Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

git-repo: decide on support for multiple keys #51

Closed
jku opened this issue Mar 6, 2023 · 2 comments
Closed

git-repo: decide on support for multiple keys #51

jku opened this issue Mar 6, 2023 · 2 comments
Labels

Comments

@jku
Copy link
Owner

jku commented Mar 6, 2023

I'm adding support on securesystemslib for identifying the HW keys: secure-systems-lab/securesystemslib#526

I want to start using that in some sense

  • I think limiting it to one HW key per repository per user is fine
  • Signer can recognise the correct HW key
  • the signer can store the key details (URI) in .playground-sign.ini

There is an edge case: if you are a signer but have lost your local repository, you've then also lost your URI... So there should be a way to (practically automatically) import a key as the signing key without explicitly adding new signing keys to metadata

@jku
Copy link
Owner Author

jku commented Mar 7, 2023

See branch store-keys-in-ini. With configuration like this

[signing-keys]
da63eeba4841366b8968e2842cd5768933101593c0a59267a156ad6faf7af635 = hsm:2?label=YubiKey+PIV+%2315835999
  • generated automatically when keys are created
  • at signing time the Signer is created with this URI
  • not limited to single key per user per repo
  • the "lost config" case is still unsolved but should not be too difficult:
    • if uri is not found, run HSMSigner.import_(), check that public key is correct and store URI in configuration
    • in fact the initial signing key storage could happen this way as well... no need to necessarily store the URI when the public key is imported

@jku
Copy link
Owner Author

jku commented Aug 8, 2023

Moved to tuf-on-ci

@jku jku closed this as completed Aug 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant