New cluster nodes will be automatically included in the loop. No action is taken for deleted cluster nodes.
Detecting hardware changes
Since the CAS encryption key is derived from the underlying hardware (i.e., the SGX seal key), we have to detect hardware changes and register backups with the new keys again. Detecting such changes is challenging in some scenarios, especially when the user does not control the infrastructure (e.g., VMs in public cloud providers).
The Controller implements two strategies to solve this issue. You can specify a label selector for LAS pods (through environment variable LAS_SELECTOR_LABEL
), allowing the Controller to keep track of their public keys on each node. Since the LAS public key is also derived from the SGX seal key, it is unique per physical machine. Any LAS public key change causes the cluster node to have a backup registered again. If the cluster does not have any LAS pods, or if any issue happens when fetching the public keys, the Controller will fall back to checking the boot_id
of the cluster nodes, as exposed by Kubernetes. Any change in the boot_id
(indicating a node restart) will cause the cluster node to have a backup registered again.
Remote attestation
To enable remote attestation, specify --session session/service
argument to the Controller (e.g., --session backup_controller/register
).
The submitted session should contain the SCONE CLI configuration file with an owner identity. This configuration file is obtained through the provisioning process of the primary CAS.
This is the recommended way of running the Controller in a Kubernetes cluster (or in any potentially untrusted infrastructure, really), because you can inject the owner configuration file securely through CAS.
Running the SCONE CLI
Running the SCONE CLI container:
docker run -it --rm \
--device /dev/isgx \
registry.scontain.com/sconecuratedimages/sconecli:latest
Alternatively, if you want to run a SCONE CLI inside the Kubernetes cluster, use the following commands:
cat > cli-pod.yaml <<EOF
apiVersion: v1
kind: Pod
metadata:
name: scone-cli
labels:
app: scone-cli
spec:
imagePullSecrets:
- name: sconeapps
containers:
- name: cli
image: registry.scontain.com/sconecuratedimages/sconecli:latest
command:
- sh
- -c
- sleep 20000
EOF
kubectl create -f cli-pod.yaml
kubectl exec -it scone-cli -- sh
Provisioning CAS
To claim ownership over a CAS and to be able to register backups for it, one must perform the provisioning operation through the SCONE CLI. To do so, the owner needs the provisioning token and the CAS key hash, both provided by CAS after startup, and a CAS owner configuration file, a TOML file with a CAS configuration.
The example below shows an owner configuration file for CAS.
[api_identity]
common_name = "mycas"
alt_names = ["mycas", "cas", "localhost"]
[ias]
spid = "<spid>"
linkable_quotes = true
sp_key = "<sp_key>"
base_uri = "https://api.trustedservices.intel.com/sgx/dev/attestation/v3"
[dcap]
subscription_key = "<subscription key>"
To provision the primary CAS, run:
scone cas provision $SCONE_CAS_ADDR \
--token $PROVISIONING_TOKEN \
-c $CAS_KEY_HASH \
--config-file cas-default-owner-config.toml \
with-attestation
You need to export the appropriate values for
$SCONE_CAS_ADDR
: primary CAS address; remember to use the same address as the one the CAS Backup Controller will contact!$PROVISIONING_TOKEN
: available at CAS logs after startup, and$CAS_KEY_HASH
: you can also find this in the CAS log.
The subcommand with-attestation
attests and verifies the primary CAS and saves the owner identity to the SCONE CLI configuration file. In this example, the SCONE CLI configuration is saved at its default location, ~/.cas/config
. To keep it somewhere else, set the environment variable SCONE_CLI_CONFIG
to the desired path. You can pass optional arguments to relax the attestation constraints. For example, to allow older, less secure SGX hardware (-G
) with hyperthreading enabled (-C
) and enclaves in debug mode, use with-attestation -G -C --only_for_testing-debug
.
The parameter --config-file
points to the CAS owner configuration file.
After successful provisioning, the owner can register backups for the primary CAS. The owner identity is saved to the SCONE CLI configuration file.
Running the Controller
Running the CAS Backup Controller as a Kubernetes pod
Suppose the CAS Backup Controller is started on the Kubernetes cluster. In that case, the SCONE CLI configuration file must be protected since we no longer trust the CAS Backup Controller infrastructure. To run it securely, we must leverage SCONE's remote attestation and secure file injection mechanisms to securely deliver the SCONE CLI configuration file (which contains the owner identity) to a CAS Backup Controller running inside of SGX enclaves.
To do so, we must first create a policy for the Controller. For development, this looks like this:
name: backup_controller
version: "0.3"
security:
attestation:
tolerate: [debug-mode, hyperthreading, outdated-tcb, software-hardening-needed]
ignore_advisories: "*"
services:
- name: register
image_name: cli
mrenclaves: [307a470e9bc42e28fee9a5190c21821d8a2b2bbfb67ee175852e1635473c75b9]
command: "scone cas register-backup @@3"
environment:
SCONE_MODE: hw
SCONE_LOG: error
SCONE_CLI_CONFIG: /etc/owner-config.json
\@\@SCONE_LAS_ADDR: ""
pwd: /
images:
- name: cli
injection_files:
- path: /etc/owner-config.json
content: |
{
"default_cas": "mycas",
"identity": "-----BEGIN PRIVATE KEY-----\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgHyupqvcKNLNDz7Hz\n85NyYXmYKnDYvS9X+ajztepQexKhRANCAATKxsvoQtR4RGscgtzPOgTdYZuODe0W\nxlr74FcTfPOtmW8/2l3Uop73CWGoZ21iVIxJCo5ajDP0mgWGR73ebuCj\n-----END PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----\nMIIBSzCB8aADAgECAgEqMAoGCCqGSM49BAMCMCExHzAdBgNVBAMMFnJjZ2VuIHNl\nbGYgc2lnbmVkIGNlcnQwIBcNNzUwMTAxMDAwMDAwWhgPNDA5NjAxMDEwMDAwMDBa\nMCExHzAdBgNVBAMMFnJjZ2VuIHNlbGYgc2lnbmVkIGNlcnQwWTATBgcqhkjOPQIB\nBggqhkjOPQMBBwNCAATKxsvoQtR4RGscgtzPOgTdYZuODe0Wxlr74FcTfPOtmW8/\n2l3Uop73CWGoZ21iVIxJCo5ajDP0mgWGR73ebuCjoxgwFjAUBgNVHREEDTALgglz\nY29uZSBjbGkwCgYIKoZIzj0EAwIDSQAwRgIhAOsHv3TLIm9zjvXwYXevqRU3kWW5\nWFfchJ7ZIo4Yu2wBAiEAhdH9Esc3f1ionob4s9n1PyyRy8p7hVpk7Wo4BaidAKs=\n-----END CERTIFICATE-----\n",
"cas_db": {
"mycas": {
"url": "https://mycas:8081/",
"chain": "-----BEGIN CERTIFICATE-----\nMIIBTDCB86ADAgECAggQzA5R2QWOezAKBggqhkjOPQQDAjAOMQwwCgYDVQQDDANj\nYXMwHhcNMjAxMTAzMjI0OTQyWhcNMjExMTAzMjI0OTQyWjAXMRUwEwYDVQQDDAxj\nYXMtaW5zdGFuY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQoz1UQhZpUG5E9\ndXzcpe7eO/EkeamU5gJhmYn7ZDUq/c78yPjZe47FDP2s0MBzv9OxRNvlHTmM3ST8\nb9vjMt6bozIwMDAdBgNVHQ4EFgQU58x3YhJI1MVqKs1X8syWuiQUG2kwDwYDVR0T\nAQH/BAUwAwEB/zAKBggqhkjOPQQDAgNIADBFAiA8N7UbDMBfexL/YdbOp+gvURZX\n5eDW7bE+cXx/W7q+UwIhALUK6RfBWkWoKtNHDMxjJ8U/hZVhOKGVnl6rIH7NoOK4\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----\nMIIBQjCB6qADAgECAghqcNxJXrX4AzAKBggqhkjOPQQDAjAOMQwwCgYDVQQDDANj\nYXMwHhcNMjAxMTAzMjI0OTQyWhcNMjExMTAzMjI0OTQyWjAOMQwwCgYDVQQDDANj\nYXMwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQG97ae0pq5u2SyNwa3lbMCEvvd\noXtu7uvZ4iNAQdP86DbP2ggJYP/UkSRakTCcKVwL/9OIR1Ed1u/Kxuye4LTKozIw\nMDAdBgNVHQ4EFgQUGIwAGXXV9Nhlj0Ef4QrEtIfP+6UwDwYDVR0TAQH/BAUwAwEB\n/zAKBggqhkjOPQQDAgNHADBEAiANczpf5/ap7Z9FCejd0tRxE046WZNvli8VLxKO\nQrgWUwIgC1oTlGkeW6HjN7xJlQwGxw0z4rkGrbn+XwYbiJrrM4g=\n-----END CERTIFICATE-----\n",
"ias_report": {
"request_id": "37339931456b431bbb223b8b42a0021f",
"report_signature": "ZwilghAYM4ZdiETPwoGIThBbwaePDuRe6OBEr8qUDHgi321IVcuBtY8mEvAgDlvvwHGB0YpzdR3zy7W1h07gTa76CrGEbX4IdkHZPFSphscapduYzpA0rYH796Iu4VVQOqKsd8L8rQ1iFmc2tSXkOvf6eic7mpzhkEkHGiPx21kY29/Bhby/+PCg8RKMWJktcOcN6b0NRugDALa7A0Hn5mK93lpXhaxe9Rycgi2HESx9gI23JNa5+RoJ3GRgtkTYAqR5Ay6XqjyEw4smjR/H2EJnrZGmJHRL/4oXDjpyLEmqpFO/IEypSdRaRi7LmJln0lpKOPO6YSw6sGAs3RZwgg==",
"signing_certificate": "-----BEGIN CERTIFICATE-----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\nd4poyb6IW8KCJbxfMJvkordNOgOUUxndPHEi/tb/U7uLjLOgPA==\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nDaVzWh5aiEx+idkSGMnX\n-----END CERTIFICATE-----\n",
"advisory_url": null,
"advisory_ids": null,
"body": "{\"id\":\"166610971354147632332161629531280280230\",\"timestamp\":\"2020-11-04T00:00:28.825370\",\"version\":3,\"epidPseudonym\":\"P7VrovABcJu9vGR2mseA5s5P2gZxuGpi6jMhcTY59AACYMmQhGfVXqo1bjHDTeupTAuGSWrksVPOTjX4S1VTMb+sm+hbzR+MlZWTawxJqa6jdMv9R2zuzIL3V+mX2Td15a1yZ+8EVfvIL8rVifaAg40ghl9aHrwk2ZfwesQSidk=\",\"isvEnclaveQuoteStatus\":\"OK\",\"isvEnclaveQuoteBody\":\"AgABAMYLAAALAAoAAAAAADLC0yzU8chzYlu+ZdlzpwIAAAAAAAAAAAAAAAAAAAAADw8DBf+ABgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwAAAAAAAAAHAAAAAAAAAP1+/Wit6yO15gvKJ/b7OuyY1/4fTe6Pxc+eeXKZ4wsCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARxOFQt2wrFF9/rbbDBFXhBGueb7t1tJxuEzQa2KzFvQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGShAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACEJyqrlt/snioYQp2dutwZBaym3aTpUhXGdq1xsMPgQiQa/D7JW+d3L7cdJklo2uqC2JZzR1QTiaGjZ4NRELkk\"}"
}
}
}
}
Update the content
field of the injection file being rendered at /etc/owner-config.json
with the contents of the SCONE CLI configuration file after the provisioning process. This way, the CAS owner's identity is protected in the enclave.
After the session file is updated, please submit it to the primary CAS.
scone session create session.yml
To deploy the CAS Backup Controller, use its Helm charts from the SconeAppsEE repository. Note that we are setting session
to be the same as the SCONE_CONFIG_ID
of the session we have just created (backup_controller/register
).
helm install cas-backup-controller sconeappsee/cas-backup-controller \
--set session=backup_controller/register \
--set cas=mycas \
--set backupName=mycas-backup
For an end-to-end example, check the Quick Start guide.
Environment variables
You can use the following environment variables to customize the Controller execution.
-
BACKUP_CAS_IMAGE
is the container image used to deploy the ephemeral backup CAS. The default value isregistry.scontain.com/sconecuratedimages/services:cas-scone5
. -
CONTROLLER_LOOP_INTERVAL_SECONDS
how often the Controller should check for nodes and try to register backups. The default value is60
. -
BACKUP_CAS_NAME
is the base name of the backup CAS resources created by the Controller on the Kubernetes cluster. If not set, the Controller will generate a valid base name from the primary CAS address. -
NAMESPACE
is the Kubernetes namespace to which the Controller will deploy backup resources. The default value isdefault
. -
SCONE_LAS_ADDR
is the address of LAS, if remote attestation is enabled. The default value is172.17.0.1
(the default Docker network interface). -
SGX_RESOURCE_NAME
defines the Kubernetes resource name for SGX devices. The default value issgx.intel.com/enclave
. -
SGX_RESOURCE_QUANTITY
defines the quantity of the Kubernetes resources for SGX devices to be requested. The default value is1
. -
SELECTOR_LABEL
defines a label selector for nodes. Useful for heterogeneous clusters. The default value isNone
(i.e., do not filter nodes). -
LAS_SELECTOR_LABEL
defines a label selector for LAS pods. This allows the Controller to use LAS public keys to track hardware changes. Default value is""
(i.e., do not look for LAS pods). -
LAS_NAMESPACE
defines the namespace where the Controller should look for LAS pods. The default value isdefault
. -
SCONE_CLI_CONFIG
defines the fallback SCONE CLI configuration if none is provided through the--config
parameter.