Software Signing for Kubernetes Supply Chain & Everybody Else

View Show Notes and Transcript

Episode Description

What We Discuss with Luke Hinds:

  • 00:00 Introduction
  • 05:31 What is the software supply chain and why is it important?
  • 08:56 Common supply chain attacks in Kubernetes
  • 10:48 The Codecov attack
  • 12:08 Kubernetes and API
  • 15:43 Vulnerability scanning tools
  • 18:44 Explaining the importance of supply chain security
  • 22:12 What is a signing service
  • 23:06 The SLSA framework
  • 23:59 Importance of signing service
  • 27:35 What is sigstore?
  • 32:43 Whats Lets Encrypt
  • 37:25 The aim of sigstore
  • 40:46 What is co sign?
  • 43:00 Co-Signing and non-repudiation
  • 54:25 Where to start
  • 58:24 The Fun Section

THANKS, Luke Hinds!

If you enjoyed this session with Luke Hinds, let him know by clicking on the link below and sending him a quick shout out at Linkedin:

Click here to thank Luke Hinds at Linkedin!

Click here to let Ashish know about your number one takeaway from this episode!

And if you want us to answer your questions on one of our upcoming weekly Feedback Friday episodes, drop us a line at ashish@kaizenteq.com.

Resources from This Episode

Luke Hinds 


Ashish Rajan: [00:00:00] If you wanted to make sure that the container used by the Kubernetes cluster that you’re running is coming from GitHub Repository, which is from your organization, how would you do that today? We tried solving this problem. In this episode with Luke Hinds from Red Hat. We spoke about a software signing open source project called Sigstore with multiple projects underneath it, one of them being co-signed. 


The conversation that I had with Luke Hinds was around the fact of why is it important to think about software supply chain in today’s day and age? If you are still wondering why we’re talking about software supply chain, you should think about log4j and it still gives me, jitters that it came through Christmas and a lot more happened nowadays, software supply chain is the primary. 


Topic that people are interested in because of log4j, because of SBOM, because of a lot more things that are found through open source vulnerabilities these days than actually, , the old good old fashioned pen to finding a vulnerable journey front door. So this was a really important topic that I wanted to bring over. 


If you are someone who’s trying to learn [00:01:00] about software, supply chain security in a kubernetes context, or maybe even a broader context for maintaining the chain of trust or the chain of custody for the software, from the origin of all the way to wherever you want to take it to kubernetes, the YAML file, whatever it may be, that’s the promise that sigstores planning. 


It is a free software, as I mentioned, and it can be used and easily set up by folks who want to use it. Cloud native community is definitely behind it. If anyone who’s trying to learn about signing software supply chain so they can have an insured chain of custody of the software that they’re building and improving. 


This is the episode for you. If someone else who’s doing it, please freely free to share this episode with them or share it on your LinkedIn or Twitter post or whatever you find that would be valuable for your friends and colleagues in the industry. Thank you for everyone who’s been sharing the previous episodes. 


Been really valuable. It makes us really proud to know that we are sharing something just valuable. And as always, if you are hanging around onto the iTunes and Spotify of the. If you can [00:02:00] drop a say, rating or review, that would be awesome. I would love you more for it. Probably give you a virtual hug or a real hug if I see you at one of the conferences because it really means a lot. 


Many people share and it really review or rating. It means that we get to help a lot more people. So thank you so much for doing that. Shilpi and I were also at Cyber Con, which was the Australian Cybersecurity Conference, and we were giving a talk about zero trust and software supply chain. So this was very poignant to have this conversation around this weekend. 


We are gonna release the talks later on in the year as a video as well, so we probably get to see that around. Oh, talking about video. By the way, you’re watching on Spotify, Do what? You can actually watch the video. Yes, you can actually watch, watch the video on Spotify if we actually have wanted to know that you’re wanting to watch a video while you’re doing your dishes or walking a dog. 


But in case if you wanted to do that, you can do that as well. I enjoy this episode with Luke Hinds 


Luke Hinds: when you’re developing an app, security might be treated as an afterthought with functionality, requirements and tight deadlines. 


It’s easy to accidentally write vulnerable code or use a vulnerable [00:03:00] dependency, but Snyk can help you secure your code in real time so you don’t need to slow down to build securely. Develop fast, stay secure. Good. Developer Snyk 


hey 


Ashish Rajan: Luke, welcome for coming the show. 


Luke Hinds: Hey, Ashish good to be here. Thank. 


Ashish Rajan: Oh my God, thank you so much. So just kick it off and I think I would be surprised if people don’t know you in the kubernetes space, but for the two or three people who don’t know you in that space 


tell us a bit about yourself and how’d you got your, where you are today, professionally? 


Luke Hinds: Yeah, sure. So I’ve been around open source for quite a while predominantly security. . And been part of many different communities over the years. Originally started in something called Open Stack, which was another sort of cloud type orchestration platform. 


Did security there for a while, done stuff around the Linux kernel different parts of the ecosystem. And I got involved with Kubernetes, I guess three to four years ago, I believe. And what I currently do is several gigs [00:04:00] really, that I have. So I’m part of the Kubernetes security response team. 


. So we’re a group of folks that, what we do is, Kubernetes has something called a Bug bounty program. So if somebody finds , a security risk of vulnerability, they can report it to this Bug Bounty program. And then if it proves to. , of a possible exploit, something that’s of risk to Kubernetes users. 


They’ll get some money. Essentially there’ll be some cash that’s given to them. And what we do is in the security response team, we sort of triage these security issues as they come in. So we look at, , is this actually exploitable? Mm-hmm , is this a real risk? And then if, if it is, we start to talk to developers and try to sort of work out a code fix and work with release management. 


The other stuff I do is sigstore, which has got quite a lot of attention recently. That’s a big part of the, the Kubernetes ecosystem. My sort of job, so to say is at Red Hat and there we do a lot of upstream work in various types of security [00:05:00] areas within, mostly around cloud native. 


So yeah, that’s generally sort of cloud native, but a lot of stuff around hardware trust as well. 


Ashish Rajan: and sigstore is the reason why I definitely wanted you to come on the podcast and have a conversation as well. So maybe before we kind of jump into the whole space about software signing and stuff, what’s the software supply chain and why is it important these days? 


That’s a good 


Luke Hinds: question. So consider any sort of supply chain. ? So let’s look at automobile manufacturing cars. ? So you’ll have your final product of a car that is sold to a consumer. But if you look at that car, then all the parts of that core car are sourced from different suppliers. 


? So you’ll have rubber manufacturers, you have a plantation, a rubber plantation somewhere. You’ll have , people that write design all of the, the circuitry, all of the embedded systems, all of these sort of brake monitoring systems. The engine, the iron, the steel, the aluminion, all of these parts are. 


Brought together to produce that [00:06:00] final artifact car. So you have this supply chain, and they’re all very reliant upon each other. , there’s a, I think they call it just in time manufacturing. So things have to arrive and the production line has to move. ? So if we think of a software supply chain, it’s very similar. 


? So what you do is typically a, a modern piece of software will ingest other software systems, typically, we’ll call them libraries or modules, ? To be able to allow them to build their software, ? These dependencies is another thing that we commonly use. So you have this source of developers, this kind of ecosystem of developers that all work on different projects. 


And then ultimately those will all be brought together into a. Single software project. . Right. And then that software will typically need to be in some sort of format that it can be released for, an end user. So that’s where you start to build container images [00:07:00] or, you start to compile binaries and so forth. 


So you start to see how you’ve got this sort of supply chain. . And then there’s other things. There’s various sort of, Actors that are involved in the supply chain. So just as we get the guy that supplies the rubber for the tires. . Yeah. And then the person that makes the tires within a supply chain, we have both humans and machines as well. 


So you have what we call build service. . docker, OCI registries, and , GitHub actions and Travis and Jenkins, there’s all these machines and there’s humans as well. So you have developers mm-hmm. , but write the code. And then you have people that review that code so you have more humans that are involved. 


And so that, that is the software supply chain. Essentially it’s this orchestration of all these components to ultimately produce an end product that is used by a, a user. So it’s very similar to a traditional manufacturing supply chain in a ways. 


Ashish Rajan: Right. So I [00:08:00] mean, I guess probably from an importance perspective, what are some of the common supply chain attacks? 


Cause I feel like to what you said, if it’s I guess a culmination of so many different components that are brought together in a systematic way so that we can, , do this magic software in front of us. Just so that people have a bit more context, what are some of the common supply chain attacks that maybe in a kubernetes context as well? 


Luke Hinds: Yeah, there’s a multitude of attacks and it, quite interestingly, if we go back to this analogy of machines and people mm-hmm. . The attack, the origin could be a, a human. . So it could be somebody could compromise my account. They might somehow get access to, let’s say I have like an identity provider type service that I use. 


I don’t, I’m not gonna pick on Google, but let’s use Google as an example. ? Sure. If somebody compromise my Google account mm-hmm. , and then I might use single sign on to get. Access to my GitHub account. ? And, and then so somebody could compromise my identity, ? Mm-hmm. , and then they could backdoor code. 


So that’s a sort of a human attack. Something else that we [00:09:00] see start to happen a lot more recently is what we call protest ware. So I’m, a software maintainer. I maintain an open source library. Something annoys me politically, or I wanna make a statement. So what I can do is I, I could compromise my own software so that it essentially is ingested by all these other systems, and then it causes draining of resources, , spikes a cpu, upper memory. 


And, and we’ve seen people do that, , for sometimes for understandable reasons to them. But it’s the impact that it has on people that are, , perhaps innocent to the cause that they’re protesting, . So, yeah, humans can be compromised and then, Machines can be compromised, build service can be compromised. 


That’s something that’s quite often is, , an access to , a machine is compromised. . Getting more into Kubernetes, a Kubernetes image or something like a Docker file could be compromised. That happened with, there was an attack there’s a piece of software called Codecov. . Yep. Cove is short for coverage. 


Mm-hmm. . So with [00:10:00] codecov, it essentially, it will look at your code and it will somehow establish your test coverage. Yeah. So when we write. Code for any software, but particularly Kubernetes. . You would make sure that the code you write has what we call unit testing. Yeah. So we can make sure that if somebody makes a change, they don’t break an existing piece of functionality. 


So this codecov it establishes what is your coverage for testing. . Yeah. And they had a docker file, an image that was exploited, and they changed like this bash script, which uploads the results and it started to leak secrets. . And so then we are moving into protecting of secrets. . So this is where people will use some form of token, to access a system. 


. Yeah. And it’s something quite widely that we use in, ci, your generator secret token. And if these are leaked, Into the hands of somebody that’s malicious and doesn’t have your best interest [00:11:00] at heart. They can use that token for their own means, . Yeah. So within Kubernetes, a lot of the attacks that we see are not so much around the periphery of build systems and people. 


It tends to be more the APIs that we have. Cause we run a lot of APIs and Kubernetes, right? There can be various attacks that can perform what we call a privilege escalation. Yep. And somebody could have a certain access control level. . A service account and they’re able to escalate. Another one is a denial service a lot. 


We see a lot of those. . Not many of them are exploitable. That’s the difference. But we see a lot. Attacks where somebody can just throw large data sets, extremely large YAML files at an api, and then the API will either become over constrained, it’s not able to function properly because the CPU usage is peaked up to 99, a hundred percent, or, or memory is flooded and so forth. 


Yeah. [00:12:00] Memory allocation is just completely maxed out. That’s one of them. And there is also container escapes. That’s another thing that can happen. So somebody’s able to get a bit more rare here. Somebody’s able to escape the confines of the container and access the host. So if you think about Kubernetes, you’ll have a host operating system. 


. And then containers will run on top of that host. Yep. And they have a level of security. Seclusion that’s meant to be in place , to separate the container from the host. . We use things like cgroups and this is principle and name spaces and Yeah. But somebody’s able to escape the container and access the host underneath. 


So that’s a kind of a lot of the attacks that we see around Kubernetes. But the kind of the wider supply chain attacks. Yeah, it’s lots of things. It can be typo squatting. It’s one that we see quite often. There might be a popular library in the [00:13:00] Python and ecosystem called widgets. 


. Yeah. And then somebody will perhaps change the eye for a one, so it looks like widgets. . And then somebody will download the wrong one, which is compromised. And other things that happen is They will abandon packages and then somebody will somehow manage to do a password reset on their account. 


Right. And compromise the package. People forget to renew domains, which are often used as , a way of getting a password reset. ? So if I run my own email system Yeah. And I forget to renew my domain, somebody else will register it and then do a password reset request Yeah. To the package providers system, and then they manage to compromise the account. 


So there’s a lot of different areas that a supply chain can be infiltrated. 


Ashish Rajan: So I think, cause that kind of leads to a question and I think similar question of what I was thinking about Vineet has thought about this as well. So first of all be was basically really happy with the [00:14:00] sca description analogy that you use. 


That was good. People asking a question around having vulnerability tools to scan docker images before production deployment helps or do recommend some extra controls. 


Luke Hinds: Anything extra is good. So to scanner an image to see what’s actually in there. . 


Mm-hmm. , what exploitable CVEs do you have? Any extra security controls are all good? I would say, I think , there is no silver bullet. . There is no killer single application that can provide security. , it’s the layers of security. I mean, there’s this quite old. 


Security principle that we don’t really say it so much now cuz network to topologies have changed, but we used to say defense in depth. . Yeah. So you build multilayers of defense comes originally from the military. If you had like somewhere where you had a gun, , Big gun, you would sort of put mines around the periphery and barb wire and then you would have folks on lookout with binoculars and you’d protect that, that area. 


? You’d have Oh, 


Ashish Rajan: why they have mines. Cause I’ve watched movies. They have the, Why do you have [00:15:00] mines when you already have guns? But, , To your 


Luke Hinds: point sense, it’s, if one system fails, you have another system. ? So, so very much when I’m talking away today, if I don’t mention vulnerability scanning doesn’t mean it’s not important. 


These are all important. , the more layers of security you can have, the better. Definitely. Yeah. 


Ashish Rajan: Yeah. Yeah. That’s awesome. Now thank you for that and hopefully the answer your question as well vineet feel free to ask me more question if you want. I think we kind of explain the common supply chain attacks. 


We also spoke about, I guess what it is, one more thing that I normally get asked by a lot of people is around the importance of it. And I think there’s whole. Conversation now that’s brewing after the whole log4j happened for a while where, hey, , how do I know what dependencies that I have are vulnerable open source. 


There was all these conversations about this. , I guess having been a developer before, like you have had a career at least some years in as a developer, how would you explain the importance of software supply chain to someone on the other end? Cause I think one of the struggles that has a lot of security people have is to [00:16:00] explain to a developer, Hey, cause you can’t just slap log4j on people’s face and go, Well this is the reason why you should have it. 


Like, why is it important? Like, , you use the example of codecov, which is great for coverage. Any developer, they were like, Oh yeah, I need, I wanna know how much coverage that I have for the unit test that I’m running. How do you explain the software supply chain signing thing to people? 


I guess why is it important for developers. , like from a security perspective, I mean, for people who are interested in sigstore, I guess, which is the service you’re gonna talk about, which is the open source service that you have for signing. So but my question is more around how do you normally explain to people why is it important? For the non converted, I guess. 


Luke Hinds: I guess there’s several avenues of approach there. , the first one is that being on the end of a successful exploit hack , is not pleasant at all. . It’s companies. Feel a lot of pain from this. Cause it’s their brand that’s at stake here. 


So if you have good security controls, you have a level [00:17:00] of brand protection. Because if a company’s hacked, it’s not the end of it, but , it’s really not a good optic for you as a company, ? , if you happen to be the developer, that was, it’s not about blaming people, but it’s just not something that somebody wants to experience. 


. As that level. The other thing as well is Security’s not a difficult thing. . I think some developers just think that’s just not my area. I just write APIs or I’m a backend engineer, I’m a front end engineer. What I’d say to folks is, it’s really not difficult to apply security principles to what you do. 


? Yeah. So you are not gonna have to learn how to do complicated mathematical computations and write your own cryptography or anything close to that. It’s about some core basics. . If you’re a developer and you’re interested in this and it’s very good for your knowledge, As a developer to understand these things, , when you are writing your code to have this as a context. 


But there’s an organization called [00:18:00] oas, O W A S P. Yep. . And forgive me, I can’t remember what the words are for that, the acronym, I think 


Ashish Rajan: it’s open The application security Protocol Project. Sorry. Yeah, yeah, 


Luke Hinds: there you go. So they have this top 10 secure coding, I can’t remember what they call it, but they’ll essentially, Yeah, they’re not, they’ll outline the things as a developer that you need to be careful of. 


So there are things like unsanitized input. Yep. . So when you are using a variable and you are pulling in that value from outside, can somebody exploit that? , there’s privilege escalations, , they’ve got this really nice outline. Sequel injections, typical attacks that happen quite often around some sort of web facing application. 


So I would have a look at that and you’d be surprised this isn’t really difficult stuff, it’s all quite applicable and it’s very good for a developer to learn this as , your growth as an 


Ashish Rajan: engineer. Yeah. And maybe for the leaders as well. Cause we have a lot of leaders who listen to the conversation as well that we have here. 


And we can talk about [00:19:00] log4j and use those examples as well. But do you feel like from people who are security leaders why they should start giving importance? I think maybe we can probably add the part of what the whole signing servicing is as well, so people understand the context for how to explain this to like a non-technical leader if thats even a word. 


Sure. 


Luke Hinds: So I think for the leaders that , the previous point is probably even more prudent, which is, Brand protection. When an exploit happens, it’s no good to retrospectively fit security. . so one thing , that is very common is , you can, , if, if somebody asks, When should I get started on securing my software supply chain? 


I would say last Tuesday, . , you should endeavor to get into good habits as soon as possible. . And that way you, preemptively start to embed the culture into your engineering teams around secure development. Your admins know how to understand how to have secure systems. 


? And Yeah. You can start to look at things like SLSA with the SLSA [00:20:00] levels. . So SLSA is around, it’s a framework of standards for improving the security of your software supply chain. And you can kind of step up in levels. So the sooner you embed this culture, the easier it will be , to have a good robust security posture going forward. 


These things will become, an intrinsic part of, of what you do, , as an engineering team and how you function. So I would say don’t be scared. Get jumping in early and yeah. And so, you were saying around signing and Yeah. 


Ashish Rajan: For what important service in today’s day and age for people who consider supply chain challenge or a problem. 


Luke Hinds: Just to get everybody up onto this, a level playing field, cryptography, modern key technologies, what we call a key pair because you have a private key and a public key. . And you can use these keys to encrypt content. 


? And then anybody that has the public key can verify that it’s you [00:21:00] that encrypted or signed anything. It could be a, , it could be a tarball or a pdf, a container. ? Yeah. So you have this key pair and you can encrypt something or you can sign something. Now we are looking at the signin side, ? 


And what that allows you to do is verify that nobody’s tampered with the object that’s been signed. ? Yep. So I could take anything. Let’s use the example of a pdf. I could sign that using my key. I could give my public key to you, Ashish, I could send you that file. I could put it on the internet, , like some website. 


Yeah. And then you can receive that file and then you can use my public key to verify that it’s not been tampered with. And then it was actually me, I was the identity , that signed that PDF file. So that’s something we call non-repudiation. You can’t be disputed that I signed that particular PDF file. 


. And then the safe transit of that we call integrity. . So we ensure that not a single [00:22:00] bit of that file has changed. So nobody’s managed to put some sort of weird PDF abode vulnerability in there, or, , so it, is very much you get those guarantees of non-repudiation and integrity. 


. Yeah. And that’s where Software signing is immensely useful for the software supply chain. Cuz if we look at that earlier example that we gave , Of code. And artifacts moving along the chain to the end user, you can see multiple machines and humans are all interacting with your code and the artifacts that you produce. 


So if we bring it back to cube world, a container. . So what you can then do is using cryptography, Key cryptography, Yeah. You can verify who this thing is coming from. So for each stage of the chain, we can have an expectation that this machine with this key pair or this human with this key pair would [00:23:00] assign this artifact. 


So I know nobody’s tampered with a tiny little bit of it and I know who it’s coming from. So there’s non-repudiation. So if you gave me something that’s full of malware, I’d know, well, hey, Ashish signed this? , you signed this, you can’t, there’s non-repudiation, ? Yeah. So then that way you’ve got a very, a nice level of of transparency around who is interacted with what and the integrity of that. 


. And, that’s what sigstore is all based on essentially, Right. , is the signing of things and making that easier. . So I’ll start to really dig into sigstore now. . So traditionally with software signing or signing event, anything. . Yeah. It’s the tools that we predominantly used are very old. 


. We’re talking, I might be wrong here, somebody could fact check me, but we’re talking sort of 25 odd years is when GPG was originally. Developed. . The first versions of it [00:24:00] and the protocol was designed, I might have got that wrong. So somebody’s welcome to sort of, it’s really all, 


Ashish Rajan: I mean, I definitely agree. 


It’s been there for a long time. 


Luke Hinds: And and it was amazing for its time. It was groundbreaking. Yeah. So I would never in any way speak badly of a gpg, but it was designed when things were very different. . We did not live in the current paradigm that we have now of many systems all connected together and reliant upon each other. 


? Mm-hmm. , GPG was bit more one to one in a lot of ways. . And to establish. A trust circle with gpg, you’d use something called a web of trust. It would be called, and these would typically be set up by people would meet in person to sign each other’s keys. . And not to say that that’s essential, but there was no trust authority, and unless you established one yourself. 


. Right. And so as a result, , what we noticed, so we started to look at software supply chain really started to get some attention about [00:25:00] two years back, maybe two, three years, . Mm-hmm. really started to come under the microscope. And so when we looked at the wide open source ecosystem, , so let’s say for example we have Python and they have PyPi 


? You have Ruby Gems, . For the Ruby World, ? And then there’s Maven. ? There’s different sort of. Packaging ecosystems. . And then within Kubernetes, we have container images. . So when we looked at the adoption sign in, if a community actually introduced the code so that developers could sign things, generally the adoption rate would be around two to 3%, very low. 


So it might start off. People trying it, right? But they would just eventually, they would just fall away. . And then the actual people verifying were even less. . So we had a look at why that was. And it was generally because the tooling was cumbersome to use, ? Right. The UX was just less than desirable. 


Now I say that there’s probably some security geek [00:26:00] cap, There’s had a UBI key for years and they’re absolutely fine doing that. And I would say, wonderful, that’s great. But you are not the majority. You’re, you are the outlier. You’re the kind of the, the one 2%. 


Ashish Rajan: You want the easy way. No one wants to be putting ubikeys every day. 


I mean, I, to your point, no hate against people using UBI Key, but you would wanna. 


Luke Hinds: That’s it. So most people do find this a challenge. They’re thinking if I generate a key pair, , so these could be very smart engineers, , Yeah. I generate these cryptographic keys. , where do I keep them? 


Do I keep them on my laptop? If I want to sort of use a different machine, should I put them on a USB key, like a dongle and just swap it between machines? , I accidentally checked my key into my GitHub repo. So how do I erase that now? Do I just sort of make another commit? But it’s in the commit history, , they have lots of fears. 


What happens in my laptop stolen? How do I tell everybody? And it’s embarrassing to tell everybody, Hey, my private key, I left my laptop on the train. And, , , so [00:27:00] generally people were just apprehensive to get involved. And we realized this was because of the ux. ? Oh, right. If, if we were gonna solve this, we had to make it. 


Easy for developers to use. . To use cryptography to sign things. That has to be a simple ux. ? Yeah. And so we looked around for sort of other scenarios that had played out where a technology was that was cumbersome, was improved with the ux. ? And a great example here was let’s encrypt. ? 


Now if we go all the way back to 2014, Yeah. . Which is seems recent, but it’s, I guess that’s sounds, I know like 


Ashish Rajan: go, kind of made a lot of things happen very quickly ago now 


Luke Hinds: If we look back to around that time, So pre let’s encrypt Yeah. Probably 2013, let’s encrypt, I think started 2014. 


Around that time. Actually, maybe 


Ashish Rajan: what is Let Syncer for people who have some contact. 


Luke Hinds: So lets encrypt. What let Encrypt do is, when you visit a website, ? You will see the URL prefix has [00:28:00] HTTP or HTT ps ? Mm-hmm. . So the s denotes secure. So it’s using this cryptographic key system that we described earlier. 


? Yeah. And so when you visit a site and you see https and a green padlock, that generally means that your connection is. Secured with cryptography. ? Yep. And it is also the website that you expect to be talking to is the website that you are actually talking to. Now, there are little caveats to that. 


? There are little kind of, , attacks and, and so forth, dns, exploits, and so, but generally, if I go to bank of america.com and I see that green padlock, then I know somebody, an authority is communicating to me that I’m vouching that this is the Bank of america.com. ? 


Right Now, what, let’s encrypted, so previous to Let’s Encrypt, if I set up a, website, because I don’t know. I like collecting model [00:29:00] trains or something like that. . So I I install a WordPress site on, on some hosting platform. . Yep. If I wanna run https, what I would have to do is I’d have to contact a provider, ? 


Mm-hmm. . And they would require me to generate some keys and some certificate signing requests. So right away I have to work out, my gosh, what are the open SSL commands? So I’m gonna get on Google and I’m gonna Google, how do I generate certificates for, , and I don’t know anything about RSA or C D S A or, or any of that, but, , there’s all these terms. 


So I have to work out how to run those. ? Yeah. Then I need to pay. So I gotta get my credit card. If I’ve got a credit card, what is, I’m a 14 year old developer , from London or Bangalore or Sydney, or, ? So I have to pay them and then I’ve got to send them this stuff. 


. And then I have to kind of like go through a challenge [00:30:00] sequence and make sure who I am, drop, fly a zip bundle. And then I’ll be like, Right, how do I get this to work in Apache? So now I’m back to Googling stuff. ? And I’ve spent maybe a whole day doing this. 


Ashish Rajan: The pain of self self sign certificate. 


Luke Hinds: You Yeah, exactly. Yeah. And then you get a year later and you gotta do all again. Yep. , it was, the tooling was just not a good ux. Again, you got the security geeks. , we’re not talking to you folks now. We’re talking to the majority, the UX was poor. ? And there was cost due as well. 


, so Lets, Encrypt came along and they said, Let’s make it free for everybody. You can get certificates for free. And then we will produce tooling and infrastructure services to help automate this. So they came up with Cert Bot. So now with Lets Encrypt, you can just set up a Chrome job, a command line thing runs called Cert Bot. 


And , it will even set up Apache and engines for you. Yeah, it will do all of that. ? You just need to do [00:31:00] an initial setup and it, when it comes to renewing, you can just automatically renew. Incredibly easy. So what happened was , again, I’m probably gonna get my figures wrong here, but. 


HTTPS usage was around 30%. . Yeah. And then after Less Encrypt got traction and established, it went up to 70%. . Wow. And the result of that is it made a safer internet for everybody. Yeah. Yeah. , so sigstore really hopes to replicate the trajectory that Lets Encrypt had. 


So we have this saying in sigstore to be to the software supply chain. What Lets Encrypt was to https. . All right. So that essentially everybody has the tool and to make it easy to sign things. . Is 


Ashish Rajan: the free project as well, right? This is same as my, 


Luke Hinds: Yeah. Yeah. And there’s one just, I just wanted to touch back on the Lets Encrypt thing. 


So what happened was when that proliferation of HTTPS skyrocketed up to 70% Yeah. It then became, Socially unacceptable to run a website on [00:32:00] http. , So even the browsers started to circle around http. So where we are now is if you go to a website and you put in http, I like model trains.com. ? 


Yeah. It kind of feels like E, this doesn’t feel good. It doesn’t feel safe. ? You’re not gonna wanna sign up to that website, let alone put your credit card in there, or, So generally What they’ve managed to do is they’ve got , the mass adoption and the perception has changed now where the expectation is everything should run https, it should be TLS everywhere. 


That that is how it should be, and the users expect that now. So what we want to do is do the same for software. ? So we get to the point that if somebody ingests something on the supply chain, Yeah, . Whatever that might be a dependency or a container. If it’s not signed using cryptography technology, it kind of feels a bit, e I don’t feel [00:33:00] comfortable with this, I don’t want to trust this. 


? Yeah. Yeah. Dan Lawrence makes a really good analogy here, which is that when you run, get package from some open source package managers, Yeah. It’s similar to picking up a USB key off the floor and just sticking it in your laptop. , the risk levels , are the same. ? 


Mm-hmm. . And so for, for sigstore, we hope to change the paradigm. ? So they, the expectations are signed by default and everything should be signed. And if it’s not, you cannot trust it. . And so yeah, with sigstore itself, it’s a group of open source projects. . Right. So it’s a multi-vendor effort. 


. There’s no single company that’s behind sigstore. . And we all write the code in the community and the documentation for sigstore. . Right. And sigstore consists of services that we run. So we run some infrastructure to do things such as , to provide the certificates. . And we have something called a transparency log. 


I won’t [00:34:00] deep dive into that too much, but it’s a kind of a blockchain technology. Right. . Means things are transparent and open so you can see exactly. Who’s been assigned what certificates to sign. What are, if that, So you’ve got this kind of open bookkeeping system, which is built upon cryptography. 


it can’t be tampered or changed to cover up some sort of bad action, . Yeah. So we have , these services that we run. . And then at the same time, we also develop clients. And the clients are the tools that sign an artifact or some code specific to that language or that ecosystem. 


So one of the ones that we have that’s most well known is called co-sign. . Oh yeah. And cosign is actually container sign in. . And with cosign, you can sign a container image using six. So you can use the six door infrastructure and the co-sign tool to sign a container for free. . So you’ll get a free software signin certificate to sign your container image. 


Ashish Rajan: . Wait, so can I have it [00:35:00] behind my firewall as well then? As in, it’s not to your point, because a lot of people think https or it has to be always the internet facing. So you’re saying that sigstore as an open source project, like how the example that I was giving of self sign certification? 


Sure. So this can still work behind the scene as well for personal use as in 


Luke Hinds: Yeah, very much. , so co-sign will work with private registries, ACI registries. , nice. But you can, in fact, so with sigstore , we call it the public good service. . So we run this free to use publicly open service that anybody can use. 


. Yeah. But the technology that we run, To provide those services, that infrastructure, you can deploy that yourself within your own network. , so if I was speaking to, there’s kind of a senior IT leader that has worked for a company and they need to implement something similar internally, then you can set up your own sigstore. 


You can have your own trust route. and don’t mean [00:36:00] the public service. So , that is quite possible. And you can sign your own container images then, and you can use the public service for, if you pull a container image from outside of your organization, if that’s signed with co-sign, then you can verify the source of that container image and then it’s not being tampered with. 


Essentially you get guarantees around the tamper free structure of that container image. 


Ashish Rajan: We were talking about the whole non-repudiation earlier as well, So how does that cover with knowing that, Oh, this is Luke who signed it, versus Sure. Ashish signed it. How does it verify that part? 


Right. That’s 


Luke Hinds: a really good question. So what we do in sigstore so if we go back to this concept of keys again. . Typically you’ll generator key pair and , they’re termed long lived. . Long you’ll keep them for, , , however long you set the expiry for. But people tend to do 365 days. 


Again, I say that somebody’s probably gonna say, [00:37:00] No, that’s wrong. It should be 180 or, but that’s generally the, the amount that people go for. Some people go for more. . Yeah. And those are long term keys. Now, most of the time, like in a corporate environment, they will have specialist hardware that will store that key. 


. Now, as said earlier, we realized this was problematic for a lot of users. So we utilize some other protocols, security protocols to allow us to have, we call this technology keyless. ? Right. Where you do not need to manage a long term private key. . So I’ll probably get a little bit hand wavy here, but when use something called open Id connect. 


Yep, Yep. Which is a protocol that’s part of Oauth two specific. Yep. . And what you’re able to do is you can sign a container image with an open identity based account. So Google, GitHub run a a style. Idp, we call it an idp, an identity provider. . Yeah. Yeah. On Microsoft, , there’s many. 


You can [00:38:00] even run your own one privately. . And, and what we do is we have this kind of clever switcheroo . Where the client will connect to our public infrastructure. . And it will request a signin certificate. What we do then is we present them with a page. Yeah. We open a browser where you can then, where you see sign in with Google? 


You will then click sign in with Google. . And then our system will then go off to talk to Google and we’ll say, Hey, this users authorized us to request from you something called a scope. Yeah. . Now a scope is pretty simple. You’ve would’ve come across them a lot. A scope, if we use Google as an example, a scope could be access to your calendar. 


Cuz I wanna make entries in your calendar, access to your drive. Cause I wanna back stuff up to your drive, access to your email. ? Yep. What we do is we ask for the user’s email address and that is all. So we get back lukehinds@gmail.com from Google. . Yeah. So then that [00:39:00] way we know that whoever has initiated this signing system is in control of this account. 


Mm-hmm. . And then with these accounts, you get lots of nice extra security. Extras, like two factor authentication to protect the accounts and so forth. . So we now know that whoever’s signing is in charge of this account, they’re logged into this account. So when we provide you with a software signing certificate, we will put the email address Yeah. 


Into that cryptographic certificate, which is signed by , our main certificate route that we have in sigstore. . Yep. Yep. And then you can then sign your container image. . And then that then goes into this technology that I described earlier called a transparency log. So you can think of it like a blockchain. 


When somebody’s in there, you can’t change it. So we put that transaction into the transparency log, and then immediately afterwards you can describe the private key. You don’t need to keep it because we’ve frozen in time. That [00:40:00] moment where you, as in. You prove that you’re in control of an account. Yep. 


You had a temporary keeper. We provided you with a software sign certificate, and you signed a container. So at a latter point, somebody can then verify that lukehinds@gmail.com signed a container image. ? So they can know that I or whoever was in charge of my account signed a container image. ? 


So then you can do things such as, you could say if a container image is signed by Luke, I’ll let it run in staging, but I’m not gonna let it run in production until Ashish has signed it, ? Mm-hmm. . And you can build up a policy. So now what we have in Kubernetes are, these things called admission controllers. 


? And an admission controller will basically red or green light. Workload running on Kubernetes? Yeah. Based on whatever logic you develop specific for that emission controller. So we have a mission controllers that will look for a [00:41:00] sigstore signature, something that’s signed by co-sign. . Right. 


And they could, an admission controller could say, I’m not gonna allow this pod to instantiate until I know it’s been signed by Ashish. Mm-hmm. , what I mean? Or signed or signed by Luke. So you can build up policy then around something being signed so the source of where it’s coming from. 


. And we do other things as well, so you don’t just have to sign it with , your Gmail account. . So in, in the context of GitHub Yep. They run an O idc. Yeah. So you can get guarantees that a container was built within a certain GitHub repository. Oh wow. All of that stuff is put into the certificate. 


So you have source origin, then you can see where a container image was built. Yeah, and we do the same thing. We’ve Teton, so folks that are using Kubernetes native Tecton, there’s a project called Chains. So when chains builds a container image, , a pipeline is [00:42:00] executed. Yep. Then that image can be signed by that machine. 


. And and there’s many other things as well. , we work with Spiffy as well. Spiffy Inspire. Yes. That, that can interact with sigstore around the, the signing of things and an establishing of trust and so forth. So sigstores become very multi embedded into the Kubernetes ecosystem. There are other folks using sigstore to sign CRDs. 


So you have a CRD where you describe your deployment. Your deployment you can sign that and then an admission controller can check that that’s been signed before it’s allowed to run on your cluster, . Like so like an 


Ashish Rajan: artifact signing. . Yeah, very 


Luke Hinds: much. Yeah. You effectively signed the yaml. 


Yep. Yeah, 


Ashish Rajan: yeah, yeah. Fair enough. 


Luke Hinds: So that way that if somebody managed a tamper with a bit of YAML somehow Yeah. They got access to a system somewhere and they changed an API slightly changed the IP [00:43:00] address or, Yeah, yeah. Or, or did something to exploit, possibly exploit a system you would know because it would break the integrity of that signature. 


. That 


Ashish Rajan: is pretty awesome. So I, in my mind, I’m thinking like a good use case already is the fact that if you’re using sigstore, having the signing, you almost building like , a chain of custody for. Like from the point of origin of GitHub, all the way to this is our GitHub organization, whatever, X, Y, Z. 


And Ashish kicked off a process to use a container which is produced by the YAML in that GitHub Repository. And then I send to Luke to approve it and then it goes into production. 


Luke Hinds: Exactly. Yeah. And then if we consider where we kicked off the conversation around the supply chain. Yeah. Humans and machines all interacting with things, then we have that chain of providence. 


And that’s what sigstore helps to happen because there are other things as well. People start to hear the term SBOM and attestations, software attestations . And an [00:44:00] SBOM is essentially, think of it like a recipe of the supply chain. Yeah. So if I have chocolate cake. . That chocolate cake required chocolate flour, sugar milk. 


I’m not very good at baking, but I believe those, 


Ashish Rajan: I’m good at eating though, . 


Luke Hinds: Yeah. So you could then an SBOM could describe the chocolate. I got that from Walmart. The flower was from here. It was originally milled in, I don’t know, some country. . And then it was put on this ship and it went to there. 


And , 


so an SBOM seeks to do the same with software. What are the dependencies that were ingested to build this software? . And with the more kind of attestation based, this is where we start to get into labels. SLSA uses a project called in Toto. . And it has attestations and that has lots of cryptographic guarantees built in there. 


Like a digest of the particular artifact that you’re right with. So what we can do with, a SBOM. And in toto style attestations. [00:45:00] SLSA attestations, we can start to record all of the steps and the individuals in the machines can start to cryptographically sign off to the next person or machine and they can verify that who they’re receiving it from is the person that is authorized to do that. 


. Yeah. Yeah. And we build that trust system on cryptography. . And sigstore’s able to really nicely interact with these components and look after the sign inside. So you haven’t gotta have these long-term keys , and you can kind of start to automate things using sigstore tooling. 


Ashish Rajan: Awesome. It sounds like there are a lot of awesome use cases for, from a business perspective, for sigstore. I’m almost wondering, because, how. A lot of us have been doing this for a long time. Like, I mean, , I’ve created a lot of self sign certificate for a long time as well. Sure. As people are kind of going into the journey of using say something like sigstore to sign containers for now and hopefully a lot more as they kind of progress [00:46:00] and mature, what do you see people do as a, I guess, , they’ve heard you talk like software signing is the future. 


Yes. I wanna contribute to that growing chart. Where does one start from a maturity perspective, What would day one or what can day one look, look like? And then, I don’t know, day 365, when you’ve done across all the board at scale, how does it work in a scale comparative com? I mean, I guess cause I mean, Enterprise have a lot of applications to manage and look after. 


Luke Hinds: If somebody wants to get started day one. . I would recommend SLSA. It’s the source that they go to. So SLSA is very good with these. It has this step to approach these levels. So level one for SLSA, I believe, if I recall correctly, it’s like you should have some sort of, your build system should be scripted. 


Mm-hmm. . And should produce some level of providence in SBOM so that gets you to step one. You don’t have to sign it. ? That comes in step two. So step two, you need to start having signatures. ? [00:47:00] Right. And and then level three, four, it starts to become, controls become tighter. 


You have matic builds, reproducible builds, all the, these sorts of elements start to come in. So source is a very good map, really to improving your supply chain. Now when it comes to. At scale, , multisite, multi data center, Multi cluster value. Multi cluster, , we’ve made good progress in sigstore. 


. And cuz I think the good thing that we did was we built the systems from the beginning to be conducive to those environments, . So but it is stuff that we are working on improving at the same time is, , running up at large scale as well. So I guess we’re about just over two years old now, the project. 


Ashish Rajan: Wow. Oh wow. This 


Luke Hinds: it’s two years old. Yeah. It’s been absolutely incredible the, the speed that things have moved at very much. Yeah. So, Wow. I mean, since we’ve launched we’ve a lot Kubernetes release images are all signed with sigstore. Yeah. So they standardized onto [00:48:00] sigstore and we have. 


Organizations such as GitHub are looking to introduce sigstore for sign in of mpm. We have the Maven community who are looking to do the same. So there’s lots of open source communities, the Python community, who are looking to onboard sigstore as this means of generating sign providence within , their ecosystem. 


So yeah, a lot has happened in the, the past couple of years. 


Ashish Rajan: Yeah. So it’s not just kubernetes. You can do it for anything. Yeah, very much. 


Luke Hinds: We are kind of , the Kubernetes cloud native system have been very good. They’ve helped carry us up, , we’ve rode wave on the CNCF type technology. 


Yeah. But , the big picture has always been that sigstores much bigger than that. ? So, yeah. We, we have libraries for rust. We have libraries for JavaScript, for Ruby Gems. So the folks at Spotify were looking at introducing this for Ruby Gems. There is work looking at using sigstore signing [00:49:00] machine attestations as well and all sorts of interesting stuff. 


So, as I say, we’ve got a lot of success and , we are grateful to what the cloud native world has done. But yeah, sigstore should have a larger area of impact , than just that ecosystem. That’s 


Ashish Rajan: what we hope. That’s pretty awesome. I think after listening to all the analogies that you’ve shared and , what we have shared talking about as well, kind of agree with what Vineet said. 


If Luke plans to start kubernetes community training, I’m happy to join this training. Thank 


Luke Hinds: you. 


Ashish Rajan: So I kinda agree with it. I love the analogy so far as well. And have you kind of map it back to like the basics as well. I 


thank you so much for this Oh no, 


Luke Hinds: for having me. 


Ashish Rajan: Yeah. And it’s been a great session. I kind of agree with all the sentiment being shared in the chat messages as well. And where can people find you to know more about you and what you do in the sigstore and otherwise cloud native space? 


Luke Hinds: Sure. Yeah, so I’ve, I’ve got my Twitter account tagged there, decodebytes, so anybody’s welcome to send me a direct message, , and [00:50:00] you can reach me through there. 


I’m on various Slack channels as well, so I’m always happy to talk to people on there and, that’s the best way to, reach out to me. Awesome. 


Ashish Rajan: I will make sure I put that in the show notes as well. But thank you so much for this and I’m looking forward to when we have the next version of sigstore, when it’s being used globally, not just for kubernetes, but for a lot more things. 


Yeah, 


Luke Hinds: I’d love to come 


Ashish Rajan: back. Yeah. Awesome. Now thanks so much for this and thank you everyone for tuning in. We’ll be back with another episode of kubernetes Security next weekend as well. So I’ll see you on next episode. Thanks Luke, and thanks everyone enough. 


Luke Hinds: See you.