Signing service details
Backend overview
There is a debusine.signing
application, which is a separate Django
application under the debusine
project with its database models routed
to a separate database, such that it can run on a separate system from the
debusine server and workers. It uses Django primarily for its database
facilities: there is initially no need for it to have its own server
component, although it may eventually be useful to add one for things like
reading audit logs.
This application has a worker, reusing most of the existing
debusine.worker
code. It sends metadata to the server indicating that
it is a Signing worker, and that it requires
HTTPS connectivity to the server. debusine-admin manage_worker
only
manages signing workers if given the --worker-type signing
option, to
avoid enabling them by accident.
Signing tasks are scheduled similarly to worker tasks, and are required to use the public API to interact with artifacts in the same way that worker tasks do, but they only execute on signing workers. Signing workers do not take tasks of any other type.
Todo
Specify how to configure keys to be used with a YubiKey.
Each successful generate
and sign
operation adds a row to an
append-only audit log table.
Database models
Each key has a row with the following fields:
purpose
: the purpose of this key (e.g.uefi
for UEFI Secure Boot) different key purposes typically require different tools to generate them or sign data using themfingerprint
: the key fingerprint; keys are unique by purpose and fingerprintprivate_key
: a protected representation of the private keypublic_key
: the public key, as binary datacreated_at
,updated_at
: timestamps for creation and update
HSM key availability
If keys are stored in a hardware security module such as a YubiKey, then
they may not be available to all signing workers. A worker can add the list
of such keys it supports to its dynamic metadata, and then the
can_run_on
method of the relevant tasks can check that metadata to avoid
dispatching requests to workers that do not have access to the relevant
keys.
Security Model
Key Creation:
Sysadmins can generate HSM-keys, outside Debusine.
Sysadmins can import HSM keys into Debusine.
Sysadmins can generate keys in Debusine.
In the future, we expect key generation (of some sort, but it may as well be HSM) to be a routine part of creating a workspace that holds a repository. Probably delegated by a workflow, once #634 has landed.
While artifacts may be created by any user with contributor access to a workspace, assets can only be created by administrators or certain tasks (e.g. key generation).
Unlike artifacts, which have permissions applied by the containing workspace, Assets have permissions directly associated with them, that can be altered by their owner.
Asset’s permissions may be tied to workspaces. Roles are defined on an (asset, workspace) pair. There could, in the future, be optional extra JSON restrictions attached to a permission for defence-in-depth.
Signing Key Assets:
Signing key assets are used to manage the security of signing keys. They contain the fingerprint, purpose, and public part of the key.
The
GenerateKey
task will create a signing key asset.The
GenerateKey
task can be directly executed by scope owners.The
GenerateKey
task may be incorporated in workflows.In the future, the execution of the
GenerateKey
task may be unrestricted.
Signing:
The
Sign
task may be incorporated into workflows. The workflow creator can then specify the signing key to be used.Sign
tasks are permitted to execute if the user running the task has theSIGNER
role on the asset (via a group membership) in the workspace that the task is executing in.Sign
tasks should not be dispatched unless the user is permitted to use the given signing key.The signing service makes API requests back to the Debusine server to make permission determinations, as a final check.
In the future, once we have more comprehensive permissions for workflows, we may grant permission to execute a
Sign
task if the workflow was created and blessed by a user who has permission to use a given signing key. See #634.
Automated Signing:
When we have APT repositories implemented, it will be necessary for
Sign
tasks to be triggered periodically, by Debusine, without any user linked to the request.These Signing Key Assets for these repositories will have a permission granting the
SIGNER
role to the workspace hosting the repository, without any associated group.
Todo
Add more precise details of how this is recorded.