Update artifact signing key management process

Now that the SKS keyserver network is no more, and there's no
convenient way to share third-party key signatures, we need to
adjust our key management and rollover process accordingly.

Change-Id: I7008706aae06b6e4a16db2dd85a8c7f91530cd50
This commit is contained in:
Jeremy Stanley 2021-10-26 19:41:28 +00:00
parent 867675d13d
commit 738f42760a

View File

@ -5,14 +5,14 @@
Signing System
##############
Our standard signing automation leverages an OpenPGP signing subkey,
encrypted as a Zuul secret, to create detached signatures for
release artifacts (tarballs, wheels, et cetera) and to sign and push
Git tags as part of our managed release automation. The master key
corresponding to this subkey is replaced near the start of each new
development cycle and set to expire soon after the cycle is
scheduled to conclude (with enough overlap to allow for graceful
replacement).
Our standard signing automation model leverages an OpenPGP signing
subkey, encrypted as a Zuul secret, to create detached signatures
for release artifacts (tarballs, wheels, et cetera) and to sign and
push Git tags as part of managed release automation. For OpenStack's
releases, the master key corresponding to this subkey is replaced
near the start of each new development cycle and set to expire soon
after the cycle is scheduled to conclude (with enough overlap to
allow for graceful replacement).
At a Glance
@ -23,49 +23,44 @@ At a Glance
<https://opendev.org/openstack/project-config/src/branch/master/zuul.d/secrets.yaml>`_
:Roles:
* `add-gpgkey
<https://docs.openstack.org/infra/zuul-jobs/roles.html#role-add-gpgkey>`_
<https://docs.openstack.org/infra/zuul-jobs/general-roles.html#role-add-gpgkey>`_
* `sign-artifacts
<https://docs.openstack.org/infra/zuul-jobs/roles.html#role-sign-artifacts>`_
<https://docs.openstack.org/infra/zuul-jobs/general-roles.html#role-sign-artifacts>`_
Key Management Overview
=======================
The signing system is implemented as a set of Zuul v3 jobs; these
The signing system is implemented as a set of Zuul jobs; these
utilize the signing subkey via an encrypted Zuul secret imported
into a job's ``~/.gnupg/secring.gpg`` at runtime. It's used by jobs
to create detached signatures of release artifacts and to sign Git
tags under release management automation.
tags in release management automation.
Storage
-------
While the signing subkey is installed unencrypted on some job nodes,
so that it can be used unattended by job automation, the
corresponding master key is kept symmetrically encrypted in the root
home directory of the Infra systems management bastion instead. At
the time of key creation a revocation certificate is also generated,
for which Infra root sysadmins are encouraged to retrieve and keep
local copies in case control over or access to the original master
key is lost. In the future, the master key and revocation
certificate may be distributed across our root team rather than kept
in one place (for example using Shamir's secret sharing scheme
similar to what `the Debian Project does for its archive keys
<https://ftp-master.debian.org/keys.html>`).
so that it can be used unattended by job automation, for OpenStack
the corresponding master key is kept symmetrically encrypted in the
root home directory of the Infra systems management bastion. At the
time of key creation a revocation certificate is also generated, for
which sysadmins are encouraged to retrieve and keep local copies in
case control over or access to the original master key is lost.
Rotation
--------
The master key is rotated at the start of each development cycle
(usually shortly after cycle-trailing deliverables are released),
signed by a majority of Infra root sysadmins before being put into
service, and has an expiration date set for a month after the end of
the targeted development cycle. The newly-created key gets signed by
the old, and this signature pushed to the public keyserver network.
New key fingerprints are also submitted to the openstack/releases
repository, for publication on the releases.openstack.org Web site.
For OpenStack, the master key is rotated at the start of each
development cycle (usually shortly after cycle-trailing deliverables
are released), signed by the previous key before being put into
service, and has an expiration date set for at least a month after
the end of the targeted development cycle (or best guess, often
longer for safety). New key fingerprints are also submitted to the
openstack/releases repository, for publication on the
releases.openstack.org Web site.
Revocation
@ -93,25 +88,10 @@ our management bastion host::
# installed both the gnupg and gnupg-curl packages. Set your umask
# to 077, create a /root/signing.gnupg directory and place this
# configuration file in it.
#
# Retrieve and validate the HKPS key for the SKS keyservers this way:
#
# wget -P ~/signing.gnupg/ \
# https://sks-keyservers.net/sks-keyservers.netCA.pem{,.asc}
# gpg --homedir signing.gnupg --recv-key \
# 0x94CBAFDD30345109561835AA0B7F8B60E3EDFAE3
# gpg --homedir signing.gnupg --verify \
# ~/signing.gnupg/sks-keyservers.netCA.pem{.asc,}
#
# You'll need to list them in the accompanying dirmngr.conf file.
# Receive, send and search for keys in the SKS keyservers pool using
# HKPS (OpenPGP HTTP Keyserver Protocol via TLS/SSL).
keyserver hkps://hkps.pool.sks-keyservers.net
# Ignore keyserver URLs specified in retrieved/refreshed keys
# so they don't direct you to update from non-HKPS sources.
keyserver-options no-honor-keyserver-url
keyserver hkps://keys.openpgp.org
# Display key IDs in a more accurate 16-digit hexidecimal format
# and add 0x at the beginning for clarity.
@ -122,28 +102,10 @@ our management bastion host::
list-options show-uid-validity
verify-options show-uid-validity
And this is the content of the ``/root/signing.gnupg/dirmngr.conf`` file on
our management bastion host::
# Set the path to the public certificate for the
# sks-keyservers.net CA used to verify connections to servers in
# the accompanying gpg.conf file.
hkp-cacert /root/signing.gnupg/sks-keyservers.netCA.pem
Generation
----------
Key generation should happen reasonably far in advance of expiration
of the old key (at least a month), so as to provide ample time for a
majority of our root sysadmins to attest to the key and provide
warning to the rest of the community of the upcoming transition. Of
course, if this is being done to replace a revoked key, this
timeline should be accelerated as much as possible to provide
continuity of service so use your best judgement on a balance of
sufficient attestation and warning (same-day turnaround is
preferred).
Make sure we start with a restrictive umask so that files and
directories we write from this point forward are only accessible by
the root user:
@ -356,7 +318,14 @@ separately:
.. code-block:: shell-session
root@bridge:~# gpg --homedir signing.gnupg --send-keys 0x120D3C23C6D5584D
sending key 0x120D3C23C6D5584D to hkps server hkps.pool.sks-keyservers.net
gpg: sending key 0x120D3C23C6D5584D to hkps://keys.openpgp.org
Check the infra-root inbox (the address associated with the key) for
a notification about the key upload to keys.openpgp.org and follow
the URL within it. Once there, click the button to send a
verification message. Now check the inbox again and follow the URL
provided in the new message which should arrive. Once that's done,
the key will be searchable on the keyserver.
The rest of this process shouldn't happen until we're ready for the
signing system to transition to our new key. In a typical,
@ -373,7 +342,7 @@ GnuPG directory:
root@bridge:~# umask 077
root@bridge:~# mkdir temporary.gnupg
root@bridge:~# gpg --homedir signing.gnupg \
> --output temporary.gnupg/secret-subkeys
> --output temporary.gnupg/secret-subkeys \
> --export-secret-subkeys 0xC0224DB5F541FB68\!
root@bridge:~# gpg --homedir temporary.gnupg \
> --import temporary.gnupg/secret-subkeys
@ -408,8 +377,11 @@ from the master key) must be reset to an empty string in the new
temporary copy. Here we override the default pinentry mode to
loopback as a workaround for other pinentry frontends refusing to
accept an empty passphrase (unfortunately the prompting and feedback
from the loopback pinentry leaves something to be desired). This is
again done using an interactive key editor session:
from the loopback pinentry leaves something to be desired). Note
that the first password prompt will be for the original key's
password, but the second password prompt should be left blank thus
removing that password. This is again done using an interactive key
editor session:
.. code-block:: shell-session
@ -457,7 +429,7 @@ as a secret to Zuul for use by release jobs.
root@bridge:~# wget https://opendev.org/zuul/zuul/raw/branch/master/tools/encrypt_secret.py
root@bridge:~# python3 encrypt_secret.py --tenant openstack \
> --infile temporary.gnupg/for-zuul --outfile temporary.gnupg/zuul.yaml \
> https://zuul.openstack.org openstack/project-config
> https://zuul.opendev.org openstack/project-config
writing RSA key
Public key length: 4096 bits (512 bytes)
Max plaintext length per chunk: 470 bytes
@ -483,9 +455,8 @@ public master key:
.. code-block:: shell-session
root@bridge:~# ( gpg --fingerprint \
> 0x120d3c23c6d5584d6fc2464664dbb05acc5e7c28
> gpg --armor --export-options export-clean,export-minimal \
root@bridge:~# ( gpg --fingerprint --list-sigs \
> 0x120d3c23c6d5584d6fc2464664dbb05acc5e7c28 ; gpg --armor \
> --export 0x120d3c23c6d5584d6fc2464664dbb05acc5e7c28 ) > \
> 0x120d3c23c6d5584d6fc2464664dbb05acc5e7c28.txt
@ -501,89 +472,18 @@ of the prior key as the start date for the new one).
Attestation
-----------
We need a majority (if not all) of our current root sysadmins to
verify and attest to the authenticity of our artifact signing key,
because it represents a system maintained by our team rather than
representing some particular individual and so anyone else attesting
to this key can really only do so transitively through us. This
should be done soon after a new key is minted (preferably the same
week) so that others in the community who wish to extend the web of
trust around the key based on our attestations (for example, release
managers or team leads) have an opportunity to do so before it's put
into production.
Since the collapse of the SKS keyserver network, no popular
keyservers publish third-party key signatures any longer (the
pollution thereof was a big part of SKS's downfall). As such, until
something like a caff-style signature approval mechanism is
integrated into the OpenPGP keyserver infrastructure or some
alternative comes along, there's little point in generating our own
individual key signatures we can't easily distribute to users. For
now, we simply make sure the signature made by the previous key is
included in the export we publish from our own sites so that users
can have some path to confirm new keys.
Start by logging into the management bastion and examining the
fingerprint of the key as it exists on disk:
.. code-block:: shell-session
me@bridge:~$ sudo gpg --homedir /root/signing.gnupg --fingerprint \
> --list-keys "OpenStack Infra (Some Cycle)"
pub ed25519/0x120D3C23C6D5584D 2016-07-07 [expires: 2017-02-02]
Key fingerprint = 120D 3C23 C6D5 584D 6FC2 4646 64DB B05A CC5E 7C28
uid [ultimate] OpenStack Infra (Some Cycle) <infra-root@openstack.org>
sub cv25519/0x1F215B56867C5D9A 2016-07-07 [expires: 2017-02-02]
sub ed25519/0xC0224DB5F541FB68 2016-07-07
Now on your own system where your OpenPGP key resides, retrieve the
key, compare the fingerprint from above, and if they match, sign it
and push the signature back to the keyserver network:
.. code-block:: shell-session
me@home:~$ gpg2 --recv-keys 0x120D3C23C6D5584D
gpg: requesting key 0x120D3C23C6D5584D from hkps server hkps.pool.sks-keyservers.net
gpg: key 0x120D3C23C6D5584D: public key "OpenStack Infra (Some Cycle) <infra-root@openstack.org>" imported
gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model
gpg: depth: 0 valid: 3 signed: 31 trust: 0-, 0q, 0n, 0m, 0f, 3u
gpg: depth: 1 valid: 31 signed: 46 trust: 30-, 0q, 0n, 0m, 1f, 0u
gpg: next trustdb check due at 2016-11-30
gpg: Total number processed: 1
gpg: imported: 1
me@home:~$ gpg2 --fingerprint 0x120D3C23C6D5584D
pub ed25519/0x120D3C23C6D5584D 2016-07-07 [expires: 2017-02-02]
Key fingerprint = 120D 3C23 C6D5 584D 6FC2 4646 64DB B05A CC5E 7C28
uid [ full ] OpenStack Infra (Some Cycle) <infra-root@openstack.org>
sub cv25519/0x1F215B56867C5D9A 2016-07-07 [expires: 2017-02-02]
sub ed25519/0xC0224DB5F541FB68 2016-07-07
me@home:~$ gpg2 --sign-key 0x120D3C23C6D5584D
pub ed25519/0x120D3C23C6D5584D created: 2016-07-07 expires: 2017-02-02 usage: SC
trust: unknown validity: full
sub cv25519/0x1F215B56867C5D9A created: 2016-07-07 expires: 2017-02-02 usage: E
sub ed25519/0xC0224DB5F541FB68 created: 2016-07-07 expires: never usage: S
[ full ] (1). OpenStack Infra (Some Cycle) <infra-root@openstack.org>
pub ed25519/0x120D3C23C6D5584D created: 2016-07-07 expires: 2017-02-02 usage: SC
trust: unknown validity: full
Primary key fingerprint: 120D 3C23 C6D5 584D 6FC2 4646 64DB B05A CC5E 7C28
OpenStack Infra (Some Cycle) <infra-root@openstack.org>
This key is due to expire on 2017-02-02.
Are you sure that you want to sign this key with your
key "My Name <me@example.org>" (0xAB54A98CEB1F0AD2)
Really sign? (y/N) y
+-----------------------------------------------------------------------+
| Please enter the passphrase to unlock the secret key for the OpenPGP |
| certificate: |
| "My Name <me@example.org>" |
| ID 0xAB54A98CEB1F0AD2, |
| created 2008-09-10. |
| |
| |
| Passphrase **********************____________________________________ |
| |
| <OK> <Cancel> |
+-----------------------------------------------------------------------+
me@home:~$ gpg2 --send-keys 0x120D3C23C6D5584D
gpg: sending key 0x120D3C23C6D5584D to hkps server hkps.pool.sks-keyservers.net
Also, please retrieve a copy of the
Still, please retrieve a copy of the
``/root/signing.gnupg/some.revoke.asc`` fallback revocation
certificate (``some`` to be replaced with the lower-cased release
name) from the management bastion and keep it stashed somewhere