-
Notifications
You must be signed in to change notification settings - Fork 58
Verify artifact signing time against all timestamps #1381
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify artifact signing time against all timestamps #1381
Conversation
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I spent some time thinking about whether we really want to require all established times to be within the signing cert lifetime -- it sounds like policy decision -- but in the end agreed with you: I think we can require correctness even if the policy only asks for one established time.
The only request is on the language. I'd like to be exact: Timestamps always come from a TSA. integration time is not a real Timestamp it's just a time.
I think using "established times" as the common term is fine as is spelling all the options out: "timestamps or the log integration time"
I suppose another possibility might be to always refer to "TSA timestamps" when talking about those |
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good, thanks for figuring out the test.
I'm still flip flopping on whether we should outright fail when any time is outside the certificate validity as in this PR (or if we should just verify we have at least one valid established time, and not care if other times are outside the certificate window)...
- @woodruffw or others, please leave comment if you have opinions
- @ramonpetgrave64 can you leave a comment in Document our TSA/signed timestamp policy #1226 that links here and states that during verification we plan to require that every included established time is within the window -- at least we'll leave a bread crumb trail for someone to follow
Signed-off-by: Ramon Petgrave <32398091+ramonpetgrave64@users.noreply.github.com>
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like the intent of the new test but currently what happens is
- bundle is constructed
- bundle is validated (see
Bundle._verify()
) - test modifies bundle by deleting fields
- test runs verify
I don't like how the field deletion bypasses the validation. I think storing the new cases as separate assets would solve this issue
Signed-off-by: Ramon Petgrave <ramon.petgrave64@gmail.com>
/gcbrun |
Client support for Rekor V2: sigstore-python
Summary
Resolves #1380
Release Note
Timestamp Authority or the Transperency Service, if either of such timestamps
are present in the Bundle. We still require at lease one of such timestamps.
Documentation