-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add NSS key log support #531
Comments
|
@jmklix @TwistedTwigleg @bretambrose @graebm @jpeddicord @timmattison
These projects have integrated this feature successfully without compromising security. Given the prevalence of this functionality in established and reputable tools, it may be worth revisiting the decision. The capability to log SSL/TLS session keys is often crucial for auditing and troubleshooting, particularly in IoT environments where the ability to analyze traffic at this level can greatly enhance the debugging process. |
Can you provide more details about your use case and how you intend to use this with the greengrass nucleus? I see that you opened the original feature request here |
Certainly. First and foremost for us it would be for auditing and compliance. For organizations operating in regulated industries, such as healthcare, having the ability to log SSL/TLS session keys is crucial. It would enable gathering a comprehensive sample of encrypted communications, which can be audited to ensure compliance with industry standards and regulations in terms of working with sensitive data. Secondly, it would be about debugging and performance optimization. Having access to session keys would help identify bottlenecks or inefficiencies in message communication from and to IoT device software, enabling its optimization especially for metered connections and/or large quantities of server side microservices communicating with endpoint devices both ways. |
Describe the feature
Support logging of SSL/TLS session keys in NSS key log format for crt external communications.
Use Case
This is an essential feature for auditing and deeper troubleshooting of IoT device traffic.
Proposed Solution
Many applications support this behavior via SSLKEYLOGFILE environment variable, others have their own mechanisms, like an upstream s2n-tls library which accepts a callback function.
Other Information
I'm using aws-iot-device-sdk-java-v2 via aws-greengrass-nucleus project. I don't know all of the intricacies of the codebase, but downstream library handling tls does support NSS key logging (aws/s2n-tls#2584) I hope there's a simple way to hook into it without a need for a change in every project up the chain.
I might just be missing a way to punch through the java wrapper to provide the
--key-log
option to the underlying s2n-tls library, if so I'd be glad to hear the solution!Downstream feature request aws-greengrass/aws-greengrass-nucleus#1571
Acknowledgements
SDK version used
1.17.2 via https://github.com/aws-greengrass/aws-greengrass-nucleus/blob/release_2.12.x/pom.xml
Environment details (OS name and version, etc.)
iot device with arm64 linux
The text was updated successfully, but these errors were encountered: