#cosign

:hacker_p: :hacker_f: :hacker_t:pft@infosec.exchange
2025-06-13

I don't suppose that trusting #sigstore to run a centralized CA and transparency logs just to issue short-lived certs for me to generate signatures is much more secure than #PGP signing using my own keys. I'm just increasing the attack surface...

The whole Googlesque philosophy of "trust us; don't be evil" is contrary to my take on information security.

But I'm also open to anyone convincing me otherwise.

#cosign #rekor #flucio

2025-05-28

Back from a multi-day-long rabbit hole:
kasseapparat now builds multi-arch images using Docker Bake, with labels, annotations, and SBOMs – all signed and attested via Cosign in GitHub Actions.
Took way more test builds than expected 🤯. Now back to the fun part: building software.
#DevOps #Cosign #SBOM #MultiArch #GitHubActions

mgorny-nyan (on) :autism:🙀🚂🐧mgorny@pol.social
2024-12-30

#SigStore rzekomo: ma wiele klientów i jest łatwe w użyciu.

Rzeczywistość:

#Cosign domyślnie używa (starego?) formatu podpisu, którego najwyraźnej klient Pythonowy w ogóle nie obsługuje. Trzeba podawać `--new-bundle-format`, żeby dostać podpisy zgodne z innymi klientami.

Przy weryfikacji też trzeba podawać `--new-format`. W przeciwnym wypadku, otrzymamy zupełnie niejasny komunikat:

Error: bundle does not contain cert for verification, please provide public key

No i oczywiście znaleźć jakiekolwiek informacje jest kosmicznie trudno. Odkryłem, jak to się robi tylko dlatego, że kojarzyłem, że kiedyś na forum Pythona był na ten temat wątek, i ktoś rzucił przykładem, jak weryfikować wydania CPythona za pomocą tego wynalazku.

mgorny-nyan (he) :autism:🙀🚂🐧mgorny@treehouse.systems
2024-12-30

#SigStore claim: it has multiple clients and it's easy to use.

Reality:

#Cosign defaults to using a bundle format that doesn't seem to be supported by SigStore-python at all. You have to explicitly pass `--new-bundle-format` to create compatible signatures.

You also have to explicitly pass `--new-format` when verifying. Otherwise, Cosign will give you a completely confusing message:

Error: bundle does not contain cert for verification, please provide public key

And of course it's quite hard to find any information on this. I've realized it only because I recalled a SigStore-related thread on discuss.python.org, and a single example of using Cosign to verify CPython signatures was given there.

George Pearkespeark.es@bsky.brid.gy
2014-07-23

INBOX: it's a great day for economics #cosign

Simon Josefssonjas@fosstodon.org
2024-12-04

We have Sigstore `cosign` tool in Debian's NEW queue! Please help test #sigstore #cosign lists.debian.org/debian-go/202

#somf wud go pro #cosign RT @ThatBlackman10: #IfSexWasASport the word "whore" and all its variations would be replaced with the word athlete

Wiktor Kwapisiewiczwiktor@metacode.biz
2024-10-23

Yeah, but then you'd run your own closed instance that wouldn’t be trusted by others and you’re back to square one of identifying which key is trusted. The system works best if everyone trusts Google, Microsoft and Github. I guess you can run your own instance in a closed corporate setting (like a custom CA) but it wouldn’t give any benefits for the wider ecosystem.

That’s how I see it, happy to be corrected by someone more intimately associated with sigstore.

2024-10-23

All these web applications handling end-to-end encryption of user content (think @protonprivacy, @cryptpad, or even Whatsapp web) have a common flaw: the user needs to trust the javascript sent by the web servers of the provider. This situation defeats the purpose of E2EE because the point of doing encryption in the user agent is precisely that the provider does not need to be trusted.

For some reason, signed javascript has never been a thing. No transparency program (like cosign), no key commitment, no nothing. Weird. Sad and weird.

The most frequent solutions to this problem is to not use web pages: publish a mobile app, a desktop client or a web browser extension.

I've been thinking about it for a while now, and the "solution" I came up with is to use IPFS.

IPFS uses content addressing, meaning the address of a file is a hash of the content of the file. Every time you request a specific address, you get the same file. If you store that address in your bookmarks, then you are sure that you are using a specific version of the web content. If that web content is a web application (frontend) and all resources referenced in that web application are either linked using IPFS content addresses or linked via the "traditional web" with SRI hashes, then you have an integrity-verified web application.

Put that IPFS content address in a transparency program, and you have a publicly auditable log of the javascript served by the providers.

So, my request to @cryptpad and @protonprivacy is: could you please publish your frontend on IPFS?

#javascript #cosign #e2ee #ipfs

Ryan is so gay 🖥️🚲🍺🏳️‍🌈redrummy@ohai.social
2024-09-20

@Elleaster #CoSign, blue in Alaska. XO

Derek | ScriptAutomatescriptautomate@fosstodon.org
2024-09-08

Wondering whether users of #cosign (by #sigstore) and #slsa (slsa-verifier) would have opinions on how to best make use of these verification tools when downloading binaries for use in container images?

I started a StackOverflow discussion here with more details, since I'm new to playing around with these toolchains:

stackoverflow.com/beta/discuss

2024-07-21

Updated the #veilid rpm repo path for my container. Nice to see that we now have a nightly build as well ! If you are looking for a #veilid #container with a public build pipeline, signed with #cosign and auto released every sunday.

Checkout github.com/chimbosonic/veilid-.

Container images are uploaded to #dockerhub and #quay.io

Thor A. Hoplandhopland@snabelen.no
2024-06-28

@patric and #Wolfi apparently uses #Cosign Wooo! That's perfect, because I am actually working on a type of container registry :)

It's still a glmmer in the postmans eye, but it will be spitting out containers - and signing is so important nowadays, especially when you read about security breaches like with #Polyfill

Shout outs to #Cloudflare for just redirecting all that traffic to a safe #CDN. Credit where credit is due.

2024-05-31

#cosign and #crane in #opensuse will get shell completion subpackages soon. SRs sent...

Timothée Raviersiosm@floss.social
2023-12-20

Signed container images with buildah, podman and cosign via GitHub Actions: tim.siosm.fr/blog/2023/12/20/s

Explaining how I signed the Toolbx and Distrobox container images (github.com/toolbx-images/image) and the ones in my personal namespace on Quay.io (github.com/travier/quay-contai) using cosign.

#GitHub #cosign #sigstore #podman

2023-11-30

Does anyone use sigstore to sign tar archives of released software? I'm not signing docker images, ELFs, EXEs, DMGs, etc, just a regular tar archive generated by git archive and uploaded to GitHub as a release artifact.
#sigstore #cosign

devguy :verified:developerguy@hachyderm.io
2023-10-13

🔐 Want to understand the journey of becoming a Sigstore Evangelist and contributing to open-source security?

🌟💻📖 Explore my article "𝑯𝒐𝒘 𝒕𝒐 𝒃𝒆𝒄𝒐𝒎𝒆 𝒕𝒉𝒆 𝒏𝒆𝒙𝒕 𝑺𝒊𝒈𝒔𝒕𝒐𝒓𝒆 𝑬𝒗𝒂𝒏𝒈𝒆𝒍𝒊𝒔𝒕?" and uncover the fascinating history and insights.
blog.sigstore.dev/how-to-becom

#openSource #sigstore #cosign #opensourcesecurity

devguy :verified:developerguy@hachyderm.io
2023-10-11

🚀 Exciting News! We've just released a new blog post!

📝 In this article, we explore the world of software supply chain security, offering insights into how to safeguard the integrity of your binaries and container images using two powerful tools! ⚡️

💃 Dive into the capabilities of SLSA provenances for enhanced security.💻

👏 A big shoutout to @furkanturkaI and @caarlos0 for their invaluable contributions!

goreleaser.com/blog/slsa-gener

#SLSA #DevSecOps #OpenSource #goreleaser #slsaverifier #cosign 🌟

Caleb Woodbine 🎺🐛calebwoodbine@mastodon.nz
2023-09-21

Gave a lightning talk on Sigstore's policy controller over at the Wellington OpenShift meetup today

Here's a link to the slides!

blog.calebwoodbine.com/present

#wellington #sigstore #openshift #securesoftwaresupplychain #cosign

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst