Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

test root key rotation when threshold of keys rotate #505

Open
jku opened this issue Jan 11, 2025 · 2 comments
Open

test root key rotation when threshold of keys rotate #505

jku opened this issue Jan 11, 2025 · 2 comments

Comments

@jku
Copy link
Member

jku commented Jan 11, 2025

I'm not sure if this works currently:

  • root signers remain the same
  • but their keys (ubikeys) change

in this case we should ask the signers to sign with both old and new keys but I think that might not happen. This does work if the new key is "owned" by a different signer

@jku
Copy link
Member Author

jku commented Jan 16, 2025

The way this should work is likely:

  • when we find out if a signature is needed, create a list of keys that
    • are owned by this user
    • should sign
  • when signing, we should ask user to insert specific key (and maybe check that the correct key is inserted)
    • how we describe the correct key to the user is a bit of a problem: keyid is useless
    • securesystemslib does have some support for this: "hsm:2?label=YubiKey+PIV+%2315835999" can be used to load a signer for a specific pkcs label
    • l'm not sure if we want to store the label in the public metadata or just in a client cache (we currently don't store it anywhere): Store signing key details in a signer application cache #66

@jku
Copy link
Member Author

jku commented Jan 16, 2025

also relevant #50

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant