Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Updating policy.json to properly verify images #84

Open
gmpinder opened this issue Feb 25, 2024 · 5 comments
Open

fix: Updating policy.json to properly verify images #84

gmpinder opened this issue Feb 25, 2024 · 5 comments
Labels
state: blocked Something is blocking action. type: bug Something isn't working.

Comments

@gmpinder
Copy link
Member

gmpinder commented Feb 25, 2024

We need to look into some workflow to handle properly verifying images before rebasing on a signed keyless image.

@xynydev
Copy link
Member

xynydev commented Feb 25, 2024

@gmpinder
Copy link
Member Author

gmpinder commented Feb 25, 2024

After conversations in the ublue discord, we found the following bits of information:

    // FIXME: Match more subject types? Cosign does:
    // - .DNSNames (can’t be issued by Fulcio)
    // - .IPAddresses (can’t be issued by Fulcio)
    // - .URIs (CAN be issued by Fulcio)
    // - OtherName values in SAN (CAN be issued by Fulcio)
    // - Various values about GitHub workflows (CAN be issued by Fulcio)
    // What does it… mean to get an OAuth2 identity for an IP address?
    // FIXME: How far into Turing-completeness for the issuer/subject do we need to get? Simultaneously accepted alternatives, for
    // issuers and/or subjects and/or combinations? Regexps? More?

Further development could go into a workflow in blue-build to update the user's policy.json to allow keypair signed images and to also download the pub file ahead of time so that a user could easily rebase to a signed image.

@gmpinder gmpinder added the type: bug Something isn't working. label Feb 27, 2024
@gmpinder
Copy link
Member Author

gmpinder commented Mar 9, 2024

@gerblesh just posted this in the Ublue discord. Something to follow

containers/image#2235

@xynydev xynydev added the state: blocked Something is blocking action. label Apr 1, 2024
@gmpinder
Copy link
Member Author

Another related issue coreos/rpm-ostree#4272

@jmpolom
Copy link

jmpolom commented May 16, 2024

We need to look into some workflow to handle properly verifying images before rebasing on a signed keyless image.

What you're after appears to be completely broken/unsupported by the underlying libraries used. Until Red Hat improves them (or you choose to do so and donate your work to Red Hat -- assuming their maintainers agree to merge your changes) your only option is to use static key files which in my opinion adds so little security as to be not worth the effort.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
state: blocked Something is blocking action. type: bug Something isn't working.
Projects
None yet
Development

No branches or pull requests

3 participants