Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for verification of git SSH commit signatures #16007

Closed
wiktor-k opened this issue Oct 17, 2023 · 2 comments
Closed

Support for verification of git SSH commit signatures #16007

wiktor-k opened this issue Oct 17, 2023 · 2 comments
Labels
enhancement New feature or request

Comments

@wiktor-k
Copy link

Summary

Currently, ArgoCD supports verification of GPG signatures but ever since that was introduced git added support for a simpler scheme: SSH signatures.

git SSH signatures are now widely supported by GitHub, Gitlab, Gitea, (not mentioning the git tooling itself which introduced that).

Motivation

In some sensitive environments, signing of Git commits using digital signatures and only considering the signed ones might be a security requirement. Moreover git allows specifying allowedSignersFile that defines which keys are authorized to sign commits for the repo (there's no need for any additional special format for authorizations).

Proposal

I've checked the issue which discusses GPG signatures and I think it would be even simpler: no additional certificates/public keys are to be managed since SSH signatures contain the public keys that issued them. One thing to additionally store would probably be the allowed_signers file.

In my repositories I store that file inside the repo, so that introducing new keys can be only done using existing keys, but others may have different preferences: for example using one centralized allowed_signers file.

@wiktor-k wiktor-k added the enhancement New feature or request label Oct 17, 2023
@hex-m
Copy link

hex-m commented May 9, 2024

OpenSSH supports physically protected SSH-keys by using a FIDO authenticator. FIDO authenticators are common and well supported by now - more so than devices supporting the "OpenPGP card"-standard.

This feature would make it easier to use hardware-protected private keys and thus would increase the practical security for many users.

@wiktor-k
Copy link
Author

wiktor-k commented May 9, 2024

This sounds like a duplicate of #8733 that you've linked so I'm going to close this one.

FIDO authenticators are common and well supported by now - more so than devices supporting the "OpenPGP card"-standard.

Yes, they are also significantly cheaper than OpenPGP Card devices. (Agreed with everything else, obviously!)

@wiktor-k wiktor-k closed this as completed May 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants