-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doc: create notation threat model #242
Conversation
Looking at the threat model, I believe we need to update it with the following information:
|
Some more thoughts about the threat model... We should split the File System into separate storages: Cert Store, Configuration Store, Policy Store, and Plugin Store. Each one of those can be exploited separately depending on the level of File System access of the user (because those are in different directories). |
I will update it to make it clear. There are different directories, but they are owned by the same user. We don't support system level configuration yet. |
@toddysm PTAL the latest updates. I haven't split the file system yet and will do it later. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
media/notation-verify-local.png
is missing a Step 2?- should there also be a remote verify example with a plugin?
|
the example plugin here has a |
@priteshbandi @byronchien @JeyJeyGao Please check whether the flow diagram of "verifying remote artifacts using plugin" is correct. I am not sure whether plugin should read trust store instead of notation. |
In fact, notation verification plugin can verifiy both local and remote artifacts. Also notation plugin doesn't need to read notation trust store, but there is no limitation that plugin is forbidden to read it, that is to say, whether to read the notation trust store depends on the plugin implementation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In media/notation-sign-local.png
there are two step 6s ("Read certificate bundle file" and "Return signature and certificates").
i'm also not 100% clear on what happens in the "Read certificate bundle file" step. if the plugin is retrieving keys/certs for signing, should the source be specified as certificate/key storage rather than just file system?
I will fix the duplicated number |
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
@priteshbandi resolved all the comments and added new threats except the following one: I still didn't get the point, since it is expected behavior as the normal expire/revoked, right?
|
nit: |
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
Signed-off-by: Yi Zha <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added some comments.
Signed-off-by: Yi Zha <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Updates:
Signed-off-by: Yi Zha [email protected]