From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.5 required=3.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,HTML_MESSAGE, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1F6ADC433ED for ; Sat, 17 Apr 2021 00:24:35 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4D5C7611AF for ; Sat, 17 Apr 2021 00:24:34 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4D5C7611AF Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4FMYjr5x5Vz3bvj for ; Sat, 17 Apr 2021 10:24:32 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256 header.s=20161025 header.b=Zw4CM3C4; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=google.com (client-ip=2607:f8b0:4864:20::32f; helo=mail-ot1-x32f.google.com; envelope-from=ztai@google.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256 header.s=20161025 header.b=Zw4CM3C4; dkim-atps=neutral Received: from mail-ot1-x32f.google.com (mail-ot1-x32f.google.com [IPv6:2607:f8b0:4864:20::32f]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4FMYjQ1T5Dz3bpb for ; Sat, 17 Apr 2021 10:24:07 +1000 (AEST) Received: by mail-ot1-x32f.google.com with SMTP id o13-20020a9d404d0000b029028e0a0ae6b4so8254136oti.10 for ; Fri, 16 Apr 2021 17:24:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=LXXsr0B1s9fV+H+93PVy7/W/FWVzPYkJYgazSYGJq5c=; b=Zw4CM3C4xe+m4aAHOwRtbsaC3REgAOt/YLlpm1imu7ALc5je4TlLxCtmAQtesJVgoG ZVq5Bi+ENntCJjZk8Kyb01MZzf9GKJh4C0V0336+2sySAVJVC+j2Gnp/7VoI9Qkoh69X jF8LZwmW/eQPCQ8PKfWMxFmH8PYyz2z1/JinrUK/jYdyIhB8+a7y5UYeIaLNYXmxOJmv LoLmasCx/bVHyIzMVGryD7QnfErFoUs9nceJRCkoVABhPOODomCX8YzFqTQPPEzTDf3I B6KQL3t3dgpilySldkKSc57MIx8hcAcgrwz+UO3znjlner2B7wMVIHsFgxo+2T4YzhFM tKSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=LXXsr0B1s9fV+H+93PVy7/W/FWVzPYkJYgazSYGJq5c=; b=FaUtUEAF9twR+4Ns0gQb1Ma+rKCCodfTo7COzaDkv41+G7NC5zwVgmaWwGhK6L9XSk ciLmqcsyDeifYaEdDmWps9PfQBm6P+QSnXmJzG9rKLepefCX8GuWlTyDNVcxUxU7bJoi 2CzQ6OXHocOA+OR8L94DKRuGgGVWtY5LDm/eByehYbtWPSm6cRF7ylr9m66isZnqFuCu HLlLFWydphu70FRuDtpowF+aq1yz16ck+vU8xvkLnqY6hAaS+FH1H0WfOwzLcbeyaH+5 cD1+FLX5EIxcXpkVGdLtsvihhKuRSmeAVCPn3mmfo4zEfeuT/vZXwxYpIWgBdkPmwQsy nYjw== X-Gm-Message-State: AOAM532pp0gBhc+ylJ6d9/yfyh2P7tqKCn51YIHWQ3ByAzQZYA+vqWXS qpJI9KPJmzNpV/5sfa8XUwn/OqZOv3kvZUQWt68fpd6jw5H5Y13m X-Google-Smtp-Source: ABdhPJzb/FwujeSLVBtdmslYgSPoRgUZuP8iE64VnZL7SxvFfXxomKdjfipigK/D1L5skHeeFRe306CE6jKXH5u7ozo= X-Received: by 2002:a05:6830:22f9:: with SMTP id t25mr5678468otc.174.1618619044169; Fri, 16 Apr 2021 17:24:04 -0700 (PDT) MIME-Version: 1.0 From: Zhenfei Tai Date: Fri, 16 Apr 2021 17:23:52 -0700 Message-ID: Subject: bmcweb: Install encrypted certificate to BMC To: OpenBMC Maillist , Ed Tanous , gmills@us.ibm.com Content-Type: multipart/alternative; boundary="00000000000027f30005c0201d34" X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Justin Chen , Richard Hanley Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" --00000000000027f30005c0201d34 Content-Type: text/plain; charset="UTF-8" Hi, Currently certificate installation is supported by bmcweb via *redfish/v1/Managers/bmc/Truststore/Certificates*, where the certificate content is part of the JSON request. For our use case it's a more restricted environment in which we don't want to have plaintext certificates in the request. Instead we want to send a pair of encrypted key and certificate from the host to the BMC and there will be another daemon to decrypt them using an internal library. Since it's not supported by the Redfish schema, my plan is to use the *redfish/v1/CertificateSerivce/OemActions* URI and a request payload like below: { "key": "encrypted key in binary", "certificate": "encrypted certificate in binary" } The reasons to use the URI and payload are: 1. It's related to certificate service although in opaque blobs. 2. It's fairly company specific that probably isn't universally applicable. My questions are: 1. Is this a reasonable approach? 2. Shall we define an OEM schema for our request? Thanks, Zhenfei --00000000000027f30005c0201d34 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi,

Currently certificate installat= ion is supported by bmcweb via=C2=A0redfish/v1/Managers/bmc/Truststore/C= ertificates, where the certificate content is part of the JSON request.=

For our use case it's a more restricted envir= onment in which we don't want to have plaintext certificates in the req= uest. Instead we want to send a pair of encrypted key and certificate=C2=A0= from the host to the BMC and there will be another daemon to decrypt them u= sing an internal library.

Since it's not suppo= rted by the Redfish schema, my plan is to use the redfish/v1/Certificate= Serivce/OemActions=C2=A0URI and a request payload like below:
{
=C2=A0 "key": "encrypted key in binary",
=C2=A0 "certificate": "encrypted certificate in bin= ary"
}

The reasons to=C2=A0use the = URI and payload are:
1. It's related to certificate=C2=A0serv= ice although in opaque blobs.
2. It's fairly company specifi= c that probably isn't universally applicable.

= My questions are:
1. Is this a reasonable approach?
2. Shall w= e define an OEM schema for our request?

Thanks,
Zhenfei


--00000000000027f30005c0201d34--