-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
reconsider threshold (aka multi-sig) verification #55
Comments
go-securesystemslib does not seem to implement this either |
IIUC you are saying that signature verification (multi or single) should not be part of the DSSE protocol?
Why would it require checking payload type and deserializing the payload?
I think that's a question of scope. The wish to log and audit all signatures in the envelope seems fair, but it is not necessarily the responsibility of the threshold sig verification routine. |
That is the question I'm presenting -- not really saying I know better after just a little contact with the spec
This is part of the multi-sig verification algorithm in the protocol:
But that means I will have to implement the multi-sig verification to do it... and then I'm left wondering why I would use the multi-sig verification provided by the dsse envelope at all. |
Wait no: Single signature verification certainly does make sense in the Envelope. It's the threshold verification (aka multi-sig verification) I'm asking about |
Oh, you are right. I don't think this is meant to be part of the signature verification routine. FWIW, those two steps are also the last two steps in the general (single-sig) protocol.
I think the spec could say something like... CAN break once threshold is reached |
Yeah, but you are making the argument with key (owner) semantics, which I agree, are not in the scope of DSSE. |
oh, I am not suggesting adding any new new mechanisms to DSSE! I was giving an example some system (other than TUF or intoto) might want to create on top of DSSE. Being able to verify if a specific key has signed the payload makes sense as an Envelope feature, but I'm questioning why a specific higher level algorithm (like multi-sig verification) would be included. |
While reviewing the (python) securesystemslib implementation I was a little unhappy with the multi-sig verification:
Thoughts?
The text was updated successfully, but these errors were encountered: