Skip to content

Support Time-stamping #838

@yizha1

Description

@yizha1

Is your feature request related to a problem?

Signature validation will fail if signing key/certificates are expired. In this case, signers need to rotate the key/certificates in time and re-sign container images using new key/certificates. The lifetime of a signature is limited by the lifetime of a corresponding signing key/certificate.

What solution do you propose?

Time-stamping (https://www.rfc-editor.org/rfc/rfc3161) extends the trust of signature beyond the validity period of a certificate, thus signers do not need to regularly re-sign images before certificates are expired. RFC 3161 said that Time-stamping helps establish whether the image was signed before or after the certificate was compromised. However, in the real world, the compromised time is not the time of certificate revocation. The compromised time is not determined. So, the proposal is to not use Time-stamping for revocation scenarios.

What alternatives have you considered?

Currently Notation does not support Time-stamping, so signers need to regularly rotate the key/certificates in time and re-sign container images using new key/certificates. However, this process requires signers to establish a re-sign workflow, which leads to usability problems and waste of resources.

Any additional context?

There is an existing issue in roadmap repo, however this repo is not in active mode.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    Status

    Done

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions