LWN: Comments on "The Linux Foundation's "sigstore" project" https://lwn.net/Articles/848930/ This is a special feed containing comments posted to the individual LWN article titled "The Linux Foundation's "sigstore" project". en-us Thu, 16 Oct 2025 09:13:29 +0000 Thu, 16 Oct 2025 09:13:29 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net any upside to email verification for signature? https://lwn.net/Articles/849244/ https://lwn.net/Articles/849244/ Jan_Zerebecki <div class="FormattedComment"> sigstore fulcio which uses oauth oidc to verify an email for a signature as a replacement for private keys seems worse than possible alternative designs. Can anyone find any upside of it? That is, besides, if you want more centralization.<br> <p> fulcio does not reduce the amount of secrets you need to keep as you also need to type in a password for your email provider. If that were the goal you could derive the signature private key and a password for your email from the same passphrase. However I think storing a regularly rotated secret per device in addition to your passphrase (that you&#x27;d use for both secret unlocking and login) is still preferable.<br> <p> Instead consider 1) transparency log of fetched git branch heads (no signature to establish authority, as you need to establish which code to trust in another layer anyway) or 2) transparency log of signatures with transparency logged automated regularly rotated public-keys where the previous key signs the next one with tricks for recovery, like designating other keys as authorized notary for replacement for lost keys, storing an only replacement-authorised-key in your email, per device keys, etc. The UI for (2) can look the same as for fulcio, so that is not an argument to not have private keys in a design.<br> </div> Sat, 13 Mar 2021 11:45:44 +0000 Transparency https://lwn.net/Articles/849254/ https://lwn.net/Articles/849254/ pabs <div class="FormattedComment"> These DebConf talks introduce a gossip hub, which IIRC is meant to attempt to prevent split view attacks:<br> <p> <a href="https://debconf18.debconf.org/talks/104-software-transparency-package-security-beyond-signatures-and-reproducible-builds/">https://debconf18.debconf.org/talks/104-software-transpar...</a><br> <a href="https://debconf19.debconf.org/talks/66-software-transparency-improving-package-manager-security/">https://debconf19.debconf.org/talks/66-software-transpare...</a><br> </div> Sat, 13 Mar 2021 04:13:09 +0000 Transparency https://lwn.net/Articles/849243/ https://lwn.net/Articles/849243/ Jan_Zerebecki <div class="FormattedComment"> <font class="QuotedText">&gt; And CT isn&#x27;t even really finished. A sufficiently powerful and nefarious actor could pervert things pretty badly, and the features mooted to prevent that mechnically (&quot;Gossip&quot; protocols and consistency proof checking) are not in fact deployed.</font><br> <p> Yes, Trillian AKA CT (which sigstore uses as a dependency) explicitly mentions that it does not yet protect against split view attacks, where an attacker completely simulates a log with different content just for you. <br> <p> <font class="QuotedText">&gt; But in the space sigstore wants to occupy [...] this technology doesn&#x27;t do what you need in that circumstance at all.</font><br> <p> Do you have any suggestions for technology that would be better? I&#x27;d have use for a way to detect when others see e.g. the content of Linux 5.11.0 as different than what I see.<br> </div> Fri, 12 Mar 2021 22:52:30 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849241/ https://lwn.net/Articles/849241/ Jan_Zerebecki <div class="FormattedComment"> Not even that, the sigstore-with-oauth sketched in the article will not tell you whether you should trust code that their DB says was signed by lwn@example.com . So you will still need to maintain some sort of trust DB in addition to this sigstore to answer that question.<br> </div> Fri, 12 Mar 2021 22:06:34 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849236/ https://lwn.net/Articles/849236/ ratfactor <div class="FormattedComment"> <font class="QuotedText">&gt; ...this could just have been a plain HTML page.</font><br> <p> The sharp irony of these awful Web practices (no matter how common they are) being needlessly used on a &quot;web of trust&quot; site is downright painful.<br> </div> Fri, 12 Mar 2021 20:13:55 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849232/ https://lwn.net/Articles/849232/ calumapplepie <div class="FormattedComment"> I disagree on the risks of running arbitrary JavaScript being increased by its nonfree status.<br> <p> I&#x27;m not denying that security holes to exploit exist: there are 0-days in Chrome and other browsers. However, they are rare, of the level that implies nation-state actors, and require long, delicate chains. But my experience with The Great Suspender (see <a href="https://lwn.net/Articles/846272/">https://lwn.net/Articles/846272/</a> ) shows that making sure to run open-source code doesn&#x27;t prevent you from running hostile code..<br> <p> TGS was a fully open-source extension with 2 million users. A dozen red flags were thrown (new maintainer, from outside the community, with no details of their existence, who never announces their presence, is said to have &quot;purchased&quot; the extension, makes a surprise release, doesn&#x27;t put out a changelog, doesn&#x27;t tag the release, includes code in release not on Github, requests additional permissions in release, and has dubious reasons for said permissions).<br> <p> After three months, there was almost no change in the number of users.<br> <p> The javascript library in question is open-source, as others have pointed out: while it is minified, that is to speed pageloads and is standard on the web. But that doesn&#x27;t mean it&#x27;s innocent. A reproducible build stack doesn&#x27;t mean that the source code doesn&#x27;t exploit a 0day. Even if it was distributed unminified, there is no way to know where a 0day may exist: reliably differentiating an unusual style choice from a sandbox compromise can&#x27;t be done without running the code and carefully monitoring the executor.<br> <p> Any time you run javascript from the internet, you are risking falling victim to 0days: regardless of if it&#x27;s open-source or not, distributed minified or unminified. If that concerns you, install NoScript. If you still want SOME scripts, use LocalCDN and uBlock Origin in &#x27;hard&#x27; mode. But know that while both of those extensions are fully open-source, either one has all the power it needs to compromise the entirety of your browsing activity.<br> <p> We can debate the necessity of the site including any JavaScript on this site separately. But there is no way to run remote JavaScript (of ANY sort) securely without trusting that web browser sandbox is resilient. There is furthermore no way to be certain that the techniques you use to prevent JavaScript from running are themselves malicious. At some point, you need to draw the line of trust: drawing the line where minified open-source javascript is on one side and unminifed open-source code isn&#x27;t is not a good place.<br> </div> Fri, 12 Mar 2021 20:11:19 +0000 Transparency https://lwn.net/Articles/849153/ https://lwn.net/Articles/849153/ tialaramex <div class="FormattedComment"> A recurring pattern is people see Certificate Transparency and they say, oh that&#x27;s a clever solution to a problem [it is] and I have a problem, so I should model my solution on Certificate Transparency...<br> <p> I started out reacting to these by thinking &quot;Huh, I guess it isn&#x27;t a perfect fit, but maybe this works for you&quot; and after seeing it fail so often I&#x27;ve now reached the point where I just grunt in disgust. It would be lovely if &quot;sigstore&quot; is the exception, but that feels unlikely.<br> <p> CT was very narrowly tailored to solve a very specific problem, and most of these other problems have only superficial resemblance. I think the _most_ important thing I&#x27;d want anybody thinking &quot;Certificate Transparency is the model I need to look at&quot; to know is that all the clever cryptography in CT is only there to keep honest people (in this case public CAs) honest in the first place. The real benefits we reap would be the same if CAs just published a CSV file or something - but if there was a CSV file there would be a persistent temptation to tamper with it, and CT removes that temptation. And CT isn&#x27;t even really finished. A sufficiently powerful and nefarious actor could pervert things pretty badly, and the features mooted to prevent that mechnically (&quot;Gossip&quot; protocols and consistency proof checking) are not in fact deployed. Because like I said, we&#x27;re about keeping honest people honest, and at a certain point if they&#x27;re all behaving you need to stop thinking of increasingly devious things they could be hiding from you - they are probably just being honest. Humans are lazy, and the subterfuge required to successful defeat CT as it stands is just too much effort.<br> <p> But in the space sigstore wants to occupy I don&#x27;t see honest people who need to be kept honest. I see a Wild West, and I fear that this technology doesn&#x27;t do what you need in that circumstance at all.<br> <p> I first saw mention of &quot;sigstore&quot; in a context which compared it to Let&#x27;s Encrypt in the context of software. Operating a CA (which is what Let&#x27;s Encrypt does) for Free Software code signing could make sense, but this does not seem to be that.<br> </div> Fri, 12 Mar 2021 04:41:04 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849132/ https://lwn.net/Articles/849132/ jschrod <div class="FormattedComment"> Can you please stop your crusade?<br> <p> This is not Slashdot.<br> </div> Thu, 11 Mar 2021 18:20:36 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849127/ https://lwn.net/Articles/849127/ rahulsundaram <div class="FormattedComment"> You seem very confused. I have zero association whatsoever with Linux Foundation nor do I work for any organization associated with it. I do have some experience getting free software licensing issued resolved as a volunteer distro package maintainer and developer for several years and that&#x27;s the perspective I am sharing here. The enforcement of licensing requirements if the authors of the library care enough to do it has to initiated by them. I don&#x27;t see any evidence at all for that. That&#x27;s my point.<br> </div> Thu, 11 Mar 2021 17:56:16 +0000 Can we end this here, please? https://lwn.net/Articles/849128/ https://lwn.net/Articles/849128/ jake <div class="FormattedComment"> This does not seem a productive use of anyone&#x27;s time.<br> <p> Let&#x27;s just stop this here, please.<br> <p> thanks,<br> <p> jake<br> </div> Thu, 11 Mar 2021 17:45:23 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849126/ https://lwn.net/Articles/849126/ jebba <div class="FormattedComment"> OK, how about the corporate masters you routinely shill for violate free software developers&#x27; licenses regularly, so it doesn&#x27;t matter because the community can&#x27;t do anything about it.<br> </div> Thu, 11 Mar 2021 17:38:47 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849124/ https://lwn.net/Articles/849124/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; The Linux Foundation is big enough to overlook violating others&#x27; licenses and it is a common practice. Better?</font><br> <p> Nope. I never talked about the Linux Foundation at all.<br> </div> Thu, 11 Mar 2021 17:34:40 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849123/ https://lwn.net/Articles/849123/ jebba <div class="FormattedComment"> The Linux Foundation is big enough to overlook violating others&#x27; licenses and it is a common practice. Better?<br> </div> Thu, 11 Mar 2021 17:30:20 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849122/ https://lwn.net/Articles/849122/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; So since they are too small and unlikely to be able to fight the Linux Foundation&#x27;s lawyers, the violation is just fine. Got it.</font><br> <p> Complete mischaracterization of what I said. Try again.<br> </div> Thu, 11 Mar 2021 17:20:19 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849119/ https://lwn.net/Articles/849119/ jebba <div class="FormattedComment"> So since they are too small and unlikely to be able to fight the Linux Foundation&#x27;s lawyers, the violation is just fine. Got it.<br> </div> Thu, 11 Mar 2021 17:14:24 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849116/ https://lwn.net/Articles/849116/ mss <div class="FormattedComment"> Looks to me like it is essentially a centralized PGP Web of Trust or TOFU database replacement specifically for signing packages.<br> <p> That is, instead of calculating the trust of the PGP key that signed a release of some package using the aforementioned trust methods the signature will be checked directly in a centralized log.<br> <p> </div> Thu, 11 Mar 2021 17:13:54 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849071/ https://lwn.net/Articles/849071/ grawity <p>It's OpenID <em>Connect</em>, which is actually OAuth 2.0 extended with some of the features OpenID had &ndash; but otherwise it's unrelated to the original OpenID.</p> Thu, 11 Mar 2021 14:20:17 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849056/ https://lwn.net/Articles/849056/ Sesse <div class="FormattedComment"> If it&#x27;s OpenID-based, what makes it more secure than just getting the file over TLS in the first place? If it so you can put it on GitHub without fear of… something? How do you know which OpenID scope to trust? (I thought OpenID was basically dead a long time ago, but seemingly not.)<br> </div> Thu, 11 Mar 2021 09:40:13 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849050/ https://lwn.net/Articles/849050/ LtWorf <div class="FormattedComment"> I think this is more for clueless projects like yarn that when the repository key expires just make a new one.<br> <p> No thought about making a keyring package and use it to introduce the new key before the old one expires.<br> <p> <a href="https://github.com/yarnpkg/yarn/issues/7866">https://github.com/yarnpkg/yarn/issues/7866</a><br> </div> Thu, 11 Mar 2021 07:51:25 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849045/ https://lwn.net/Articles/849045/ fwiesweg <div class="FormattedComment"> So SolarWinds would have been prevented by trusting a non-signed package? I doubt it. Additionally, I don&#x27;t think analyzing that unsigned package bit for bit is realistic, either, nobody has time for that and most organizations out there lack the required skill set. It happened despite the signature, not because of it.<br> <p> Like everything we do, security-related work is iterative in nature and this is but a single building stone to secure the supply chain. Further steps are required and might include many things, from reviewed packages (signed by the reviewers, too), automatic content analyses (so packages are signed by those systems, too), etc., but there&#x27;d be no point in all of that if you can&#x27;t even guarantee that the sources package arrives on your disk without having been tampered with somewhere between you and the maintainer/reviewer. So something like sigstore is a first and necessary, but in itself still insufficient step.<br> </div> Thu, 11 Mar 2021 07:20:53 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849038/ https://lwn.net/Articles/849038/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; You think all 283 contributors (according to github) don&#x27;t care? That&#x27;s quite an assumption. And that allows an exemption?</font><br> <p> Given how many websites do this and how often a requirement to bundle a license is enforced, it is a pretty mundane assumption. Also most of the contributors in a project with a long tail has a few patches each that fixed a bug or added a feature they wanted and moved on, leaving a much smaller number of contributors doing bulk of the work and they can either spend their limited time improving the library or enforcing a licensing term. In legal terms, there isn&#x27;t an exception. In practice, this sort of licensing requirement is often overlooked and questioning me isn&#x27;t going to change that one bit. <br> </div> Thu, 11 Mar 2021 02:55:47 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849036/ https://lwn.net/Articles/849036/ jebba <div class="FormattedComment"> You think all 283 contributors (according to github) don&#x27;t care? That&#x27;s quite an assumption. And that allows an exemption?<br> </div> Thu, 11 Mar 2021 01:06:25 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849031/ https://lwn.net/Articles/849031/ shemminger <div class="FormattedComment"> The recent SolarWinds attack happened in the infrastructure, and was caused by trusting the signature.<br> How would this help that threat model? Or would it introduce a false sense of trust?<br> </div> Wed, 10 Mar 2021 23:50:57 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849010/ https://lwn.net/Articles/849010/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; Just &quot;Ideally&quot;? Isn&#x27;t it required?</font><br> <p> A requirement is meaningless unless it is enforced. I doubt the authors care enough to bother. <br> </div> Wed, 10 Mar 2021 20:47:24 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849008/ https://lwn.net/Articles/849008/ jebba <div class="FormattedComment"> <font class="QuotedText">&gt; They ideally should include a copy of the license. </font><br> <p> Just &quot;Ideally&quot;? Isn&#x27;t it required?<br> <p> <font class="QuotedText">&gt; That practice is far from universal as we see here.</font><br> <p> The Linux Foundation themselves work against copyright enforcement of &quot;Open Source&quot;, is it surprising that it is far from universal? Without people on the Board like Bdale Garbee and Karen Sandler, this is the result we get. Microsoft and copyright violations.<br> </div> Wed, 10 Mar 2021 20:21:01 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/849001/ https://lwn.net/Articles/849001/ rahulsundaram <div class="FormattedComment"> They ideally should include a copy of the license. That practice is far from universal as we see here.<br> </div> Wed, 10 Mar 2021 19:39:58 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848981/ https://lwn.net/Articles/848981/ IanKelling <div class="FormattedComment"> I should have been clearer. To join slack as a new user requires running nonfree software in your browser last I checked. But there are free clients after you do that. Same with twitter.<br> </div> Wed, 10 Mar 2021 18:30:31 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848979/ https://lwn.net/Articles/848979/ jebba <div class="FormattedComment"> It links to:<br> <p> * Google ( <a href="https://fonts.googleapis.com/css?family=Catamaran:400,600">https://fonts.googleapis.com/css?family=Catamaran:400,600</a> )<br> <p> * Slack ( <a href="https://join.slack.com/t/sigstore/shared_invite/zt-mhs55zh0-XmY3bcfWn4XEyMqUUutbUQ">https://join.slack.com/t/sigstore/shared_invite/zt-mhs55z...</a> )<br> <p> * Microsoft Github ( <a href="https://github.com/sigstore/rekor">https://github.com/sigstore/rekor</a> and others )<br> </div> Wed, 10 Mar 2021 17:34:19 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848978/ https://lwn.net/Articles/848978/ jebba <div class="FormattedComment"> The license for it says:<br> <p> <font class="QuotedText">&gt; The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.</font><br> <p> <a href="https://github.com/Modernizr/Modernizr/blob/master/LICENSE.md">https://github.com/Modernizr/Modernizr/blob/master/LICENS...</a><br> <p> Wouldn&#x27;t the license info need to be included? Just curious.<br> </div> Wed, 10 Mar 2021 17:29:41 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848975/ https://lwn.net/Articles/848975/ fwiesweg <div class="FormattedComment"> Sounds like quite nice, I hope it gains some traction. I still try to avoid thinking of all the dependencies whose signatures I have not personally validated because it&#x27;s scary. If only customers paid for such work... ah okay time to stop dreaming.<br> </div> Wed, 10 Mar 2021 16:36:53 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848974/ https://lwn.net/Articles/848974/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; I&#x27;m not sure &quot;You can find the source somewhere online&quot; qualifies as free software.</font><br> <p> Sure it does. It is not ideal but just because you don&#x27;t see the full source directly in the browser doesn&#x27;t make it somehow non-free. <br> </div> Wed, 10 Mar 2021 16:27:41 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848937/ https://lwn.net/Articles/848937/ Rigrig <div class="FormattedComment"> I&#x27;m not sure &quot;You can find the source somewhere online&quot; qualifies as free software.<br> <p> What really annoys me though is that this could just have been a plain HTML page.<br> And it is.<br> But then someone used CSS to stick a &quot;preloader&quot; in front of the whole page and added some javascript (which depends on a bunch of external javascript libraries) to hide the loader after some delay.<br> So the only way to read it is to either run a bunch of external javascript blobs, or to also disable stylesheets.<br> <p> And I think that a project which aims to improve the supply chain could have bothered with providing checksums for those external blobs: <a href="https://en.wikipedia.org/wiki/Subresource_Integrity">https://en.wikipedia.org/wiki/Subresource_Integrity</a><br> </div> Wed, 10 Mar 2021 15:51:35 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848938/ https://lwn.net/Articles/848938/ dskoll <p>Actually, I use Slack without using any non-free software. I use a Slack-to-IRC gateway, namely <a href="https://github.com/42wim/matterircd">matterircd</a>. <p>I still don't like Slack, but at least I can access it with free software. Wed, 10 Mar 2021 15:32:00 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848932/ https://lwn.net/Articles/848932/ IanKelling <div class="FormattedComment"> * website, <a href="https://sigstore.dev/,">https://sigstore.dev/,</a><br> <p> I actually can see some github repo links and a slack link. Slack requires running nonfree software to join. At least the repos seem to be free software.<br> </div> Wed, 10 Mar 2021 15:30:24 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848934/ https://lwn.net/Articles/848934/ re:fi.64 <div class="FormattedComment"> Modernizr is open source, seems just like the license for omitted from the bundle for some reason...<br> <p> <a href="https://modernizr.com/license/">https://modernizr.com/license/</a><br> </div> Wed, 10 Mar 2021 15:11:45 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848933/ https://lwn.net/Articles/848933/ rahulsundaram <div class="FormattedComment"> <p> <font class="QuotedText">&gt; The content of the sigstore website, is unreadable without downloading and running at least one nonfree program in your browser</font><br> <p> That Javascript is not non-free. <br> <p> <a href="https://github.com/Modernizr/Modernizr">https://github.com/Modernizr/Modernizr</a><br> <p> Minimizing it in this case is just an optimization for faster loading.<br> </div> Wed, 10 Mar 2021 15:09:47 +0000 The Linux Foundation's "sigstore" project https://lwn.net/Articles/848931/ https://lwn.net/Articles/848931/ IanKelling <div class="FormattedComment"> The content of the sigstore website, is unreadable without downloading and running at least one nonfree program in your browser<br> <p> <a href="https://cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/modernizr.min.js">https://cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/mo...</a><br> <p> Requiring people to run arbitrary javascript, which could compromise the computer if there exists one of many security holes, is not the right way to start for securing software distribution.<br> </div> Wed, 10 Mar 2021 15:04:16 +0000