-
Notifications
You must be signed in to change notification settings - Fork 566
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to sign and verify with certificates from another CA? #3616
Comments
|
Edit: I've also tried adding --issue-certificate to the end of the signing command and it still only signing using ephemeral keys. |
If you want to get a certificate for a managed key, you need both A token can be fetched out of band and provided with |
So far, the best workflow was:
Thanks for your help. I'll be adding the identity token you mentioned. |
One thing to mention is that Lemme know if you have any other questions! |
Background
We have an external root CA. It has a root certificate. Let's say the root CA signs an intermediate cert. Then that intermediate cert is used to sign a leaf cert. This leaf cert is specifically for the signing process.
I want to sign a docker image using the leaf cert's private key. And I want to verify the docker image signature using the root CA's public key. The idea being that the root certificate is distributed to the users with minimal effort and the leaf cert is given to the sigstore tools but can be revoked if needed without having to issue a new root cert.
I've read as much as I could find on this. And I'm still very confused. Below is my process so far. The problem is that I have to supply the (cosign imported) public key for the LEAF cert instead of the root cert. Ideally, I wouldn't even have to import root cert to cosign since that requires access to the root cert's private key.
Approach
(I also need to:
$Env:FULCIO_METRICS_PORT=2113
since it conflicts with rekor)Questions
cosign verify --ca-roots root-ca.crt.pem --rekor-url http://localhost:3000 $IMAGE_DIGEST
? Is this only supported once feature: 'cosign verify' add flags --ca-roots and --ca-intermediates to allow multiple CA roots #3462 gets in?--key
for sign. Could a link to import keys be added in the sign-and-attach-a-certificate-and-certificate-chain section? (I'm asking because certificates don't seem very well supported yet and a full guide on them would be ideal but I don't know how to best change the documentation as I'm new to certs and signing).The text was updated successfully, but these errors were encountered: