Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Better define sigstores purpose #52

Merged
merged 1 commit into from
May 6, 2021
Merged

Conversation

lukehinds
Copy link
Member

Signed-off-by: Luke Hinds lhinds@redhat.com

Signed-off-by: Luke Hinds <lhinds@redhat.com>
@lukehinds lukehinds merged commit b560753 into sigstore:main May 6, 2021
@lukehinds lukehinds deleted the scope branch May 6, 2021 16:30
mtrmac pushed a commit to mtrmac/sigstore that referenced this pull request Mar 10, 2023
* Switch from ed25519 to ecdsa

ed25519 hasn't yet been approved and won't work with most KMS systems, so we need to use ecdsa until it will.

I chose the P521 elliptic curve because it is the most secure one available, although I believe the tradeoff is larger keys.
It might be worth it to choose a different curve if we want people to be able to pass in public keys via command line.

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Use pointer for pubilc key since rekor expects that

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Hash payload before using SignASN1 or VerifyASN1

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* use pointer

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Switch to P256 curve so that this will work with KMS's

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>
mtrmac pushed a commit to mtrmac/sigstore that referenced this pull request Mar 10, 2023
* Switch from ed25519 to ecdsa

ed25519 hasn't yet been approved and won't work with most KMS systems, so we need to use ecdsa until it will.

I chose the P521 elliptic curve because it is the most secure one available, although I believe the tradeoff is larger keys.
It might be worth it to choose a different curve if we want people to be able to pass in public keys via command line.

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Use pointer for pubilc key since rekor expects that

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Hash payload before using SignASN1 or VerifyASN1

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* use pointer

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>

* Switch to P256 curve so that this will work with KMS's

Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>
Signed-off-by: Dan Lorenc <dlorenc@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants