cosign + connaisseur - image with multiple cosign signatures to be verified before deployment
See original GitHub issueDiscussed in https://github.com/sse-secure-systems/connaisseur/discussions/371
Implement verification against multiple trust roots in the policy. Could be done by for example making the trust_root key in the policy a list:
- pattern: "docker.io/my-app/*:*"
validator: my-validator
with:
trust_root: ["vulnerability-scanner","qa-scanner"]
This could be extended by a required key to enforce some signatures or a threshold to set a minimum of signatures present
Issue Analytics
- State:
- Created 2 years ago
- Reactions:1
- Comments:7 (1 by maintainers)
Top Results From Across the Web
CONNAISSEUR - Verify Container Image Signatures in ...
Verifying the image signatures before deployment. Connaisseur aims to solve step two. This is achieved by implementing several validators, i.e. configurable ...
Read more >Verify Container Image Signatures in Kubernetes using Notary ...
Verify Container Image Signatures in Kubernetes using Notary or Cosign or both. Connaisseur v2.0 adds support for multiple keys and signature solutions.
Read more >Signing imgpkg Bundles with cosign - Carvel tools
Sign the container image after building; Copy the bundle (of images); Verify the image signatures before deployment.
Read more >Verify OCI Container Image Signatures in Kubernetes - sigstore
Enter Connaisseur and Cosign! Two persons signing and verifying documents as an illustration for the Cosign-Connaisseur interplay for. Photo by ...
Read more >TGI Kubernetes 174: Verifying Signed Images with Connaisseur
Join Pushkar with Christoph from SSE - Secure Systems Engineering GmbH, as we explore, why having signed images only is not enough.
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found

I quickly built an RC for testing. The respective branch is: https://github.com/sse-secure-systems/connaisseur/tree/debug-build/pr428-multi-signer Note: Here, the connaisseur image for testing is provided via my private docker repository.
A few notes on testing: The
helm/values.yamlcontains my test configuration to play around with. The essential lines are:There is some notes on how to use the new features. Essentially, you need to create a validator with multiple trust roots and corresponding keys. Multiple trust roots are then referred to in the
policyby settingpolicy[*].with.trust_root="*"which means that all trust roots of the specified validator will be considered for evaluation. Refined rules can then be specified viathresholdandrequiredflags:threshold: minimum number of trust root signatures required. Default is number of specified trust roots for validator (i.e. all trust roots must have signed).required: list of required trust roots amongst signatures. Default is none required. Both flags can be used in conjunction, i.e. enforce two specific signers but also at least 3 different signatures.Just to get started testing, feel free to use my sample images:
However, feel free to build your own testimages and play around with the new feature.
Please let me know in case you find any bugs or have recommendations for the interface or defaults 🙏
fyi: @tommyreilly @operatorequals
released 🚀 for more information, please check the docs: https://sse-secure-systems.github.io/connaisseur/v2.5.0/validators/sigstore_cosign/#multi-signature-verification