Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate: OpenSSF Best Practices Badges - Check if dockerhub and Git cryptographically signs our releases #162

Open
FredFousPro opened this issue Jul 8, 2022 · 2 comments

Comments

@FredFousPro
Copy link
Member

FredFousPro commented Jul 8, 2022

In order to fully validate the silver level of OpenSSF Best Practices Badges for our project and for security reasons, we have to check if dockerhub and Git cryptographically signs our releases.

Here are the requirement to meet:
The project MUST cryptographically sign releases of the project results intended for widespread use, and there MUST be a documented process explaining to users how they can obtain the public signing keys and verify the signature(s). The private key for these signature(s) MUST NOT be on site(s) used to directly distribute the software to the public. If releases are not intended for widespread use, select "not applicable" (N/A). [signed_releases]
The project results include both source code and any generated deliverables where applicable (e.g., executables, packages, and containers). Generated deliverables MAY be signed separately from source code. These MAY be implemented as signed git tags (using cryptographic digital signatures). Projects MAY provide generated results separately from tools like git, but in those cases, the separate results MUST be separately signed.

It is SUGGESTED that in the version control system, each important version tag (a tag that is part of a major release, minor release, or fixes publicly noted vulnerabilities) be cryptographically signed and verifiable as described in signed_releases. [version_tags_signed]

Here is the questionnaire :
https://bestpractices.coreinfrastructure.org/en/projects/5925?criteria_level=1

If it is a small issue; fix directly, if this is more work; create new Github issues.

@FredFousPro FredFousPro changed the title OpenSSF Best Practices Badges - Check if dockerhub cryptographically signs our releases OpenSSF Best Practices Badges - Check if dockerhub and Git cryptographically signs our releases Jul 8, 2022
@Sander3003 Sander3003 changed the title OpenSSF Best Practices Badges - Check if dockerhub and Git cryptographically signs our releases Investigate: OpenSSF Best Practices Badges - Check if dockerhub and Git cryptographically signs our releases Sep 21, 2022
@Sander3003
Copy link
Member

Todo: build infrastructure make it work

@Sander3003
Copy link
Member

@pascalwilbrink : We can generate checksums / sha's automatically via a GH action:

https://github.com/marketplace/actions/generate-checksum

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants