Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merge PublicKeyDetails and KnownSignatureAlgorithms #212

Merged
merged 1 commit into from
Feb 2, 2024

Conversation

kommendorkapten
Copy link
Member

Summary

Merge the two messages to avoid confusion and drift.

Release Note

  • This update deprecates the deterministic ECDSA and existing RSA algorithms in PublicKeyDetails. New algorithms for RSA is added, see below for details. The new algorithms for RSA specifies both the hash algorithm used, and the bit length of the public modulus.
  • This update contains more algorithms in PublicKeyDetails
    • PKIX_RSA_PKCS1_2048_SHA256
    • PKIX_RSA_PKCS1_3072_SHA256
    • PKIX_RSA_PKCS1_4096_SHA256
    • PKIX_ECDSA_P384_SHA_384
    • PKIX_ECDSA_P521_SHA_512

Documentation

N/A

Copy link
Member

@woodruffw woodruffw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks @kommendorkapten!

I'll rebase #199 on top of this.

@woodruffw woodruffw merged commit 0d87737 into sigstore:main Feb 2, 2024
25 checks passed
PKIX_RSA_PSS = 4 [deprecated = true];
PKIX_RSA_PKCS1_2048_SHA256 = 9;
PKIX_RSA_PKCS1_3072_SHA256 = 10;
PKIX_RSA_PKCS1_4096_SHA256 = 11;
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@kommendorkapten Sorry, just reviewed - Can we keep the PSS variants?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Whoops, missed this as well. I can add those to #199, since I'm already modifying the file.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks. Do we also want to be pedantic about pkcs1 vs pkcs1v5? Also, should we support the pkcs1 encoded variants? sigstore/sigstore is able to unmarshal either pkix or pkcs1 encodings.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(moving convo over to 199)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, I could go either way on PKCS#1 vs. PKCS#1v1.5 -- I think it's common enough in practice to abbreviate the latter as the former. But specificity also wouldn't hurt.

In terms of encodings: I would lean towards the PKIX variants, since they're what appears in X.509. But maybe the trust root encodes them as PKCS1? I'm not sure 😅

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants