Cosign also has a format for doing this:
https://github.com/sigstore/cosign/blob/main/specs/SBOM_SPEC.md

(Different from the attestation i just sent)

On Mon, Aug 8, 2022 at 10:33 AM Brandon Lum via lists.spdx.org <lumb=
[email protected]> wrote:

> I've been signing and uploading them with sigstore as an intoto predicate,
> but not using the intoto specified spdx schema but instead pointing to a
> URI. Since sigstore has a limit on attestation size and this (point to a
> URI) also allows one to defer authorization of the blob to a storage server
> and point to a collection of documents.
>
> Still in draft, but this is a approximation of what we're using
>
> {
>   "_type": "https://in-toto.io/Statement/v0.1";,
>   "predicateType": "http://google.com/sbom";,
>   "subject": [
>     {
>       "name": "binary-linux-amd64",
>       "digest": {
>         "sha256":
> "f2e59e0e82c6a1b2c18ceea1dcb739f680f50ad588759217fc564b6aa5234791"
>       }
>     }
>   ],
>   "predicate": {
>     "sboms": [
>       {
>         "format": "SPDX",
>         "digest": {
>           "sha256":
> "02948ad50464ee57fe237b09054c45b1bff6c7d18729eea1eb740d89d9563209"
>         },
>         "uri": "
> https://github.com/lumjjb/sample-golang-prov/releases/download/v1.3/binary.spdx
> "
>       }
>     ],
>     // BuildMetadata is optional, but is used for provenance verification
> in the event SLSA
>     // provenance is not available. Specific to github actions workflow.
>     "build-metadata": {
>       "artifact-source-repo": "
> https://github.com/lumjjb/sample-golang-prov";,
>       "artifact-source-repo-commit":
> "c8cb5f292c77064aeabb488ea4f5e483a5073076",
>       "attestation-generator-repo": "
> https://github.com/lumjjb/slsa-github-generator-go";,
>       "attestation-generator-repo-commit":
> "6948f4c67f6bca55657fe1fb3630b55b1714ef2d"
>     }
>   }
> }
>
>
>
> On Mon, Aug 8, 2022 at 7:51 AM Steve Kilbane <[email protected]>
> wrote:
>
>> May as well throw out a plug for https://openssf.org/, and for
>> https://www.sigstore.dev/ in particular, here.
>>
>>
>>
>> A recent* Open Source Summit session gave an example of signing SBOMs
>> using sigstore, if I recall correctly, though I don’t recall the details.
>>
>>
>>
>> steve
>>
>>
>>
>> * I say “recent” – could have been SupplyChainSecurityCon back in
>> October. My sense of Time is out of whack since the pandemic.
>>
>>
>>
>> *From:* [email protected] <[email protected]> *On Behalf Of *Dick
>> Brooks
>> *Sent:* 08 August 2022 12:42
>> *To:* [email protected]
>> *Subject:* Re: [spdx] SPDX Signing #spdx
>>
>>
>>
>> *[External]*
>>
>>
>>
>> Sandeep,
>>
>>
>>
>> I’m not aware of any specific guidelines for signing SBOM’s (SPDX and
>> CycloneDX).
>>
>>
>>
>> REA’s signs SBOM’s using PGP as this seems to be the easiest method to
>> sign stand-alone text files, including SBOM’s.
>>
>> We simply have to make our public key available for verification of
>> signed SBOM’s.
>>
>>
>>
>> The IETF is working on a new supply chain integrity, transparency and
>> trust initiative (SCITT) that aims to produce a method for signing and
>> verifying attestations, including SBOM’s.
>>
>> https://github.com/ietf-scitt
>> <https://urldefense.com/v3/__https:/github.com/ietf-scitt__;!!A3Ni8CS0y2Y!4N9uapTCXw9gUs-kVzTBgUrjudnlPjyWrYWtbfex3pjTQ0nXeeMY7iQm6hoX1mC5Ynsxux3AmkB2j4A-lkH8Jgzuw-gYbw$>
>>
>>
>>
>> Thanks,
>>
>>
>>
>> Dick Brooks
>>
>>
>>
>> *Active Member of the CISA Critical Manufacturing Sector, *
>>
>> *Sector Coordinating Council – A Public-Private Partnership*
>>
>>
>>
>> *Never trust software, always verify and report!
>> <https://urldefense.com/v3/__https:/reliableenergyanalytics.com/products__;!!A3Ni8CS0y2Y!4N9uapTCXw9gUs-kVzTBgUrjudnlPjyWrYWtbfex3pjTQ0nXeeMY7iQm6hoX1mC5Ynsxux3AmkB2j4A-lkH8JgxR-WKtyQ$>*
>> ™
>>
>> http://www.reliableenergyanalytics.com
>> <https://urldefense.com/v3/__http:/www.reliableenergyanalytics.com/__;!!A3Ni8CS0y2Y!4N9uapTCXw9gUs-kVzTBgUrjudnlPjyWrYWtbfex3pjTQ0nXeeMY7iQm6hoX1mC5Ynsxux3AmkB2j4A-lkH8JgzVvd9jEw$>
>>
>> Email: [email protected]
>>
>> Tel: +1 978-696-1788 <(978)%20696-1788>
>>
>>
>>
>> *From:* [email protected] <[email protected]> *On Behalf Of *Patil,
>> Sandeep via lists.spdx.org
>> *Sent:* Monday, August 8, 2022 7:08 AM
>> *To:* [email protected]
>> *Subject:* [spdx] SPDX Signing #spdx
>>
>>
>>
>> Hi All,
>> Is there any guidelines to sign SPDX file ?
>>
>> Regards
>> Sandeep
>>
>> 
>
>


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#1583): https://lists.spdx.org/g/spdx/message/1583
Mute This Topic: https://lists.spdx.org/mt/92889362/21656
Mute #spdx:https://lists.spdx.org/g/spdx/mutehashtag/spdx
Group Owner: [email protected]
Unsubscribe: https://lists.spdx.org/g/spdx/leave/2655439/21656/1698928721/xyzzy 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to