-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proof of key possession is inconsistent with Fulcio #282
Comments
@haydentherapper suggested using sigstore/sigstore's |
Thanks for finding this! Yes, I think using that function would be a good fix. I think we didn't catch this because sigstore-go signing was only used for CI identities whose tokens don't have the |
Changing the behavior is a little strange, in that what sigstore-go signing does now is the desired end behavior - but I understand we're a bit away from a Fulcio v2.0 release. @adityasaky it sounds like you'll post a patch? |
Changing this behavior should be in line with all other clients as well - if they support email-based identity providers, this patch is needed. We could support multiple PoPs in Fulcio as well, but with how the code is set up currently, that is not possible. |
Description
sigstore-go computes the proof of key possession signature over the token's subject, while Fulcio verifies it using the token's email address. This results in the signing flow (using the public good instance) failing:
Related: sigstore/cosign#3777
Version
v0.5.1
The text was updated successfully, but these errors were encountered: