-
Notifications
You must be signed in to change notification settings - Fork 70
trust: Fail less hard when unsupported keys are seen #1424
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
I'm thinking of backporting this fix to a 3.6.x branch:
|
Currently verification fails immediately if trusted root contains any unsupported keys. I think it makes more sense to warn and continue as it is possible these keys are not required for verification. Signed-off-by: Jussi Kukkonen <[email protected]>
887889c to
591ede8
Compare
Don't fail hard if trusted root contains an unknown key type: Verification may still succeed so warning is enough. Signed-off-by: Jussi Kukkonen <[email protected]>
|
Marking this a draft while I do another test with the (future) staging trusted root EDIT: Tested, looks good to me |
woodruffw
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks @jku!
Sounds good to me -- I see you opened the backport PR, give me a ping on it when it's ready for review 🙂 |
* Backport #1424 Don't fail hard if trusted root contains an unknown key type: Verification may still succeed so warning is enough. Signed-off-by: Jussi Kukkonen <[email protected]> * Prep 3.6.3 This release only contains a small fix for handling of unsupported keytypes in the trusted root. Signed-off-by: Jussi Kukkonen <[email protected]> --------- Signed-off-by: Jussi Kukkonen <[email protected]>
Fail less hard when unsupported keys are seen Current trusted root contains keys this client version does not understand: the keys are not necessary to verify or sign bundles with rekor v1 Signed-off-by: Jussi Kukkonen <[email protected]>
Fail less hard when unsupported keys are seen Current trusted root contains keys this client version does not understand: the keys are not necessary to verify or sign bundles with rekor v1 Signed-off-by: Jussi Kukkonen <[email protected]>
* Backport: internal/trust: Fix bug in rekor key lookup Rekor keyring can (and in future will) have multiple keys: logs not only get sharded but once rekor-tiles is integrated in the public good instance, there will be two writable logs for a while. Backport of #1350 Signed-off-by: Jussi Kukkonen <[email protected]> * Backport #1424 Fail less hard when unsupported keys are seen Current trusted root contains keys this client version does not understand: the keys are not necessary to verify or sign bundles with rekor v1 Signed-off-by: Jussi Kukkonen <[email protected]> * Backport: ci: fix offline tests on ubuntu-latest Backport of #1283 Signed-off-by: Jussi Kukkonen <[email protected]> * Bump 3.5.x series to 3.5.4 Signed-off-by: Jussi Kukkonen <[email protected]> --------- Signed-off-by: Jussi Kukkonen <[email protected]> Co-authored-by: William Woodruff <[email protected]>
Currently verification fails immediately if trusted root contains any unsupported keys. I think it makes more sense to warn and continue as it is possible these keys are not required for verification.
Unfortunately I missed this case when I tested the multiple log support in #1350 :(