-
Couldn't load subscription status.
- Fork 73
Description
Technical Initiative
Sigstore
Lifecycle Phase
Graduated
Funding amount
$96,000
Problem Statement
Sigstore allows signers to audit how they sign artifacts such as binaries, containers and attestations, through inclusion of signatures in a public transparency log, an append-only and tamper-evident data structure, called Rekor. Rekor contains signatures and certificates for all publicly signed artifacts using Sigstore clients. These certificates include identities, such as emails or CI workload identities. A signer can monitor the log, periodically querying the log for new entries, to find entries that contain their identity and take steps to secure their identity if it has been unexpectedly found.
The ability to monitor the log is the log's primary benefit over traditional signing schemes. An ecosystem that uses transparency logs must provide tooling to simplify and encourage monitoring. A signature present in an unaudited log adds little value, rather the value comes from the discoverability of the signature by its creator.
The average user will not want to run a monitor themselves as this requires maintaining a service. The lack of a simple solution for monitoring a transparency log puts users at risk by not knowing that their identity has been compromised.
Who does this affect?
This problem impacts all Sigstore signers, and more broadly the entire Sigstore ecosystem and OSS registries that integrate with Sigstore as the integrity of its signers leads to secure artifact verification. This project focuses on the users that generate public Sigstore signatures, though this can also benefit private deployments as well.
Have there been previous attempts to resolve the problem?
The OpenSSF funded a technical initiative to improve and productionize sigstore/rekor-monitor, a tool for monitoring identities and keys. This tool can be run as both a service, which requires users to become service operators, and a GitHub Action, which is costly for the Sigstore project at scale due to the amount of entries downloaded from the log.
Why should it be tackled now and by this TI?
Building on the momentum of the previous OpenSSF TI-funded work to build a productionized monitor, we now want to make monitoring as simple as possible for our users.
Give an idea of what is required to make the funding initiative happen
We will implement a frontend for sigstore/rekor-monitor that offers monitoring for user-provided identities, along with any changes needed in sigstore/rekor-monitor to support this service, e.g. a storage backend. We will take inspiration from gopherwatch.org, an open source project for monitoring the Go checksum database.
Note that this request is not for long-term funding of the operation of the website and infrastructure. This is a one-time funding request for implementation. The community will take on the long-term operation of the monitor. This funding request will be the last request for Sigstore monitoring.
What is going to be needed to deliver this funding initiative?
Nothing additional is needed besides funding.
Are there tools or tech that still need to be produced to facilitate the funding initiative?
No additional work besides running the monitor is needed.
Give a summary of the requirements that contextualize the costs of the funding initiative
For 320 hours (2 months FTE) of work, this work will implement a user-friendly web frontend for rekor-monitor, including:
- A web frontend where users can subscribe to get alerts if one of their identities, repositories and/or packages is used in the transparency log.
- Any changes required in the backend (
rekor-monitor) for the correct functioning of the web service. - A release of the service in an easy-to-deploy configuration (e.g: using docker-compose) to make it easy for members of the community to run their own monitor services.
Who is responsible for doing the work of this funding initiative?
Facundo Tuesca, Trail of Bits
Who is accountable for doing the work of this funding initiative?
Hayden Blauzvern, Google and Sigstore community chair, and Facundo Tuesca, Trail of Bits
If the responsible or accountable parties are no longer available, what is the backup contact or plan?
The Sigstore TSC, sigstore/tsc#members
What license is this funding initiative being used under?
sigstore/rekor-monitor@main/LICENSE
Code of Conduct
- I agree to follow the OpenSSF's Code of Conduct
List the major milestones by date and identify the overall timeline within which the technical initiative plans to accomplish their goals. Any payments for services, sponsorships, etc., will require LF Legal and Financial review.
By the middle of Q1'26, the changes necessary to implement a website and any changes to rekor-monitor have been identified and scoped.
By the end of Q2'26, the website and backend have been implemented, along with a blog post on the work.
If this is a request for funding to issue a contract, then OpenSSF will issue that contract. Please provide a Statement of Work (SOW) that we may review. Any contracting action will take 4-6 weeks to issue.
SoW will be provided upon funding approval, which will include the above deliverables and milestones.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status