Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provenance verification for Kata agent binaries #2119

Closed
mkulke opened this issue Oct 14, 2024 · 1 comment
Closed

Provenance verification for Kata agent binaries #2119

mkulke opened this issue Oct 14, 2024 · 1 comment
Labels
podvm Related to podvm images security Security Vulnerability

Comments

@mkulke
Copy link
Collaborator

mkulke commented Oct 14, 2024

At the moment we're not able to verify the provenance of the kata-agent binaries that we consume as part of the build, i.e. we have to trust that there's no unexpected bins in the oci registry under the tag that we consume.

Short term solution:

Pin to oci digest, verify provenance manually when bumping the versions.

Long term solution:

Implement provenance generation in the kata oci publish process and verify it as part of the podvm image build process

@mkulke mkulke added security Security Vulnerability podvm Related to podvm images labels Oct 14, 2024
@mkulke
Copy link
Collaborator Author

mkulke commented Oct 22, 2024

fixed by #2074

@mkulke mkulke closed this as completed Oct 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
podvm Related to podvm images security Security Vulnerability
Projects
None yet
Development

No branches or pull requests

1 participant