Hi All,

I am sure everyone has heard about the recent Solarwinds software supply chain attacks. This attack has made all software vendors think about securing their supply chain,  and it is even more applicable to linux distributions which are made of thousands of components built from sources they dont even have control over.

One possible step in this direction is the ability to ensure that there is no distribution point tampering of binaries shipped in Fedora.

rekor is a an immutable tamper resistant ledger of metadata generated within a software projects supply chain. Rekor will enable software maintainers and build systems to record signed metadata to an immutable record.

How would it work, would package maintainers need to be involved? Not really, this could be a post-build thing, in which ones the rpms reach stable and are signed, rekor would run on it and store the binary metadata in the transparency logs.

I just wanted to send out a email to fedora folks to get a feel of this and what you think, before really going into implementation or any other details.


More information at:

https://sigstore.dev/what_is_sigstore/

https://github.com/sigstore/rekor

--
Regards,

Huzaifa Sidhpurwala / Red Hat Product Security
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to