TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Sigstore – A new standard for signing, verifying and protecting software

118 pointsby decodebytesalmost 4 years ago

12 comments

andrewmcwattersalmost 4 years ago
Can I ask, is this a real, actual concern? Why do I need to sign and verify my software is my software? Why is a hash not sufficient integrity verification?<p>I have never heard of a good argument for this besides the Apple-esque control of remotely disabling the ability for software to run based on certificate authority, which is not a feature I&#x27;m interested in.<p>Further, I&#x27;d like to not see this as possible, since year after year more and more software companies seem to think they&#x27;re entitled to more and more.
评论 #28121979 未加载
评论 #28121989 未加载
评论 #28121581 未加载
评论 #28121555 未加载
评论 #28121545 未加载
评论 #28121559 未加载
评论 #28121568 未加载
est31almost 4 years ago
This is pretty cool and i think one of the good application areas of distributed ledger technology.<p>Signing is still a hard problem, even for established projects like Rust. Right now, rustup does not verify signatures in any way or form. The security is solely thanks to https and the S3 bucket not being compromised.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rustup&#x2F;issues&#x2F;2028" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rustup&#x2F;issues&#x2F;2028</a><p><a href="https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rustup&#x2F;issues&#x2F;2027" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rust-lang&#x2F;rustup&#x2F;issues&#x2F;2027</a>
评论 #28125636 未加载
评论 #28124385 未加载
mwcampbellalmost 4 years ago
As a hardening measure for production container or machine images, it would be good if code interpreters, including things like Python and Node.js but also shells, could be restricted to only accept source code that comes from a signed and verifiable bundle. That would mean no interactive mode, no running code supplied on the command line (meaning no shell injection vulns), and no support for eval or equivalent. But we wouldn&#x27;t have to go to the full trouble of using a distroless, shell-less image. Does anyone know of active work in this area?
评论 #28123438 未加载
alexeyoganezovalmost 4 years ago
I hope this feature will be completely optional. Code signing in every major OS (Windows, macOS, Android, iOS) is pure pain, you cannot distribute your own apps properly without obtaining a signature for 100$ (usually per OS, sometimes per year).
评论 #28122171 未加载
评论 #28122147 未加载
_dh54almost 4 years ago
&gt; It&#x27;s for open source maintainers, by open source maintainers.<p>&gt; Google<p>&gt; Red Hat (IBM)<p>Marketing in this manner is deceptive. Saying it’s “by and for” open source maintainers gives the impression this is a grass roots effort, when in reality this is a corporate initiative.
评论 #28124132 未加载
评论 #28131275 未加载
评论 #28122763 未加载
评论 #28123279 未加载
评论 #28123319 未加载
vhandaalmost 4 years ago
Would it be correct to say that &quot;Sigstore&quot; is only for containers and not all software?<p>I&#x27;m genuinely confused. Does this also apply to &quot;user-facing&quot; software such as CLI tools or GUIs?
评论 #28125653 未加载
atonsealmost 4 years ago
To me the most fascinating thing here apart from the idea of a software signing standard, was that I’ve never witnessed a remote key signing ceremony before.<p>I’m used to the root ones where they take laptops out of safes, etc.<p>But no reason why this can’t happen right?
tuananhalmost 4 years ago
with more and more enterprises adopting k8s, this space is going to be very interesting
terrycodyalmost 4 years ago
interesting project
toiletaccountalmost 4 years ago
My wishlist for embiggening package security:<p>Signed checksums of binaries baked into the package manager<p>Reproducible builds made dead-simple stupid-easy<p>Selinux&#x2F;sandboxing made more transparent and simple enough to use for mere mortals<p>Something like tripwire, by default (I think netbsd has this built in, but it&#x27;s not default)
评论 #28121981 未加载
myWindoonnalmost 4 years ago
What advantage does this have over a Nix&#x2F;Guix expression tree, which carries hashes for everything downloaded from the network already?
评论 #28123484 未加载
waynesonfirealmost 4 years ago
if this isn&#x27;t gpg based it can be easily ignored.
评论 #28125666 未加载