-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I've created a PageSigner oracle; but how do I get PageSigner to use it? #9
Comments
Hey @garyrob, the steps are as follows:
I hope I didnt miss any steps. Please let me know if there are problems along the way. Thanks. |
Thanks for those instructions! aws_query.py asks for "AWS-ID" "AWS-secret"... So, I think that means my IAM Access Key Id and Secret Access Key? Sorry for the newbie questions and thank you again for your patience... I'm asking because, while I can find an AWS ID for my top-level (non-IAM) account, a) I don't see a secret key for that, and b) I think we're supposed to use IAM in general. |
These are access key ID and secret access key for the root user of the AWS account. |
Is it OK that I created the AMI from an IAM account or should I have used the root user? |
I think it will work for iam user if you comment out this line which checks for root user: |
Hmm... sounds like the most secure solution might be to just have a separate, dedicated AWS account just for the oracle, using the root. Does that make sense? |
I'm not sure why you suggest it to be a separate AWS account. Any AWS account with the root user will work. It can be an already existing AWS account. |
I tend to be a cautious guy, at least one the cost is low for being cautious! Amazon says: "We strongly recommend that you do not use the root user for your everyday tasks, even the administrative ones. Instead, use your root user credentials only to create your IAM admin user." So if the natural flow with TLSNotary is to use the root, and especially if the subject matter being notarized could mean that somebody might want to make an attempt to manipulate it, it seems to make sense to protect other AWS stuff by having a different account for unrelated operations. I mean, the cost is low for doing so, so that's just my instinct. |
Yes, the ultimate solution is just to have a separate AWS account and launch the oracle as the root user. I'm gonna explain the potential pitfall of running the oracle server from iam instead of the root account: doing so, may open up an attack vector, i.e. that the oracle server was launched maliciously which will give the AWS account owner the ability pump out fake notarization proofs. That's the only attack possible. |
I've created a PageSigner oracle according to the INSTALL instructions. Everything seems to have gone OK. But are there instructions for getting the PageSigner Chrome extension to use it rather than the server instance you are running? I haven't been able to find any. Should I just look at the PageSigner source, figure out how to modify it, and make my own version of the PageSigner extension?
Also, what port(s) should be open, etc....
Or, if you'd rather that people only use your server for actually using PageSigner, please let me know.
The text was updated successfully, but these errors were encountered: