Skip to content

Latest commit

 

History

History
236 lines (175 loc) · 14.4 KB

verify.md

File metadata and controls

236 lines (175 loc) · 14.4 KB

notation verify

Description

Use notation verify command to verify signatures associated with artifacts stored in OCI compliant registries. Signature verification succeeds if verification succeeds for at least one of the signatures associated with the artifact. Upon successful verification, the output message is printed out as follows:

Successfully verified signature for <registry>/<repository>@<digest>

Tags are mutable and a tag reference can point to a different artifact than that was signed referred by the same tag. If a tag is used to identify the OCI artifact, the output message is as follows:

Warning:  Always verify the artifact using digest(@sha256:...) rather than a tag(:v1) because resolved digest may not point to the same signed artifact, as tags are mutable.
Successfully verified signature for <registry>/<repository>@<digest>

A signature can have user defined metadata. If the signature for the OCI artifact contains any metadata, the output message is as follows:

Successfully verified signature for <registry>/<repository>@<digest>

The artifact was signed with the following user metadata.

KEY    VALUE
<key>  <value>

Outline

Verify signatures associated with the artifact.

Usage:
  notation verify [flags] <reference>

Flags:
  -d,  --debug                       debug mode
  -h,  --help                        help for verify
       --insecure-registry           use HTTP protocol while connecting to registries. Should be used only for testing
       --max-signatures int          maximum number of signatures to evaluate or examine (default 100)
       --oci-layout                  [Experimental] verify the artifact stored as OCI image layout
  -p,  --password string             password for registry operations (default to $NOTATION_PASSWORD if not specified)
       --plugin-config stringArray   {key}={value} pairs that are passed as it is to a plugin, if the verification is associated with a verification plugin, refer plugin documentation to set appropriate values
       --scope string                [Experimental] set trust policy scope for artifact verification, required and can only be used when flag "--oci-layout" is set
  -u,  --username string             username for registry operations (default to $NOTATION_USERNAME if not specified)
  -m,  --user-metadata stringArray   user defined {key}={value} pairs that must be present in the signature for successful verification if provided
  -v,  --verbose                     verbose mode

Usage

Pre-requisite: User needs to configure trust store and trust policy properly before using notation verify command.

Configure Trust Store

Use notation certificate command to configure trust stores.

Configure Trust Policy

Users who consume signed artifact from a registry use the trust policy to specify trusted identities which sign the artifacts, and level of signature verification to use. The trust policy is a JSON document. User needs to create a file named trustpolicy.json under {NOTATION_CONFIG}. See Notation Directory Structure for {NOTATION_CONFIG}.

An example of trustpolicy.json:

{
    "version": "1.0",
    "trustPolicies": [
        {
            // Policy for all artifacts, from any registry location.
            "name": "wabbit-networks-images",                         // Name of the policy.
            "registryScopes": [ "localhost:5000/net-monitor" ],       // The registry artifacts to which the policy applies.
            "signatureVerification": {                                // The level of verification - strict, permissive, audit, skip.
                "level": "strict"
            },
            "trustStores": [ "ca:wabbit-networks" ],                  // The trust stores that contains the X.509 trusted roots.
            "trustedIdentities": [                                    // Identities that are trusted to sign the artifact. It only includes identities of `ca` and `signingAuthority`.
                "x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder"
            ]
        }
    ]
}

An example of trustpolicy.json with RFC 3161 timestamp verification support:

{
    "version": "1.0",
    "trustPolicies": [
        {
            "name": "wabbit-networks-images",
            "registryScopes": [ "localhost:5000/net-monitor" ],
            "signatureVerification": {
                "level": "strict",
                "verifyTimestamp": "afterCertExpiry"                                   // Only verify timestamp countersignatures if any code signing certificate has expired. DEFAULT: `always`
            },
            "trustStores": [ "ca:wabbit-networks", "tsa:wabbit-networks-timestamp" ],  // To enable timestamp verification, trust store type `tsa` MUST be configured.
            "trustedIdentities": [
                "x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder"
            ]
        }
    ]
}

For a Linux user, store file trustpolicy.json under directory ${HOME}/.config/notation/.

For a MacOS user, store file trustpolicy.json under directory ${HOME}/Library/Application Support/notation/.

For a Windows user, store file trustpolicy.json under directory %USERPROFILE%\AppData\Roaming\notation\.

Example values on trust policy properties:

Property name Value Meaning
name "wabbit-networks-images" The name of the policy is "wabbit-networks-images".
registryScopes "localhost:5000/net-monitor" The policy only applies to artifacts stored in repository localhost:5000/net-monitor.
registryScopes "localhost:5000/net-monitor", "localhost:5000/nginx" The policy applies to artifacts stored in two repositories: localhost:5000/net-monitor and localhost:5000/nginx.
registryScopes "*" The policy applies to all the artifacts stored in any repositories.
signatureVerification "level": "strict" Signature verification is performed at strict level, which enforces all validations: integrity, authenticity, authentic timestamp, expiry and revocation.
signatureVerification "level": "permissive" The permissive level enforces most validations, but will only logs failures for revocation and expiry.
signatureVerification "level": "audit" The audit level only enforces signature integrity if a signature is present. Failure of all other validations are only logged.
signatureVerification "level": "skip" The skip level does not fetch signatures for artifacts and does not perform any signature verification.
trustStores "ca:wabbit-networks" Specify the trust store that uses the format {trust-store-type}:{named-store}. The trust store is added using notation certificate add command.
trustStores "ca:wabbit-networks", "ca:rocket-networks" Specify two trust stores, each of which contains the trusted roots against which signatures are verified.
trustedIdentities "x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Finance, CN=SecureBuilder" User only trusts the identity with specific subject. User can use notation certificate show command to get the subject info.
trustedIdentities "*" User trusts any identity (signing certificate) issued by the CA(s) in trust stores.

User can configure multiple trust policies for different scenarios. See Trust Policy Schema and properties for details.

Verify signatures on an OCI artifact stored in a registry

Configure trust store and trust policy properly before using notation verify command.

# Prerequisites: Signatures are stored in a registry referencing the signed OCI artifact
# Configure trust store by adding a certificate file into trust store named "wabbit-network" of type "ca"
notation certificate add --type ca --store wabbit-networks wabbit-networks.crt

# Create a JSON file named "trustpolicy.json" under directory "{NOTATION_CONFIG}".

# Verify signatures on the supplied OCI artifact identified by the digest
notation verify localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

An example of output messages for a successful verification:

Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

Verify signatures on an OCI artifact with user metadata

Use the --user-metadata flag to verify that provided key-value pairs are present in the payload of the valid signature.

# Verify signatures on the supplied OCI artifact identified by the digest and verify that io.wabbit-networks.buildId=123 is present in the signed payload
notation verify --user-metadata io.wabbit-networks.buildId=123 localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

An example of output messages for a successful verification:

Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

The artifact is signed with the following user metadata.

KEY                         VALUE
io.wabbit-networks.buildId  123

An example of output messages for an unsuccessful verification:

Error: signature verification failed: unable to find specified metadata in any signatures

Verify signatures on an OCI artifact identified by a tag

A tag is resolved to a digest first before verification.

# Prerequisites: Signatures are stored in a registry referencing the signed OCI artifact
# Verify signatures on an OCI artifact identified by the tag
notation verify localhost:5000/net-monitor:v1

An example of output messages for a successful verification:

Warning:  Always verify the artifact using digest(@sha256:...) rather than a tag(:v1) because resolved digest may not point to the same signed artifact, as tags are mutable.
Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

Verify signatures with RFC 3161 timestamp countersignature on an OCI artifact

# Prerequisites: Configure TSA trust store by adding the root certificate of the trusted TSA into trust store named "wabbit-network-timestamp" of type "tsa"
notation certificate add --type tsa --store wabbit-networks-timestamp wabbit-networks-tsa.crt

# Verify signatures on an OCI artifact
notation verify localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

An example of output messages for a successful verification:

Successfully verified signature for localhost:5000/net-monitor@sha256:b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

[Experimental] Verify container images in OCI layout directory

Users should configure trust policy properly before verifying artifacts in OCI layout directory. According to trust policy specification, registryScopes property of trust policy configuration determines which trust policy is applicable for the given artifact. For example, an image stored in a remote registry is referenced by "localhost:5000/net-monitor:v1". In order to verify the image, the value of registryScopes should contain "localhost:5000/net-monitor", which is the repository URL of the image. However, the reference to the image stored in OCI layout directory doesn't contain repository URL information. Users can set registryScopes to the URL that the image is supposed to be stored in the registry, and then use flag --scope for notation verify command to determine which trust policy is used for verification. Here is an example of trust policy configured for image hello-world:v1:

{
    "name": "images stored as OCI layout",
    "registryScopes": [ "local/hello-world" ],
    "signatureVerification": {
        "level" : "strict"
    },
    "trustStores": [ "ca:hello-world" ],
    "trustedIdentities": ["*"]
}

To verify image hello-world:v1, user should set the environment variable NOTATION_EXPERIMENTAL and use flags --oci-layout and --scope together. for example:

export NOTATION_EXPERIMENTAL=1
# Assume OCI layout directory hello-world is under current path
# The value of --scope should be set base on the trust policy configuration
notation verify --oci-layout --scope "local/hello-world" hello-world:v1