Notary is a project that allows anyone to have trust over arbitrary collections of data
Go to file
Kim Bao Long d636d02a88 Replacing 'HTTP' by 'HTTPS' for securing links
Currently, when we access the modified pages with **HTTP**, it is
redirected to **HTTPS** automatically. So this commit aims to
replace **HTTP** to **HTTPs** for security.

Signed-off-by: Kim Bao Long <longkb@vn.fujitsu.com>
2019-02-28 09:39:34 +07:00
.circleci Attempt to fix Ying's circleci 2.0 upgrade 2018-10-15 16:06:41 +01:00
buildscripts Update deprecated links 2019-02-19 11:01:00 +07:00
client client: fix logger format types for variables 2019-02-14 16:26:34 -08:00
cmd Update to Go 1.11.2 2019-02-25 17:41:44 +01:00
cryptoservice Refactor the notary client library to have a separate reader and downloader 2018-08-29 14:56:54 -07:00
docs Update deprecated links 2019-02-19 11:01:00 +07:00
fixtures Update test certificates 2018-05-16 13:36:14 +01:00
hooks add newlines on build hooks so GH doesn't warn 2016-10-13 10:02:04 -07:00
migrations Migrate tool now returns an actual error value` 2017-05-08 16:00:20 -07:00
notarysql Update deprecated links 2019-02-19 11:01:00 +07:00
passphrase updating imports and paths for new notary location 2017-10-26 14:13:12 -07:00
proto remote key storage via a GRPC implementation of the trustmanager.Storage interface 2017-02-22 13:57:56 -08:00
server testutils: reduce dependency on testify package in testutils 2019-01-30 10:19:26 +01:00
signer Do not leak cancellations for contexts 2018-05-17 12:38:01 +01:00
storage Refactor the notary client library to have a separate reader and downloader 2018-08-29 14:56:54 -07:00
trustmanager Do not leak cancellations for contexts 2018-05-17 12:38:01 +01:00
trustpinning updating imports and paths for new notary location 2017-10-26 14:13:12 -07:00
tuf Update to Go 1.11.2 2019-02-25 17:41:44 +01:00
utils Remove use of distributions old wrapped context 2018-05-17 12:08:46 +01:00
vendor Update prometheus vendoring to match distribution 2018-05-17 10:21:03 +01:00
version Lint fix 2015-10-19 11:52:43 -07:00
.gitignore Add gas output to .gitignore 2018-04-13 11:20:32 +01:00
CHANGELOG.md Bump notary version to 0.6.1 and add changelog. 2018-04-10 10:29:09 -07:00
CODE_OF_CONDUCT.md Replacing 'HTTP' by 'HTTPS' for securing links 2019-02-28 09:39:34 +07:00
CONTRIBUTING.md Fixes #1148 incorrect markdown formatting 2017-05-05 17:26:58 -05:00
CONTRIBUTORS updating maintainers and adding top level contributors, removing those files from tuf dir 2015-10-27 22:59:23 -07:00
Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
Jenkinsfile jenkinsfile: skeleton to test github integration 2017-08-30 17:11:02 -07:00
LICENSE at some point we chopped the first line off the license 2017-05-31 11:16:28 -07:00
MAINTAINERS Add Justin Cormack to Maintainers 2018-08-10 17:51:39 +01:00
MAINTAINERS.ALUMNI remove derek as a maintainer 2017-10-04 11:58:25 -07:00
MAINTAINERS_RULES.md formalizing the maintainers rules into a file 2017-05-30 15:30:26 -07:00
Makefile Do not check Go version user is building with 2018-10-16 14:44:47 +01:00
NOTARY_VERSION Bump notary version to 0.6.1 and add changelog. 2018-04-10 10:29:09 -07:00
README.md Update deprecated links 2019-02-19 11:01:00 +07:00
codecov.yml add tls to tests 2017-02-22 14:22:46 -08:00
const.go remote key storage via a GRPC implementation of the trustmanager.Storage interface 2017-02-22 13:57:56 -08:00
const_nowindows.go Do not support SIGUSR1 and SIGUSR2 syscall handling in windows 2016-09-22 13:54:31 -07:00
const_windows.go Do not support SIGUSR1 and SIGUSR2 syscall handling in windows 2016-09-22 13:54:31 -07:00
cross.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
development.mysql.yml bump mariadb to 10.1.28 2017-10-10 08:37:41 +02:00
development.postgresql.yml updating imports and paths for new notary location 2017-10-26 14:13:12 -07:00
development.rethink.yml Convert integration test/development compose files to use new testclient.py file 2016-08-11 10:06:40 -07:00
docker-compose.postgresql.yml updating imports and paths for new notary location 2017-10-26 14:13:12 -07:00
docker-compose.rethink.yml Bump rethink version due to vulnerabilites (see docker hub vulnerability scan of 2.3.0 at https://hub.docker.com/r/jlhawn/rethinkdb/tags/2.3.0/) 2016-06-09 14:06:14 -07:00
docker-compose.yml bump mariadb to 10.1.28 2017-10-10 08:39:23 +02:00
escrow.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
fips.go Mark the inclusion of md5 in fips.go as ignore by gas 2018-04-13 11:18:22 +01:00
notary.go use an iota const for context key values 2016-10-04 13:31:29 -07:00
server.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
server.minimal.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
signer.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
signer.minimal.Dockerfile Update to Go 1.11.5 2019-02-25 17:41:52 +01:00
vendor.conf Update prometheus vendoring to match distribution 2018-05-17 10:21:03 +01:00

README.md

Notary

GoDoc Circle CI CodeCov GoReportCard FOSSA Status

Notice

The Notary project has officially been accepted in to the Cloud Native Computing Foundation (CNCF). It has moved to https://github.com/theupdateframework/notary. Any downstream consumers should update their Go imports to use this new location, which will be the canonical location going forward.

We have moved the repo in GitHub, which will allow existing importers to continue using the old location via GitHub's redirect.

Overview

The Notary project comprises a server and a client for running and interacting with trusted collections. See the service architecture documentation for more information.

Notary aims to make the internet more secure by making it easy for people to publish and verify content. We often rely on TLS to secure our communications with a web server, which is inherently flawed, as any compromise of the server enables malicious content to be substituted for the legitimate content.

With Notary, publishers can sign their content offline using keys kept highly secure. Once the publisher is ready to make the content available, they can push their signed trusted collection to a Notary Server.

Consumers, having acquired the publisher's public key through a secure channel, can then communicate with any Notary server or (insecure) mirror, relying only on the publisher's key to determine the validity and integrity of the received content.

Goals

Notary is based on The Update Framework, a secure general design for the problem of software distribution and updates. By using TUF, Notary achieves a number of key advantages:

  • Survivable Key Compromise: Content publishers must manage keys in order to sign their content. Signing keys may be compromised or lost so systems must be designed in order to be flexible and recoverable in the case of key compromise. TUF's notion of key roles is utilized to separate responsibilities across a hierarchy of keys such that loss of any particular key (except the root role) by itself is not fatal to the security of the system.
  • Freshness Guarantees: Replay attacks are a common problem in designing secure systems, where previously valid payloads are replayed to trick another system. The same problem exists in the software update systems, where old signed can be presented as the most recent. Notary makes use of timestamping on publishing so that consumers can know that they are receiving the most up to date content. This is particularly important when dealing with software update where old vulnerable versions could be used to attack users.
  • Configurable Trust Thresholds: Oftentimes there are a large number of publishers that are allowed to publish a particular piece of content. For example, open source projects where there are a number of core maintainers. Trust thresholds can be used so that content consumers require a configurable number of signatures on a piece of content in order to trust it. Using thresholds increases security so that loss of individual signing keys doesn't allow publishing of malicious content.
  • Signing Delegation: To allow for flexible publishing of trusted collections, a content publisher can delegate part of their collection to another signer. This delegation is represented as signed metadata so that a consumer of the content can verify both the content and the delegation.
  • Use of Existing Distribution: Notary's trust guarantees are not tied at all to particular distribution channels from which content is delivered. Therefore, trust can be added to any existing content delivery mechanism.
  • Untrusted Mirrors and Transport: All of the notary metadata can be mirrored and distributed via arbitrary channels.

Security

Any security vulnerabilities can be reported to security@docker.com.

See Notary's service architecture docs for more information about our threat model, which details the varying survivability and severities for key compromise as well as mitigations.

Security Audits

Notary has had two public security audits:

Getting started with the Notary CLI

Get the Notary Client CLI binary from the official releases page or you can build one yourself. The version of the Notary server and signer should be greater than or equal to Notary CLI's version to ensure feature compatibility (ex: CLI version 0.2, server/signer version >= 0.2), and all official releases are associated with GitHub tags.

To use the Notary CLI with Docker hub images, have a look at Notary's getting started docs.

For more advanced usage, see the advanced usage docs.

To use the CLI against a local Notary server rather than against Docker Hub:

  1. Ensure that you have docker and docker-compose installed.

  2. git clone https://github.com/theupdateframework/notary.git and from the cloned repository path, start up a local Notary server and signer and copy the config file and testing certs to your local Notary config directory:

    $ docker-compose build
    $ docker-compose up -d
    $ mkdir -p ~/.notary && cp cmd/notary/config.json cmd/notary/root-ca.crt ~/.notary
    
  3. Add 127.0.0.1 notary-server to your /etc/hosts, or if using docker-machine, add $(docker-machine ip) notary-server).

You can run through the examples in the getting started docs and advanced usage docs, but without the -s (server URL) argument to the notary command since the server URL is specified already in the configuration, file you copied.

You can also leave off the -d ~/.docker/trust argument if you do not care to use notary with Docker images.

Building Notary

Note that Notary's latest stable release is at the head of the releases branch. The master branch is the development branch and contains features for the next release.

Prerequisites:

  • Go >= 1.7.1
    • Fedora: dnf install golang
  • libtool development headers installed
    • Ubuntu: apt-get install libltdl-dev
    • CentOS/RedHat: yum install libtool-ltdl-devel
    • Fedora: dnf install libtool-ltdl-devel
    • Mac OS (Homebrew): brew install libtool

Set GOPATH. Then, run:

$ go get github.com/theupdateframework/notary
# build with pcks11 support by default to support yubikey
$ go install -tags pkcs11 github.com/theupdateframework/notary/cmd/notary
$ notary

To build the server and signer, run docker-compose build.

License

FOSSA Status