Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add option to enable TLS for communication with Trillian #2163

Closed
fghanmi opened this issue Jun 30, 2024 · 1 comment
Closed

Add option to enable TLS for communication with Trillian #2163

fghanmi opened this issue Jun 30, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@fghanmi
Copy link
Contributor

fghanmi commented Jun 30, 2024

Description
Currently, the communication between Rekor and Trillian server does not support Transport Layer Security. This exposes the system to potential security risks such as data interception and man-in-the-middle attacks. To enhance the security and integrity of services communications, it is imperative to introduce an option to enable TLS - Rekor would ensure the verification of Trillian's certificates.

@bobcallaway
Copy link
Member

I think this is complete now?

@fghanmi fghanmi closed this as completed Jul 28, 2024
JasonPowr pushed a commit to securesign/rekor that referenced this issue Aug 21, 2024
#### Summary
This pull request introduces support for enabling TLS in communications
with the Trillian server. By adding a new command-line flag
`--trillian_log_server.tls_ca_cert` and implementing the necessary logic
to handle TLS certificates, this update enhances the security of Rekor.


#### Release Note

- Feature: Added support for TLS in communication with the Trillian
server.
- New Flag: 
- `--trillian_log_server.tls_ca_cert` to specify the CA certificate file
path for secure connections.
 
Resolves Issue: sigstore#2163

---------

Signed-off-by: Firas Ghanmi <fghanmi@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants