Skip to content

Commit ff6a66f

Browse files
authored
Fulcio draft (#168)
* Add TAP number with minor clarifications. Clarifications include: * linking to the root-signing repository * replacing "bundle" with "sig" for backwards compatibility Signed-off-by: Marina Moore <[email protected]> * Add TAP 18 to index Signed-off-by: Marina Moore <[email protected]> --------- Signed-off-by: Marina Moore <[email protected]>
1 parent 3b0d8b1 commit ff6a66f

File tree

2 files changed

+6
-7
lines changed

2 files changed

+6
-7
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
* [TAP 14: Managing TUF Versions](tap14.md)
2121
* [TAP 16: Snapshot Merkle Trees](tap16.md)
2222
* [TAP 17: Remove Signature Wrapper from the TUF Specification](tap17.md)
23+
* [TAP 18: Ephemeral identity verification using sigstore's Fulcio for TUF developer key management](tap18.md)
2324

2425
## Rejected
2526

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
* TAP:
1+
* TAP: 18
22
* Title: Ephemeral identity verification using sigstore's Fulcio for TUF developer key management
33
* Version: 0
4-
* Last-Modified: 27/07/2021
4+
* Last-Modified: 07/02/2023
55
* Author: Marina Moore, Joshua Lock, Asra Ali, Luke Hinds, Jussi Kukkonen, Trishank Kuppusamy, axel simon
66
* Type: Standardization
77
* Status: Draft
@@ -41,9 +41,9 @@ In order to facilitate use of Fulcio, delegations may list an OIDC identity, suc
4141
}
4242
```
4343

44-
Where IDENTITY is the OIDC identity of the party who is authorized to sign and ISSUER is the OIDC entity used by Fulcio for verification.
44+
Where IDENTITY is the OIDC identity of the party who is authorized to sign and ISSUER is the OIDC entity used by Fulcio for verification. For example, identity could be "[email protected]" with an issuer "https://accounts.google.com".
4545

46-
The root certificate or certificate chain for the Fulcio server MUST be obtained using the Sigstore root of trust. The client MUST use a single Fulcio instance.
46+
The root certificate or certificate chain for the Fulcio server MUST be obtained using the Sigstore [root of trust](https://github.com/sigstore/root-signing). The client MUST use a single Fulcio instance.
4747

4848

4949
## Signature format
@@ -52,7 +52,7 @@ A signature using a Fulcio key MUST include the Fulcio certificate for use in ve
5252
```
5353
{
5454
"keyid" : KEYID,
55-
"bundle": BUNDLE
55+
"sig": BUNDLE
5656
}
5757
```
5858
Where BUNDLE is an object that contains the verification information (transparency log references or timestamps), Fulcio X.509 signing certificate, and a signature over targets metadata, conforming to the [format defined by Sigstore](https://github.com/sigstore/protobuf-specs/blob/main/protos/sigstore_bundle.proto). The transparency log verification information includes a signed timestamp (SET) from Rekor promising inclusion in the Rekor transparency log.
@@ -127,8 +127,6 @@ By default, clients will perform offline verification. They may choose to additi
127127

128128
Clients that do not recognize Fulcio certs will not be able to validate signatures from Fulcio certs, but they will be able to parse the metadata.
129129

130-
As `sig` was removed from `signatures`, parsing of the signatures will fail for old clients.
131-
132130
# Augmented Reference Implementation
133131

134132
The pull request [#181](https://github.com/theupdateframework/go-tuf/pull/181) in go-tuf adds this feature.

0 commit comments

Comments
 (0)