-
Notifications
You must be signed in to change notification settings - Fork 643
Description
Overview
This is a tracking issue for supporting verification for expired/rotated targets. @asraa and I will be working on this.
Currently, cosign assumes the latest TUF metadata can be used to validate signatures. As the Fulcio CA certificate will expire, we will have to rotate that target at some point. This will cause cosign to not be able to validate the signatures that chain up to the expired CA certificate, since the TUF metadata will contain a different certificate.
We propose bundling a pointer to the metadata used when generating the signature. We will do this by including the snapshot or timestamp JSON in the signature bundle. Cosign will use this to find versioned TUF metadata.
Tasks
For cosign:
- Add current snapshot/timestamp.json to an entry’s bundle
- Add verification by pulling the referenced versioned x.targets.json and x.root.json
- Cache previous x.targets.json files and expired Fulcio certificates
There are a few tasks for the Sigstore TUF repo.
- Enable consistent snapshots in Sigstore root
- Add versioned targets.json and complete list of targets to Sigstore’s TUF root (and synced to GCS bucket)
- Generate snapshot/timestamp more frequently