-
Notifications
You must be signed in to change notification settings - Fork 782
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proxy: Add OpenImageWithRequiredSignatures
#1829
Comments
Just to reply quickly, some unorganized thoughts: My first thought: And would the caller of this API then have an override toggle to disable this, for debugging and troubleshooting? If so, is that so much different from allowing The RHEL default … but then the OpenShift default is https://github.com/openshift/machine-config-operator/blob/9c6c2bfd7ed498bfbc296d530d1839bd6a177b0b/templates/worker/01-worker-container-runtime/_base/files/policy.yaml . So… that just wouldn’t work as is. The specially-designed system that uses For some use cases, running If the goal is to specifically use the system-wide policy, however it was configured, but force the user to set the policy up to be enforcing, yes, that would be a new feature. (It might be possible to do that externally to c/image, but that would run into TOCTOU issues if we assume a concurrently-managed Implementation-wise, adding a new option to Another question: Should this reject |
Kind of, but really a more important goal here for me is to create a "speed bump" for anyone doing custom derived images from their own registries and to strongly encourage signing in some form. In case you didn't see, just recently: https://blog.lightspin.io/aws-ecr-public-vulnerability
Hmm. Yes, I think arguably bootc should support But it's very much also a feature that bootc reads the standard container configuration in general - particularly things like
This is how I did it today actually, see the code in https://github.com/ostreedev/ostree-rs-ext/blob/main/lib/src/container/skopeo.rs which is definitely too ugly to live much longer -
Fair - does the above seem convincing?
I was thinking it's just about rejecting |
That’s a good point. OK, let’s do this. |
Looking at |
See containers#1829 (comment) This is prep for adding another option like `require-signatures`.
See containers#1829 (comment) This is prep for adding another option like `require-signatures`. Signed-off-by: Colin Walters <[email protected]>
See containers#1829 (comment) This is prep for adding another option like `require-signatures`. Signed-off-by: Colin Walters <[email protected]>
See containers#1829 (comment) This is prep for adding another option like `require-signatures`. Signed-off-by: Colin Walters <[email protected]>
A friendly reminder that this issue had no activity for 30 days. |
/lifecycle frozen |
A friendly reminder that this issue had no activity for 30 days. |
Not sure what |
A friendly reminder that this issue had no activity for 30 days. |
In the bootc/ostree-container effort, I am trying to enforce signatures being enabled by default. The thing is, we kind of say that e.g.
podman run <some image from docker hub or whatever>
is "secure" - in the sense I'm using the word, we can and do fix security problems we find (mostly in the kernel) in a relatively timely fashion.But booting a container (or running with
--privileged
as well as some more subtle options) completely change that.As part of the proxy, I'd like to add an
OpenImageWithRequiredSignatures
API that requires that the remote image is signed in some way configured incontainers-policy.json
- IOW that the policy for fetching the image does not fall through toinsecureAcceptAnything
.(I think it would make sense to also add
podman pull --sigpolicy=required
or so)When I looked at this, it seemed feasible but would require some changes in c/image. Let me know if you have any thoughts.
The text was updated successfully, but these errors were encountered: