Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test root key rotation when threshold of keys rotate #505

Open
jku opened this issue Jan 11, 2025 · 2 comments
Open

test root key rotation when threshold of keys rotate #505

jku opened this issue Jan 11, 2025 · 2 comments

Comments

@jku
Copy link
Member

jku commented Jan 11, 2025

I'm not sure if this works currently:

  • root signers remain the same
  • but their keys (ubikeys) change

in this case we should ask the signers to sign with both old and new keys but I think that might not happen. This does work if the new key is "owned" by a different signer

@jku
Copy link
Member Author

jku commented Jan 16, 2025

The way this should work is likely:

  • when we find out if a signature is needed, create a list of keys that
    • are owned by this user
    • should sign
  • when signing, we should ask user to insert specific key (and maybe check that the correct key is inserted)
    • how we describe the correct key to the user is a bit of a problem: keyid is useless
    • securesystemslib does have some support for this: "hsm:2?label=YubiKey+PIV+%2315835999" can be used to load a signer for a specific pkcs label
    • l'm not sure if we want to store the label in the public metadata or just in a client cache (we currently don't store it anywhere): Store signing key details in a signer application cache #66

@jku
Copy link
Member Author

jku commented Jan 16, 2025

also relevant #50

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant