Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document ability to revoke / remove keys #85

Closed
vladimir-v-diaz opened this issue May 11, 2015 · 6 comments
Closed

Document ability to revoke / remove keys #85

vladimir-v-diaz opened this issue May 11, 2015 · 6 comments

Comments

@vladimir-v-diaz
Copy link
Contributor

root.json metadata is currently populated with the keys available in the keys/<role>.json files. For example, if one wishes to add a root key to root.json, the tuf gen-key root command is issued. The public key of the newly generated key is specified in root.json by gen-key. However, there isn't a command to remove a key from a specific role. I suppose one can generate a new root.json key file with only the keys desired, however, this likely requires manually editing files.

In addition, the tools should also support the ability revoke keys for specific roles (i.e., not list their public key(s) in metadata), yet still sign metadata with the revoked keys to allow clients to successfully update. The specification goes into more detail about this aspect of key revocation and management:

"To replace a compromised root key or any other top-level role key, the root role signs a new root.json file that lists the updated trusted keys for the role. When replacing root keys, an application will sign the new root.json file with both the new and old root keys until all clients are known to have obtained the new root.json file (a safe assumption is that this will be a very long time or never). There is no risk posed by continuing to sign the root.json file with revoked keys as once clients have updated they no longer trust the revoked key. This is only to ensure outdated clients remain able to update."

@titanous
Copy link
Contributor

Does tuf revoke-key handle this? (#42)

@vladimir-v-diaz
Copy link
Contributor Author

Ahh, did not know this command existed. It's not listed in the commands section of the documentation.

@titanous
Copy link
Contributor

Ah, looks like that hasn't been updated recently. Do you want to update it? If not, we're happy to.

@vladimir-v-diaz
Copy link
Contributor Author

Sure, I can update the documentation to mention tuf revoke-key. I'll also verify that it supports the use case listed in the specification, where clients are able to update after keys are revoked.

@titanous titanous changed the title Ability to revoke / remove keys Document ability to revoke / remove keys May 15, 2015
@rdimitrov
Copy link
Contributor

@mnm678 - I believe we can close this one 👍

@mnm678
Copy link
Collaborator

mnm678 commented Sep 20, 2021

Fixed by #153

@mnm678 mnm678 closed this as completed Sep 20, 2021
rdimitrov pushed a commit to rdimitrov/go-tuf that referenced this issue Jan 25, 2024
…amework#85)

Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.14.0 to 0.15.0.
- [Commits](golang/sys@v0.14.0...v0.15.0)

---
updated-dependencies:
- dependency-name: golang.org/x/sys
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
rdimitrov pushed a commit that referenced this issue Jan 29, 2024
Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.14.0 to 0.15.0.
- [Commits](golang/sys@v0.14.0...v0.15.0)

---
updated-dependencies:
- dependency-name: golang.org/x/sys
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants