-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify pass private Rekor check even without Rekor public key #1816
Comments
This was curious, so I reproduced it and wanted to check what was going on with cosign. The path that this takes it the following:
Note that this line was not printed in your output because the bundle could not be verified cosign/cmd/cosign/cli/verify/verify.go Line 213 in 367c79e
The reason why this is happening is because in (5) we Line 314 in 367c79e
I think this is a bug. We should add a call to Thinking this through the current code just asks rekor if it had the entry with that UUID. It trusts rekor, and does not verify an inclusion proof or a signed entry. I think we should verify it. |
Very much agree, we should be verifying anything we find in Rekor. By initializing a specific Rekor public key, you are saying I trust the log that is associated with this key. Without verification, then the client blindly trusts whatever Rekor log is provided. |
cc @wlynch can you grab this one? |
sure thing! I'll take a look today. |
cosign v1.8.0
I use a private Rekor instance
I did not
initialize
cosign with my own TUF signed Rekor public key so it is using the public targets fromDefaultRemoteRoot = "sigstore-tuf-root"
However, when verifying, cosign does not seem to need the Rekor public key:
I would expect it to fail as the Rekor timestamping cannot be checked without the public key
Am I missing something?
The text was updated successfully, but these errors were encountered: