Skip to content

[root v12] yubikey updates #1406

@jku

Description

@jku

(I'm using the "root v11" label to make sure this gets discussed but I don't think we need to rush with this.)

I believe ysa-2024-03 affects some or all yubikeys used in sigstore root-signing. An attacker could duplicate elliptic curve signing keys on these yubikeys. The factors that makes this less severe are

  • attacker needs the PIN
  • attacker needs physical possession of the yubikey
  • attacker needs specialized equipment

My opinion is that we should phase out current keys but that it is not critical to do it right now. Potential fixes that can be done during a root signing event:

  • Switch to a non-affected algorithm (ed25519 or RSA) -- knowing that this could affect client compatibility
  • Switch to yubikeys with firmware >= 5.7.0 -- this seems like the better choice

Issues to keep in mind:

  • tuf-on-ci root key rotation may need a bit of work if threshold of keys change at once (but the signer identities remain same): this is a tricky case where signatures from both old and new keys are required test root key rotation when threshold of keys rotate theupdateframework/tuf-on-ci#505 and likely has not been fully implemented for this specific case
  • An alternative may be to only change less than threshold keys at a time

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions