-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggestion for soft security implementation #236
Comments
You should be able to pull this off simply by using the same enclave for everything you run.
That's controlled by the |
+1
Another way to do it can be to set the environment variable |
Thank you for your advice.
Yeah, but that has to be done manually by typing one by one (let me know if I am wrong about this point) for all the nodes that are going to be used in the entire system. I do not think that is really realistically pratical unless you are working a very small-sized project like the talker-listener package used as an example in the instruction.
I think I should explore the usage of allow_unauthenticated_participants() function first, and what do you mean by |
Hi @mikaelarguedas,
Feature request
Feature description
The current instruction says that I have to specify each node to create keys for them (link).
I will call it hard security, and I wouldn't call it impractical but I think there should be at least a soft security method.
For example, sharing a key between multiple PCs and allowing for message communication only between those PCs will be a simple but very practical way to do that.
The current method asks users to regenerate keys every time when they add new nodes or change node names.
On the other hand, I didn't really understand why the current method doesn't even allow for executing nodes without keys registered. Isn't it enough to just block accesses to those nodes with registered keys?
I wonder if there is a reason why below should be blocked.
$ ros2 run demo_nodes_py listener --ros-args --enclave /talker_listener/listener (key registered)
$ ros2 run demo_nodes_cpp talker (no key registered, run this in another terminal, then you will see an error code)
We are actively trying to use sros2 for our robot connected to an open network accessible to random users, so security will be one of the most necessary features.
Ryan
The text was updated successfully, but these errors were encountered: