You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am trying to use AWS with KMS keys and cosign to sign images. If I understand the code correctly it would appear that when using AWS KMS keys, cosign first describes the key, then it will use the first signing algorithm returned back from the AWS DescribeKey API in the SigningAlgorithms array field.
This seems to have a few issues.
It just so happens to always be RSASSA_PKCS1_V1_5_SHA_256 as it is the first value in the DescribeKey response for all AWS KMS asymmetric keys with RSA 4096. This is widely regarded as insecure and AWS recommends using RSASSA_PSS_SHA256 as a default.
If AWS DescribeKey API changed the order of values in the SingingAlgorithms array (which is possible) it will change the default behavior of cosign.
Shouldn't there be an option to specifically request a signing algorithm given they at times become deprecated?
The text was updated successfully, but these errors were encountered:
Hello,
I am trying to use AWS with KMS keys and cosign to sign images. If I understand the code correctly it would appear that when using AWS KMS keys, cosign first describes the key, then it will use the first signing algorithm returned back from the AWS DescribeKey API in the SigningAlgorithms array field.
This seems to have a few issues.
RSASSA_PKCS1_V1_5_SHA_256
as it is the first value in the DescribeKey response for all AWS KMS asymmetric keys withRSA 4096
. This is widely regarded as insecure and AWS recommends using RSASSA_PSS_SHA256 as a default.SingingAlgorithms
array (which is possible) it will change the default behavior of cosign.The text was updated successfully, but these errors were encountered: