-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signed Certificate Timestamp with Long-lived Keys #3236
Comments
If you only specify a key, you should not need to specify the SCT flag. That would be a bug we can fix. |
jkjell
added a commit
to jkjell/cosign
that referenced
this issue
Sep 12, 2023
…hen using a public key
jkjell
added a commit
to jkjell/cosign
that referenced
this issue
Sep 12, 2023
…hen using a public key Signed-off-by: John Kjell <[email protected]>
haydentherapper
pushed a commit
that referenced
this issue
Sep 12, 2023
#3237) * Fixes #3236, disable SCT checking for a cosign verification when using a public key Signed-off-by: John Kjell <[email protected]> * Update additional verify functionality Signed-off-by: John Kjell <[email protected]> --------- Signed-off-by: John Kjell <[email protected]>
lance
pushed a commit
to securesign/cosign
that referenced
this issue
Sep 25, 2023
…hen usin… (sigstore#3237) * Fixes sigstore#3236, disable SCT checking for a cosign verification when using a public key Signed-off-by: John Kjell <[email protected]> * Update additional verify functionality Signed-off-by: John Kjell <[email protected]> --------- Signed-off-by: John Kjell <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Question
When signing an image with the command below:
cosign sign --key cosign.key <IMAGE> --tlog-upload=false
it's required to use this command to verify it (in a restricted environment, i.e. no access to TUF root CDN):
cosign verify --key cosign.pub <IMAGE> --insecure-ignore-tlog --insecure-ignore-sct
even though no timestamp will be added. This is related to this Slack thread.
Should it be necessary to ignore the "Signed Certificate Timestamp" when not signing with a certificate? Are their valid use-cases for a timestamp with a long-lived key?
The text was updated successfully, but these errors were encountered: