Skip to content

Conversation

@jku
Copy link
Member

@jku jku commented Jun 5, 2025

Currently verification fails immediately if trusted root contains any unsupported keys. I think it makes more sense to warn and continue as it is possible these keys are not required for verification.

Unfortunately I missed this case when I tested the multiple log support in #1350 :(

@jku
Copy link
Member Author

jku commented Jun 5, 2025

I'm thinking of backporting this fix to a 3.6.x branch:

Currently verification fails immediately if trusted root contains
any unsupported keys. I think it makes more sense to warn and continue
as it is possible these keys are not required for verification.

Signed-off-by: Jussi Kukkonen <[email protected]>
@jku jku force-pushed the fail-softly-on-unsupported-keys branch from 887889c to 591ede8 Compare June 5, 2025 09:56
@jku jku linked an issue Jun 5, 2025 that may be closed by this pull request
@jku jku requested a review from woodruffw June 5, 2025 10:14
jku added a commit to jku/sigstore-python that referenced this pull request Jun 5, 2025
Don't fail hard if trusted root contains an unknown key type:
Verification may still succeed so warning is enough.

Signed-off-by: Jussi Kukkonen <[email protected]>
@jku
Copy link
Member Author

jku commented Jun 5, 2025

Marking this a draft while I do another test with the (future) staging trusted root

EDIT: Tested, looks good to me

Copy link
Member

@woodruffw woodruffw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks @jku!

@woodruffw
Copy link
Member

I'm thinking of backporting this fix to a 3.6.x branch:

Sounds good to me -- I see you opened the backport PR, give me a ping on it when it's ready for review 🙂

@jku jku merged commit 5d9b210 into sigstore:main Jun 5, 2025
23 checks passed
jku added a commit that referenced this pull request Jun 6, 2025
* Backport #1424

Don't fail hard if trusted root contains an unknown key type:
Verification may still succeed so warning is enough.

Signed-off-by: Jussi Kukkonen <[email protected]>

* Prep 3.6.3

This release only contains a small fix for handling of unsupported
keytypes in the trusted root.

Signed-off-by: Jussi Kukkonen <[email protected]>

---------

Signed-off-by: Jussi Kukkonen <[email protected]>
jku added a commit to jku/sigstore-python that referenced this pull request Oct 14, 2025
Fail less hard when unsupported keys are seen

Current trusted root contains keys this client version does not
understand: the keys are not necessary to verify or sign
bundles with rekor v1

Signed-off-by: Jussi Kukkonen <[email protected]>
jku added a commit to jku/sigstore-python that referenced this pull request Oct 14, 2025
Fail less hard when unsupported keys are seen

Current trusted root contains keys this client version does not
understand: the keys are not necessary to verify or sign
bundles with rekor v1

Signed-off-by: Jussi Kukkonen <[email protected]>
jku added a commit that referenced this pull request Oct 24, 2025
* Backport: internal/trust: Fix bug in rekor key lookup

Rekor keyring can (and in future will) have multiple keys:
logs not only get sharded but once rekor-tiles is integrated in the
public good instance, there will be two writable logs for a while.

Backport of #1350

Signed-off-by: Jussi Kukkonen <[email protected]>

* Backport #1424

Fail less hard when unsupported keys are seen

Current trusted root contains keys this client version does not
understand: the keys are not necessary to verify or sign
bundles with rekor v1

Signed-off-by: Jussi Kukkonen <[email protected]>

* Backport: ci: fix offline tests on ubuntu-latest

Backport of #1283

Signed-off-by: Jussi Kukkonen <[email protected]>

* Bump 3.5.x series to 3.5.4

Signed-off-by: Jussi Kukkonen <[email protected]>

---------

Signed-off-by: Jussi Kukkonen <[email protected]>
Co-authored-by: William Woodruff <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

current release fails hard if trusted root contains ed25519

2 participants