Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support for transitioning to a new key (aka key rotation) #19

Open
GoogleCodeExporter opened this issue May 15, 2015 · 0 comments
Open
Labels

Comments

@GoogleCodeExporter
Copy link

GoogleCodeExporter commented May 15, 2015

What new or enhanced feature are you proposing?

Support for transitioning to a new key.

What goal would this enhancement help you achieve?

Each munged currently supports a single cryptographic key. If a group of hosts needs to transition to a new key, there will be a time interval where some hosts have transitioned to the new key while other hosts are still using the old key. Support is needed to allow authentication between hosts during this time interval where both the old and new keys are valid. Furthermore, after this time interval has elapsed, the old key needs to be (automatically) marked invalid.

Requested by Flux: because signed jobs in the queue might sit there for a long time and be invalidated if we had to change the munge key.

Original issue reported on code.google.com by chris.m.dunlap on 9 Jan 2013 at 8:42

@dun dun added this to the 0.6 milestone Jun 4, 2015
@dun dun added feature and removed auto-migrated labels Jun 5, 2015
@dun dun mentioned this issue Dec 7, 2016
@dun dun removed this from the 0.6 milestone Nov 6, 2020
@dun dun changed the title support for transitioning to a new key support for transitioning to a new key (aka key rotation) May 19, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants