Skip to content

Log verification for expired targets #1273

@haydentherapper

Description

@haydentherapper

Overview

This is a tracking issue for supporting verification for expired/rotated targets. @asraa and I will be working on this.

Currently, cosign assumes the latest TUF metadata can be used to validate signatures. As the Fulcio CA certificate will expire, we will have to rotate that target at some point. This will cause cosign to not be able to validate the signatures that chain up to the expired CA certificate, since the TUF metadata will contain a different certificate.

We propose bundling a pointer to the metadata used when generating the signature. We will do this by including the snapshot or timestamp JSON in the signature bundle. Cosign will use this to find versioned TUF metadata.

Design doc

Tasks

For cosign:

  • Add current snapshot/timestamp.json to an entry’s bundle
  • Add verification by pulling the referenced versioned x.targets.json and x.root.json
  • Cache previous x.targets.json files and expired Fulcio certificates

There are a few tasks for the Sigstore TUF repo.

  • Enable consistent snapshots in Sigstore root
  • Add versioned targets.json and complete list of targets to Sigstore’s TUF root (and synced to GCS bucket)
  • Generate snapshot/timestamp more frequently

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions