-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upload gpg key to keyservers #849
Comments
I also recommend that docker sets-up a keybase account and uses their official twitter account to publicly list the fingerprint of their gpg key, but I'd be happy to create a distinct issue for this |
Closing as duplicate of #602 |
Sorry, but this is a totally distinct request from #602 This ticket (#849) requests to add the docker gpg public key to keyservers. #602 requests to add a fingerprint of the key to the docker install script. While I support #602, it does not solve the issue that the same domain provides both the gpg key and the fingerprint that identifies the gpg key. Putting your key on a keyserver (on a distinct domain from docker.com) is a distinct request that will provide a method for clients to check the validity of the key out-of-band from docker.com. @andrewhsu, please re-open this ticket. |
Hi,
Can the docker team please upload their gpg public key to a keyserver to facilitate its users in cross-checking the validity of the key when importing it for the first-time?
I downloaded the docker gpg key from the following URL:
That gave me a key with fingerprint
060A 61C5 1B55 8A7F 742B 77AA C52F EB6B 621E 9F35
and a uid fordocker@docker.com
But then I went to validate that this key was indeed correct, and I was stunned to find that it isn't listed on the sks keyservers or the better/replacement keyserver https://keys.openpgp.org/
Moreover, there's no non-self signatures on the key
In-case it isn't clear, there's significant security risks with the X.509 security model used by my browser (or curl, etc) when downloading the docker gpg key from https://download.docker.com/linux/centos/gpg. HSTS is great when re-visiting a website, but the first time I visit docker.com, it wouldn't be too difficult for a malicious actor to MITM the connection with a cert signed by the extremely large list of CAs trusted by popular browsers -- which includes, for example, organizations controlled by State Actors who have a history of human rights abuses. And, historically, included many CAs that had to be removed because the CA's private key was stolen or was otherwise signing certificates that they shouldn't have been. If any cert is signed by any of those CAs, a MITM actor can send the wrong gpg key to a client, and the browser will show no indication of wrong-doing.
As suggested above, the solution to this problem is:
publishing the docker public key on other domains in addition to docker.com, such as the keys.openpgp.org keyserver
signing your public key with other gpg keys that are well integrated in the web of trust
The second item is a more complicated and long-term solution, so this issue is a feature request to upload the docker gpg key to the keys.openpgp.org keyserer, which should only take a few minutes to do. You'll need to click a link sent to the uid of the key (docker@docker.com) as described here https://keys.openpgp.org/about
The text was updated successfully, but these errors were encountered: