WIP: feat: signature via remote server #228
No reviewers
Labels
No labels
bug
dependency
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
review-next
security
stub
tool
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: raito/lanzaboote#228
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "signing-client"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR is composed of ~four changes:
This enables moving the local signature to another server… or even maybe a hardware security token!
In the future, the server can ask for attestations or any kind of things to give the signed stub.
@ -0,0 +26,4 @@
- `POST /sign-stub`: assembles a signed stub based on the stub parameters sent, 200 OK with a signed binary as body, 400 with a plaintext error if failed.
- `POST /sign-store-path`: assembles a signed binary based on the store path sent, 200 OK with a signed binary as body, 400 with a plaintext error if failed.
- `GET /verify`: verify that the binary sent is signed according to the current keyring, returns a JSON `{ signed: bool, valid_according_to_secureboot_policy: bool }`, a signed binary can be invalid for the current Secure Boot policy, the two attributes represents this fact.
@ -0,0 +26,4 @@
- `POST /sign-stub`: assembles a signed stub based on the stub parameters sent, 200 OK with a signed binary as body, 400 with a plaintext error if failed.
- `POST /sign-store-path`: assembles a signed binary based on the store path sent, 200 OK with a signed binary as body, 400 with a plaintext error if failed.
- `GET /verify`: verify that the binary sent is signed according to the current keyring, returns a JSON `{ signed: bool, valid_according_to_secureboot_policy: bool }`, a signed binary can be invalid for the current Secure Boot policy, the two attributes represents this fact.
thx you madman
I would need some high-level information about the security model here. If people still need to protect the credentials to access this server, which signs everything, why not just given them the private keys themselves? The only advantage I can see now is that the server can log what it signed.
Let's discuss it tomorrow :)
Le dim. 15 oct. 2023, 14:57, Julian Stecklina @.***> a
écrit :
This will have to wait until I have some time to fix the merge conflicts. Closing in the meantime, do not delete the branch.
Pull request closed