-
Notifications
You must be signed in to change notification settings - Fork 565
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Key Management for Trust Pinning #209
Comments
Hey! Thanks for asking! This is probably too tough of a topic to completely handle via a github issue, but I'll point you at a few of the options. We're not going to prescribe a single one in cosign, but we'll have a few supported flows and let you build your own. Here's what we're working towards:
Then for a final option with delegations, we're planning to make it possible to use cosign to manage TUF metadata and delegations. See here: #86 |
I think this is fixed now! Are we missing anything still @xopham ? |
I am not entirely certain. I think the issue comes from a different time 😅 |
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
This issue was closed because it has been stalled for 5 days with no activity. |
…ates/gitsign chore(deps): update gitsign to 5b14542
Hi,
thanks for the great tool 🥳 It provides great usability for one of the major weak spots of container images 👍
I was wondering how to implement simple key management (though mentioned as out-of-scope in the docs 😜 ), specifically key hierarchy to facilitate trust pinning with delegation and key rotation. In case of TLS, there is infrastructure (PKI) parallel to transparency logs (t-logs) to achieve this...though it's brittle. Notary v1, provides a root key and one can pin to the associated public key. The root key may be used to create and manage the lifecycle of delegations which are then used to sign the actual targets that are in turn validated against the root pubkey. This facilitates collaboration and key rotation without service interruption or manual effort for clients.
Cosign does currently not seem to implement such key management (KMS). Without going into too much detail, I would see 3 options to achieve it:
-a
flag) to the image signature, freshness could probably be guaranteed via t-logs.Is there a more natural solution how to achieve this in cosign or is it permanently considered out of scope? I think KMS would be a major step to making signatures even more seamless and useful...
Thanks again for the awesome tool 💪
The text was updated successfully, but these errors were encountered: