New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Library images are unsigned. DCT dead? #6838
Comments
|
Please keep the hyperbole to a minimum here. There has not been a compromise here, and you're frankly barking up the wrong tree in this repository, which is why the previous issue is closed. As stated in that previous thread, the maintainers of this repository have no control over nor involvement in the signing process of the images we publish (however much we'd love to change that if someone at Docker Inc reading this would like to collaborate on making changes there!). Yelling about it here does not get the attention of the folks who control that signing process. What I do know is that the service which Docker runs for signing our images has had some stability issues, but as stated above, nobody on this repository is directly involved there so we really cannot give you any more information than that, however much I wish I could. |
|
Thanks for the reply @tianon. I added the hyperbole merely to get attention. I'll remove the mention of compromise from the title. I hadn't heard anything back from the docker team in the intervening months, and since that issue (and this repo) were the only public nexus of communication about this issue, I figured here was better than shouting into the void. The closed issue at some point did in fact elicit a reply from the docker team. Really, I'm merely looking for some communication, even if that is "It's still broken, but we plan to fix it" or "We may or may not fix it, but either way you probably shouldn't rely on it". |
|
From the POV of a new docker user this does seem very odd indeed. If I pull node:alpine with content trust enabled I get a 13 month old image with vulnerabilities. If I pull with it disabled I get the eight day old image I was expecting. As prospective docker customers I guess we're best talking to them directly about the fact this hasn't exactly inspired confidence! |
|
I am quite amazed landing here...
|
|
At least I want my base image pulled as DCT but what I get is the way too old version. GitHub Packages Container registry? Maybe? |
|
maybe we can use https://github.com/sigstore/cosign This would enable multiple signatures to be created and community trust built up for various signatories. It would add extra steps. Could the pull verification be done with a docker cli plugin? |
|
cc @dlorenc |
|
I'd be happy to help here if there's interest! @tianon - is there any possibility of signing this stuff with cosign? I'm not sure what it would take. |
|
+1 happy to help start signing some of this stuff with cosign |
|
would be great to get cosign on the build/push side as well, through a plugin @dlorenc would that make cosign work transparently for the majority of registries and images? simple install with |
|
I don't actually really know how the docker plugin model works. Do you have any links? |
The |
|
As far as I'm aware, this issue should be fixed (for a while now, but just getting back around to it $ docker pull --disable-content-trust=false alpine:3.16
Pull (1 of 1): alpine:3.16@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
docker.io/library/alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c: Pulling from library/alpine
2408cc74d12b: Pull complete
Digest: sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Status: Downloaded newer image for alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Tagging alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c as alpine:3.16
docker.io/library/alpine:3.16
$ docker pull --disable-content-trust=true alpine:3.16
3.16: Pulling from library/alpine
Digest: sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Status: Image is up to date for alpine:3.16
docker.io/library/alpine:3.16 |
|
I have confirmed that it has been fixed and even confirmed the $ docker system prune -af
***snip***
$ docker pull --disable-content-trust=false alpine:latest
Pull (1 of 1): alpine:latest@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
docker.io/library/alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c: Pulling from library/alpine
2408cc74d12b: Pull complete
Digest: sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Status: Downloaded newer image for alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Tagging alpine@sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c as alpine:latest
docker.io/library/alpine:latest
$ echo $?
0$ docker system prune -af
***snip***
$ docker pull --disable-content-trust=true alpine:latest
latest: Pulling from library/alpine
2408cc74d12b: Pull complete
Digest: sha256:686d8c9dfa6f3ccfc8230bc3178d23f84eeaf7e457f36f271ab1acc53015037c
Status: Downloaded newer image for alpine:latest
docker.io/library/alpine:latest
$ echo $?
0Env Info$ date -R
Sun, 12 Jun 2022 11:14:59 +0900
$ docker --version
Docker version 20.10.13, build a224086
$ sw_vers
ProductName: Mac OS X
ProductVersion: 10.15.7
BuildVersion: 19H1922 |
abeluck commentedOct 22, 2019
This is an intentional duplicate of #5874 which has been closed and ignored for months.
Where are the signatures for the official library images?
If docker has for some reason decided to stop signing the official images, please make a public announcement. Otherwise you're leaving us hanging like a teenaged love interest, but with a hella lot more on the line.
The text was updated successfully, but these errors were encountered: