-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get NPM signing keys from @sigstore/tuf #647
base: main
Are you sure you want to change the base?
Conversation
e723302
to
b1df5fd
Compare
This comment was marked as resolved.
This comment was marked as resolved.
This change also does not check for key expiry. This requires some more investigation and I’ll tackle this in a follow-up change. |
This makes the bundle size go from 936.5kb to 2.4mb, do we actually need all that code? |
Maybe we could try patching EDIT: I've tried doing that, if we're fine getting rid of the diff --git a/dist/fetcher.js b/dist/fetcher.js
index f966ce1bb0cdc6c785ce1263f1faea15d3fe764c..cb361aafe39d48ffb1ce8fb0a909bcb958bec46f 100644
--- a/dist/fetcher.js
+++ b/dist/fetcher.js
@@ -6,7 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
exports.DefaultFetcher = exports.BaseFetcher = void 0;
const debug_1 = __importDefault(require("debug"));
const fs_1 = __importDefault(require("fs"));
-const make_fetch_happen_1 = __importDefault(require("make-fetch-happen"));
+const stream_1 = __importDefault(require("stream"));
const util_1 = __importDefault(require("util"));
const error_1 = require("./error");
const tmpfile_1 = require("./utils/tmpfile");
@@ -61,14 +61,13 @@ class DefaultFetcher extends BaseFetcher {
}
async fetch(url) {
log('GET %s', url);
- const response = await (0, make_fetch_happen_1.default)(url, {
- timeout: this.timeout,
- retry: this.retry,
+ const response = await globalThis.fetch(url, {
+ signal: this.timeout && AbortSignal.timeout(this.timeout),
});
if (!response.ok || !response?.body) {
throw new error_1.DownloadHTTPError('Failed to download', response.status);
}
- return response.body;
+ return stream.Readable.fromWeb(response.body);
}
}
exports.DefaultFetcher = DefaultFetcher;
|
config.json
Outdated
"keys": { | ||
"npm": [ | ||
{ | ||
"expires": "2025-01-29T00:00:00.000Z", | ||
"keyid": "SHA256:jl3bwswu80PjjokCgh0o2w5c2U4LhQAE57gj9cz1kzA", | ||
"keytype": "ecdsa-sha2-nistp256", | ||
"scheme": "ecdsa-sha2-nistp256", | ||
"key": "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE1Olb3zMAFFxXKHiIkQO5cJ3Yhl5i6UPp+IhuteBJbuHcA5UogKo0EWtlWwW6KSaKoTNEYL7JlCQiVnkhBktUgg==" | ||
}, | ||
{ | ||
"expires": null, | ||
"keyid": "SHA256:DhQ8wR5APBvFHLF/+Tc+AYvPOdTpcIDqOhxsBHRwC7U", | ||
"keytype": "ecdsa-sha2-nistp256", | ||
"scheme": "ecdsa-sha2-nistp256", | ||
"key": "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEY6Ya7W++7aUPzvMTrezH6Ycx3c+HOKYCcNGybJZSCJq/fd7Qa8uuAKtdIkUQtQiEKERhAmE5lMMJhP8OkDOa2g==" | ||
} | ||
] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't we keep this as a fallback?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure. This would only make a difference if fall back to them if we can’t fetch the sigstore keys. I’m a bit worried that this redundancy will obscure problems that, in the end, lead to the same problem as we have now.
This is because the fallback mechanism will break if a new key is added. This will not be announced and it will stay broken unless we maintain it. But we may not notice it is broken because the fallback is not triggered. So it looks like forever maintenance burden that doesn’t actually add that much.
Then again, I might be missing something. So maybe it would help to clarify what concrete problem this would solve
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well we would have tests for it, that's how we detected it this time around, I expect it would not be different next time
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok. Can you elaborate how we should do the fallback? Should we use the hard-coded keys when the TUF requests fails? Do we want to distinguish between different failures (i.e. network vs verification, etc.)? Or should we include the hard-coded keys in case they are missing from the returned from the TUF client?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMO the trust hierarchy should be:
- env (
COREPACK_INTEGRITY_KEYS
) - TUF
config.json
We should use the most trusted key set at our disposal, and hard fail only if signature doesn't match / the key is unknown (or known to be expired, but support for key expiry should be a separate PR IMO).
So a network issue should simply fallback to config.json
IMO, and not be reported to the user (or rather only with debugUtils.log
).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I gave this a bit more thought and I believe the extra keys will decrease the overall security by increasing the attack surface.
- If an attacker can compromise either of the keys they can trick into accepting forged signatures.
- If a key is compromised, it has to be revoked from both TUF and
config.json
.
The problem is that there is no trust hierarchy, either we accept signatures from a key or we don’t. Because trust is so important, my recommendation would be to limit the points of trust as much as possible and not include hard-coded keys.
To elaborate a bit on 1: In practice this probably does not make a huge difference because if somebody can compromise the hard-coded key in the source they can most likely also compromise the dependency code in the bundle.
From a usability perspective relying just on TUF is not a huge issue either, I believe. If it is a transient issue (i.e. network, service availability) we can provide a meaningful error an users can always retry later. This happens all the time and any user of npm
will be similarly affected. Any other issue is either an attack or a change in the signature mechanism. In the first case, we should fail. In the second case there will be a migration period, again npm
also has to phase out the mechanism.
In any case, the user can always workaround the issue by setting COREPACK_INTEGRITY_KEYS
.
What do you think? Does this make sense?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
2. If a key is compromised, it has to be revoked from both TUF and
config.json
.
Why would that be the case? It can be revoked only on TUF since it's up the trust hierarchy (that is, until Corepack is updated and config.json
contains up-to-date info)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why would that be the case? It can be revoked only on TUF since it's up the trust hierarchy (that is, until Corepack is updated and
config.json
contains up-to-date info)
I think we have to clarify first what the different options for the fallback mechanism are:
- If the TUF request is successful we use that as the key set, otherwise we use the hard-coded keys
- We use the union of the TUF key set and the hard-coded keys. If the TUF request fails we can only use the hard-coded keys.
I don’t know what the process for key revocation is exactly, since it is not documented. But from the implementation in npm
I assume a revoked key will be removed from keys.json
. If mechanism 2 is implemented we will still use the revoked key. If mechanism 1 is implemented an attacker just needs to interfere with the TUF connection so that it errors. (This is pretty easy with DNS poisoning, TCP reset attck, denial of service.) This will force corepack to downgrade and use the compromised hard-code keys.
I have the feeling that there is a good chance that we’ll make a mistake when implementing a fallback mechanism that leaves the system vulnerable. And the discussion seems to confirm that there are still a lot of open questions around this. I would prefer to follow best practices and rely on established systems instead of implementing a custom system.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Using a union would be a plain bad idea, it is not at all my suggestion. My suggestion is to fallback on the hard coded keys when TUF is not available – if TUF ever goes down, we shouldn't have to make emergency releases of Corepack; let's not replace a single point of failure with another single point of failure.
- Check the env
- If nothing on the env, check the TUF cache
- If it's expired or missing, download an updated version:
- If it fails, fallback on the old cache.
- If there's no cache, fallback on the hard coded keys.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok. I have to say that I disagree with this approach since it weakens security and you haven’t addressed the concerns about possible attacks. But I then again, it is not less secure than the current system. So I’ll defer the decision to you and will implement it as suggested.
That’s great. Would you like me to add this as a yarn patch? Or do you want to get this into |
I think we should add it as a Yarn patch. I can certainly send a PR their way (theupdateframework/tuf-js#849), but given it would be a major change for them, I don't think it would make sense for us to wait on them. |
Instead of hardcoding NPM signing keys for verification we get them from sigstore’s TUF repository. This is in line with how npm implements signature verification. Fixes nodejs#616, nodejs#612
f92cc3b
to
975fb2c
Compare
I’ve implemented the test and addressed all the feedback. This is ready for review now |
- timeout: this.timeout, | ||
- retry: this.retry, | ||
+ const response = await globalThis.fetch(url, { | ||
+ timeout: this.timeout && AbortSignal.timeout(this.timeout) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+ timeout: this.timeout && AbortSignal.timeout(this.timeout) | |
+ signal: this.timeout && AbortSignal.timeout(this.timeout) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed in db10011
As pointed out in theupdateframework/tuf-js#849 (review), we should think about proxy support in our patch (ideally using the same one as Corepack does) |
sources/npmRegistryUtils.ts
Outdated
debugUtils.log(`Using COREPACK_INTEGRITY_KEYS to verify signatures: ${keys.map(k => k.keyid).join(`, `)}`); | ||
return keys.map(k => ({ | ||
keyid: k.keyid, | ||
key: crypto.createPublicKey(`-----BEGIN PUBLIC KEY-----\n${k.key}\n-----END PUBLIC KEY-----`, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Creating the keys at this point seems like pure overhead, we only need the one key that matches the keyid in the package metadata (if it exists), why bother?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense. Fixed in db10011
Addressed in 3a2115e |
Co-authored-by: Mike McCready <[email protected]>
It looks like we can’t just use replayed responses for TUF request because |
Replay with mocked current time seems most aligned with the intention of the tests. |
Is this work ongoing or has it stalled? |
I’m working on rebasing this and fixing the last issues. I hope to get this done next week. |
Instead of hardcoding npm signing keys for verification we get them from sigstore’s TUF repository. This is in line with how npm implements signature verification.
Fixes #616, fixes #612
The implementation is ready to review, @aduh95. The only thing missing is a test for failed signature verification that does use
COREPACK_INTEGRITY_KEYS
. If you can think of more tests, let me know. I’m also not sure how the test setup works with regards to recording http requests.