Use notation verify
command to verify signatures associated with artifacts stored in OCI compliant registries. Signature verification succeeds if verification succeeds for at least one of the signatures associated with the artifact. Upon successful verification, the output message is printed out as follows:
Successfully verified signature for <registry>/<repository>@<digest>
Tags are mutable and a tag reference can point to a different artifact than that was signed referred by the same tag. If a tag
is used to identify the OCI artifact, the output message is as follows:
Warning: Always verify the artifact using digest(@sha256:...) rather than a tag(:v1) because resolved digest may not point to the same signed artifact, as tags are mutable.
Successfully verified signature for <registry>/<repository>@<digest>
A signature can have user defined metadata. If the signature for the OCI artifact contains any metadata, the output message is as follows:
Successfully verified signature for <registry>/<repository>@<digest>
The artifact was signed with the following user metadata.
KEY VALUE
<key> <value>
Note
This command is for verifying OCI artifacts only. Use notation blob verify
command for verifying arbitrary blobs.
Verify signatures associated with the artifact.
Usage:
notation verify [flags] <reference>
Flags:
-d, --debug debug mode
-h, --help help for verify
--insecure-registry use HTTP protocol while connecting to registries. Should be used only for testing
--max-signatures int maximum number of signatures to evaluate or examine (default 100)
--oci-layout [Experimental] verify the artifact stored as OCI image layout
-p, --password string password for registry operations (default to $NOTATION_PASSWORD if not specified)
--plugin-config stringArray {key}={value} pairs that are passed as it is to a plugin, if the verification is associated with a verification plugin, refer plugin documentation to set appropriate values
--scope string [Experimental] set trust policy scope for artifact verification, required and can only be used when flag "--oci-layout" is set
-u, --username string username for registry operations (default to $NOTATION_USERNAME if not specified)
-m, --user-metadata stringArray user defined {key}={value} pairs that must be present in the signature for successful verification if provided
-v, --verbose verbose mode
Pre-requisite: User needs to configure trust store and trust policy properly before using notation verify
command.
Use notation certificate
command to configure trust stores.
Users who consume signed artifact from a registry use the trust policy to specify trusted identities which sign the artifacts, and level of signature verification to use. The trust policy is a JSON document. User needs to create a file named trustpolicy.json
or trustpolicy.oci.json
under {NOTATION_CONFIG}
. See Notation Directory Structure for {NOTATION_CONFIG}
.
An example of trustpolicy.json
:
{
"version": "1.0",
"trustPolicies": [
{
// Policy for all artifacts, from any registry location.
"name": "wabbit-networks-images", // Name of the policy.
"registryScopes": [ "localhost:5000/net-monitor" ], // The registry artifacts to which the policy applies.
"signatureVerification": { // The level of verification - strict, permissive, audit, skip.
"level": "strict"
},
"trustStores": [ "ca:wabbit-networks" ], // The trust stores that contains the X.509 trusted roots.
"trustedIdentities": [ // Identities that are trusted to sign the artifact. It only includes identities of `ca` and `signingAuthority`.
"x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder"
]
}
]
}
An example of trustpolicy.json
with RFC 3161 timestamp verification support:
{
"version": "1.0",
"trustPolicies": [
{
"name": "wabbit-networks-images",
"registryScopes": [ "localhost:5000/net-monitor" ],
"signatureVerification": {
"level": "strict",
"verifyTimestamp": "afterCertExpiry" // Only verify timestamp countersignatures if any code signing certificate has expired. DEFAULT: `always`
},
"trustStores": [ "ca:wabbit-networks", "tsa:wabbit-networks-timestamp" ], // To enable timestamp verification, trust store type `tsa` MUST be configured.
"trustedIdentities": [
"x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder"
]
}
]
}
For a Linux user, store file trustpolicy.json
under directory ${HOME}/.config/notation/
.
For a MacOS user, store file trustpolicy.json
under directory ${HOME}/Library/Application Support/notation/
.
For a Windows user, store file trustpolicy.json
under directory %USERPROFILE%\AppData\Roaming\notation\
.
Example values on trust policy properties:
Property name | Value | Meaning |
---|---|---|
name | "wabbit-networks-images" | The name of the policy is "wabbit-networks-images". |
registryScopes | "localhost:5000/net-monitor" | The policy only applies to artifacts stored in repository localhost:5000/net-monitor . |
registryScopes | "localhost:5000/net-monitor", "localhost:5000/nginx" | The policy applies to artifacts stored in two repositories: localhost:5000/net-monitor and localhost:5000/nginx . |
registryScopes | "*" | The policy applies to all the artifacts stored in any repositories. |
signatureVerification | "level": "strict" | Signature verification is performed at strict level, which enforces all validations: integrity , authenticity , authentic timestamp , expiry and revocation . |
signatureVerification | "level": "permissive" | The permissive level enforces most validations, but will only logs failures for revocation and expiry . |
signatureVerification | "level": "audit" | The audit level only enforces signature integrity if a signature is present. Failure of all other validations are only logged. |
signatureVerification | "level": "skip" | The skip level does not fetch signatures for artifacts and does not perform any signature verification. |
trustStores | "ca:wabbit-networks" | Specify the trust store that uses the format {trust-store-type}:{named-store}. The trust store is added using notation certificate add command. |
trustStores | "ca:wabbit-networks", "ca:rocket-networks" | Specify two trust stores, each of which contains the trusted roots against which signatures are verified. |
trustedIdentities | "x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder" | User only trusts the identity with specific subject. User can use notation certificate show command to get the subject info. |
trustedIdentities | "*" | User trusts any identity (signing certificate) issued by the CA(s) in trust stores. |
User can configure multiple trust policies for different scenarios. See Trust Policy Schema and properties for details.
Configure trust store and trust policy properly before using notation verify
command.
# Prerequisites: Signatures are stored in a registry referencing the signed OCI artifact
# Configure trust store by adding a certificate file into trust store named "wabbit-network" of type "ca"
notation certificate add --type ca --store wabbit-networks wabbit-networks.crt
# Create a JSON file named "trustpolicy.json" under directory "{NOTATION_CONFIG}".
# Verify signatures on the supplied OCI artifact identified by the digest
notation verify localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
An example of output messages for a successful verification:
Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
Use the --user-metadata
flag to verify that provided key-value pairs are present in the payload of the valid signature.
# Verify signatures on the supplied OCI artifact identified by the digest and verify that io.wabbit-networks.buildId=123 is present in the signed payload
notation verify --user-metadata io.wabbit-networks.buildId=123 localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
An example of output messages for a successful verification:
Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
The artifact is signed with the following user metadata.
KEY VALUE
io.wabbit-networks.buildId 123
An example of output messages for an unsuccessful verification:
Error: signature verification failed: unable to find specified metadata in any signatures
A tag is resolved to a digest first before verification.
# Prerequisites: Signatures are stored in a registry referencing the signed OCI artifact
# Verify signatures on an OCI artifact identified by the tag
notation verify localhost:5000/net-monitor:v1
An example of output messages for a successful verification:
Warning: Always verify the artifact using digest(@sha256:...) rather than a tag(:v1) because resolved digest may not point to the same signed artifact, as tags are mutable.
Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
# Prerequisites: Configure TSA trust store by adding the root certificate of the trusted TSA into trust store named "wabbit-network-timestamp" of type "tsa"
notation certificate add --type tsa --store wabbit-networks-timestamp wabbit-networks-tsa.crt
# Verify signatures on an OCI artifact
notation verify localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
An example of output messages for a successful verification:
Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9
Users should configure trust policy properly before verifying artifacts in OCI layout directory. According to trust policy specification, registryScopes
property of trust policy configuration determines which trust policy is applicable for the given artifact. For example, an image stored in a remote registry is referenced by "localhost:5000/net-monitor:v1". In order to verify the image, the value of registryScopes
should contain "localhost:5000/net-monitor", which is the repository URL of the image. However, the reference to the image stored in OCI layout directory doesn't contain repository URL information. Users can set registryScopes
to the URL that the image is supposed to be stored in the registry, and then use flag --scope
for notation verify
command to determine which trust policy is used for verification. Here is an example of trust policy configured for image hello-world:v1
:
{
"name": "images stored as OCI layout",
"registryScopes": [ "local/hello-world" ],
"signatureVerification": {
"level" : "strict"
},
"trustStores": [ "ca:hello-world" ],
"trustedIdentities": ["*"]
}
To verify image hello-world:v1
, user should set the environment variable NOTATION_EXPERIMENTAL
and use flags --oci-layout
and --scope
together. for example:
export NOTATION_EXPERIMENTAL=1
# Assume OCI layout directory hello-world is under current path
# The value of --scope should be set base on the trust policy configuration
notation verify --oci-layout --scope "local/hello-world" hello-world:v1