bmwt wrote:
Howdy folks,
I'm assuming my other (only?) option is to run my own validation service on each node, continue to sync the yubi_val's postgress tables out of band, and store the keys as AEAD blobs (generated on the controlling workstation) on the validators' filesystems, and sync those using normal unix methods?
I've been going down this route. I've initialized an HSM, and set an AEAD AES key. I've used yhsm-generate-keys to create a key. I can get the secret out with yhsm-decrypt-aead, *using the aes key on the command line.* Do i really need to store that AES key in the clear somewhere to decrypt the blobs to provision yubikeys? Is there a flag im missing to have the HSM use the internal copy of the key?
thanks,
-bmwt