-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rotate the SecureDrop Release Signing Key #5923
Comments
Here's a dual-signed transition statement, to aid in review of the forthcoming rotation changes: Transition statement for the SecureDrop Release Signing Key, 2021-05
|
Seems legit:
|
(Re-milestoned to 2.0.0 now that the 1.8.2 part of this task has been completed.) |
During this sprint we will need to:
We'll likely also want to make progress towards publishing an HTTPSE ruleset signed with the new key (freedomofpress/securedrop-https-everywhere-ruleset#54). As part of the release, we will also need to update the key published on securedrop.org (freedomofpress/securedrop.org#851). |
Overview of current state and desired state by component: |
Due to #5994, it may be necessary to sign the 2.0.0 tag using the old key, to avoid broken updates using the graphical updater. (Even when the fix for that issue is merged and backported, users will still be running the old updater code on their workstations by the time they need to get to 2.0.0.) |
We're mostly done, updated epic with remaining tasks. |
With the latest docs changes merged as part of freedomofpress/securedrop-workstation-docs#82, we've completed the final items on the checklist, so I'm closing. Great job, all! |
Description
The release signing key is coming up for renewal, due to expire on 2021-06-30. Typically we bump expiry by ~1y and press on with the same keypair. We've been using
22245C81E3BAEB4138B36061310F561200F4AD77
for almost 5 years now. With SD v2 coming up, we're in a good position to make a full rotation, via thesecuredrop-keyring
for servers & Workstation.Opening this ticket as a catch-all for related changes, such as PRs, so they can cross-link for tracking purposes. There are a number of places to update outside version control, such as URLs on the website.
We'll take it slow: first, generate a new keypair, and add that to the
securedrop-keyring
package. In a subsequent release, we can follow up with removing the old keypair, and proceed with formal revocation published to keyservers once it's no longer used.Sub-tasks
securedrop-admin
does not include new UID in signature check #5994)main
branch/deploy logic securedrop-https-everywhere-ruleset#64The text was updated successfully, but these errors were encountered: