-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make ECDSA key parsing more flexible #426
Conversation
The code works fine against Sigstore's I tried to understand what is going on, but I couldn't understand it :( I'm using a local build of the tuftool download \
-m https://sigstore-tuf-root.storage.googleapis.com \
-t https://sigstore-tuf-root.storage.googleapis.com/targets \
--allow-root-download \
sigstore-tuf-root |
tough/src/schema/decoded.rs
Outdated
|
||
impl Decode for EcdsaFlex { | ||
fn decode(s: &str) -> Result<Vec<u8>, Error> { | ||
match spki::decode( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would do stricter pattern-matching to be safe:
If I seem the PEM header, I will decode PEM. If I see the hex encoding, I will decode it as such. Otherwise, error out. Makes sense?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, I was just trying to get something quick put together... My goal would be to understand why none of the keys can successfully verify the contents of the file :(
Great start, thank you! Not sure why the signature verification is failing, but I'm sure it's missing some cryptographic parameters. Have you tried looking at the go-tuf implementation? |
I've made the following experiment:
Everything worked as expected, the Go program was able to verify the signature produced by the Rust library. If you want I can share the code of the programs. Now, I know this testing something slightly different: we should produce a signature with Go, verify that with Rust. However I didn't have the time to look into how go-tuf is producing the signature. However, I find reassuring to see everything work as expected out of the box. I'm getting really lost on this issue, any help? 🙏 |
I'm sure it's something really small/silly, but I don't have enough time to look into this. Let me see what @asraa and I can do with some downtime... |
Thank you for working on this! Are we sure that eagerly trying both encodings does not introduce a security risk? For this sort of interoperability functionality it would be great to see a test repository, created by the incompatible go-tuf implementation, added to here https://github.com/awslabs/tough/tree/develop/tough/tests/data and a test added here: https://github.com/awslabs/tough/blob/develop/tough/tests/interop.rs This might aide your development cycles as well since it should serve as a red/green testing scenario. |
Agreed, which is why I recommended that we try only one encoding depending on the format. |
I just tried the reverse check, where I created a ecdsa signature with go-tuf (underlyingly using crypto/ecdsa SignASN1) and it verified properly with I'm skeptical now that the message isn't being canonicalized the same way before checking signature validation. |
Thanks for having looked into that!
I'm starting to have doubts too about that. I've recently used the olpc-cjson crate of tough while verifying a cosign bundle returned by Rekor and it worked. Dunno if Rekor is using the same canonicalization code as go-tuf... |
Nope, the bundle is just a normal marshalled json struct. The TUF code is using a cjson canonicalizer package, for the metadata Edit: the easiest way for me to test this is to disable any funky indentations we do to make the json nice and see if tuftool can handle a go-tuf generated manifest |
Yes, but then |
Cool, I'm totally new to TUF and its tooling. It would be great if you could look into that. If not, let me know and I'll experiment :) |
Probably not |
2ebe167
to
f06b7a2
Compare
@trishankatdatadog, @asraa : I finally figured out what is causing tough to choke on Sigstore's TUF reposotory. The root file is violating the TUF specification. All the date-time objects have been serialized using RFC 3339, which includes the timezone information.
This is what the Sigstore TUF repository root file has inside of it: "expires": "2021-12-18T13:28:12.99008-06:00" The tough crate deserializes this data into a series of Rust structs, which are rightfully using a Later, the Rust structs are serialized, during this step the date time object becomes: "expires": "2021-12-18T19:28:12.990080Z", The document produced during this process is then used to verify the validity of the signatures of the trusted keys. The document signed by the Sigstore maintainers is different from the one the Rust client verifies due to this different formatting of the date-time objects. As a result, none of the signatures is verified -> the download stops. I did a quick fix to address this issue (see commit f06b7a2). With this patch I can successfully use the tuftool download -m 'https://sigstore-tuf-root.storage.googleapis.com/' -t 'https://sigstore-tuf-root.storage.googleapis.com/targets' --allow-root-download sigstore-tuf-root`
=================================================================
WARNING: Downloading root.json to /home/flavio/hacking/sigstore/tough/tuftool/1.root.json
This is unsafe and will not establish trust, use only for testing
=================================================================
Downloading targets to "sigstore-tuf-root"
-> fulcio_v1.crt.pem
-> ctfe.pub
-> fulcio.crt.pem
-> artifact.pub
-> rekor.pub However, I think my fix is not needed. The problem must be fixed inside of the Sigstore TUF repository. This PR now includes two commits:
|
Joshua also pointed this out, this was fixed in the next v2 root (see https://github.com/sigstore/root-signing/blob/9a627a0fc51c202868e0ea10b74007fa4b9e9416/repository/repository/2.root.json#L27). Why does expiration verification need to happen on 1.root.json? Also I'm sorry that you were still working on this! It turns out that also the signature verification was fixed in v2 and other issues for tuftool sigstore/root-signing#51 EDIT: I think we will always need to pin trust on the initial root being 2.root.json for rust since the sign verification won't work anyway on 1.root.json. This works without any patch when I was testing v2 root signing.
|
Correct: you should ignore expiration of any interim roots... |
Agree: this is the simplest fix for now: to bundle v2 with any tough-based client that will fetch/verify targets. |
I wonder if we are still going to have issues based on different precisions in fractions of a second, e.g.
What you quoted from the specification might imply that fractions of a second must not be included, but it doesn't say that explicitly. I think it makes sense to remove the time serialization changes from this PR and to focus on the ECDSA decoding issue. This may preclude us from adding an interoperability test as I recommended in this PR until the time format issues are addressed. |
Might be a good idea to clarify this in the spec either way. PRs are welcome! |
Hi everybody, I'm back from the End Year holidays and I'm ready to get back to this issue 💪 I've clarified the situation with @trishankatdatadog. The date format issues inside of the Sigstore TUF repositories have been sorted out (thanks @asraa !). My initial code works, but as @trishankatdatadog and @webern pointed out (see [1] and [2]), we should do things in a more secure way. Both @trishankatdatadog and @webern suggested to check the string and:
My initial thoughts have been:
I'm not convinced by both approaches. I fear they might not be secure... Do you have better recommendations? I could also change the current code like that:
Once this aspect is clarified I'll go ahead and implement the new code and extend the test suite as recommended by @webern |
This might not be necessary. Maybe you could do the starts_with check for PEM, and if it's not PEM then assume it is hexadecimal. Something didn't sit right with me (earlier) about trying, failing, and trying the other. But once you've determined that it's not PEM, we can assume it is hexadecimal and it won't parse as such if it would have failed a regex anyway. |
f06b7a2
to
2fb2030
Compare
@webern thanks for the feedback. I've updated the PR to reflect what you suggested. I've also added a new unit test covering this specific case. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The first thing I noticed is that, due to our trait definition, the information about what encoding was encountered is lost. This got me thinking about whether there is a general change that should be made to the trait to describe what encoding format was encountered. This led me to realize I don't know much about key encoding formats so I started poking around...
Then I thought, well I need to look at the spec, and... uh oh, It appears that:
ed25519
: PUBLIC :: 64-byte hex encoded string.ecdsa-sha2-nistp256
: PUBLIC :: PEM format and a string.
If I'm understanding things correctly, that means the root.json from your test case is not valid per the spec because it states ecdsa-sha2-nistp256
and uses a hex encoding.
I apologize for missing this earlier, but are we trying to make the tough
library accept root.json files that are not formed correctly per the specification?
Here's the section that I'm looking at:
I guess the spec also says that
adopters can define and use any particular keytype, signing scheme, and cryptographic library
but I would interpret that to mean that you can create new keytype
strings, not that you can use an existing keytype
differently than what the spec defines.
Help me out here if I'm behind the curve! Thanks.
No, it means that you are free to redefine to use different schemas for the proposed If this is unclear or undesirable, please do open a PR upstream (cc @lukpueh @joshuagl) |
Good catch, I didn't notice that.
That was not my intention.
As @trishankatdatadog suggested, I've submitted theupdateframework/specification#201 to shed some light on that. |
Actually per discussion in theupdateframework/specification#201, it sounds like the spec allows for your root.json to be considered valid. Did you create it with go-tuf? In general, is it go-tuf that we aim to interoperate with by making these changes? I'm in the |
Ok, this did at least reserialize the keys in their original hex encoding. I think I want to take it further though and have an example repository created by go-tuf, with targets and metadata, that we can load, add a target to, re-sign, then load with go-tuf. i.e. true interop. Let's chat about it via DM soon. fn hex_encoded_ecdsa_sig_keys() {
let path = test_data()
.join("hex-encoded-ecdsa-sig-keys")
.join("root.json");
let mut f = File::open(path).unwrap();
let root: Signed<Root> = serde_json::from_reader(f).unwrap();
println!("{}", serde_json::to_string_pretty(&root).unwrap())
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good @flavio, sorry it took me so long. The only recommended changes are to document the test's purpose and to re-use EcdsaPem::decode in EcdsaFlex::decode
Needs a |
2fb2030
to
5ad6f66
Compare
@webern I've rebased my PR against |
d6eb9ba
to
b6e4c0f
Compare
TUF specification suggests to encode ECDSA keys using PEM. This is the behaviour of the python reference implementation. However, `go-tuf` encodes the keys as Hex numbers. This commit makes the decoding of ECDSA keys more relaxed, the code will try to decode them as PEM strings and it will resort to Hex when the first decode fails. Signed-off-by: Flavio Castelli <[email protected]> Co-authored-by: Matthew James Briggs <[email protected]>
b6e4c0f
to
eb1bdb8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice 🚀
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks again for all the work on this!
👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks!
Spec is explicit about time formats ( this is not in the expiry sections themselves but it is in there):
This is very clear: timezones and microseconds are not allowed |
I created #447 for this. |
TUF specification suggests to encode ECDSA keys using PEM. This is the behaviour of the python reference implementation.
However,
go-tuf
encodes the keys as Hex numbers.This commit makes the decoding of ECDSA keys more relaxed, the code will try to decode them as PEM strings and it will resort to Hex when the first decode fails.