Skip to content

Commit ce455af

Browse files
Publish threat model in documentation (#6263)
* Publish threat model in documentation * Separate security contents a bit more, update link to threat model, update nav * Add a section on supply chain and SBOM/SLSA mitigation * Update threat model with feedback from David Hadas * Update introduction with content from davidhadas, add sections on controller and webhook functionality and update targets of threats
1 parent d843a31 commit ce455af

File tree

4 files changed

+483
-58
lines changed

4 files changed

+483
-58
lines changed

config/nav.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -343,8 +343,10 @@ nav:
343343
# Reference docs
344344
- Reference:
345345
- Security:
346-
- Security Model and Disclosure: reference/security/README.md
347-
- Verifying Knative Images: reference/security/verifying-images.md
346+
- Security Disclosure: reference/security/README.md
347+
- Threat Model: reference/security/threat-model.md
348+
- Verifying Knative Images: reference/security/verifying-images.md
349+
- Verifying Knative Binaries: reference/security/verifying-cli.md
348350
- Release notes: reference/relnotes/README.md
349351
- Blog: /blog/
350352
- About:

docs/reference/security/README.md

Lines changed: 0 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -11,62 +11,6 @@ function: how-to
1111

1212
This page describes Knative security and disclosure information.
1313

14-
## Knative threat model
15-
16-
* [Threat model](https://github.com/knative/community/blob/main/working-groups/security/threat-model.md)
17-
18-
## Code Signature Verification
19-
20-
### All platforms
21-
22-
Our releases from 1.9 are signed with [cosign](https://docs.sigstore.dev/cosign/overview). You can use the following steps to verify our binaries.
23-
24-
1. Download the files you want, and the `checksums.txt`, `checksum.txt.pem` and `checksums.txt.sig` files from the releases page:
25-
```sh
26-
# this example verifies the 1.10.0 kn cli from the knative/client repository
27-
wget https://github.com/knative/client/releases/download/knative-v1.10.0/checksums.txt
28-
wget https://github.com/knative/client/releases/download/knative-v1.10.0/kn-darwin-amd64
29-
wget https://github.com/knative/client/releases/download/knative-v1.10.0/checksums.txt.sig
30-
wget https://github.com/knative/client/releases/download/knative-v1.10.0/checksums.txt.pem
31-
```
32-
1. Verify the signature:
33-
```sh
34-
cosign verify-blob \
35-
--certificate-identity=signer@knative-releases.iam.gserviceaccount.com \
36-
--certificate-oidc-issuer=https://accounts.google.com \
37-
--cert checksums.txt.pem \
38-
--signature checksums.txt.sig \
39-
checksums.txt
40-
```
41-
1. If the signature is valid, you can then verify the SHA256 sums match with the downloaded binary:
42-
```sh
43-
sha256sum --ignore-missing -c checksums.txt
44-
```
45-
46-
!!! note
47-
Knative images are signed in `KEYLESS` mode. To learn more about keyless signing, please refer to
48-
[Keyless Signatures](https://github.com/sigstore/cosign/blob/main/KEYLESS.md#keyless-signatures)
49-
Our signing identity(Subject) for our releases is `[email protected]` and the Issuer is `https://accounts.google.com`
50-
51-
### Apple macOS
52-
53-
In addition to signing our binaries with `cosign`, we [notarize](https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution) our macOS binaries. You can use the `codesign` utility to verify our binaries from 1.9 release. You should expect an output that looks
54-
like this. The expected TeamIdentifier is `7R64489VHL`
55-
56-
```
57-
codesign --verify -d --verbose=2 ~/Downloads/kn-quickstart-darwin-amd64
58-
59-
Executable=/Users/REDACTED/Downloads/kn-quickstart-darwin-amd64
60-
Identifier=kn-quickstart-darwin-amd64
61-
...
62-
Authority=Developer ID Application: Mahamed Ali (7R64489VHL)
63-
Authority=Developer ID Certification Authority
64-
Authority=Apple Root CA
65-
Timestamp=3 Oct 2022 at 22:50:07
66-
...
67-
TeamIdentifier=7R64489VHL
68-
```
69-
7014
## Report a vulnerability
7115

7216
We're extremely grateful for security researchers and users that report vulnerabilities to the Knative Open Source Community. All reports are thoroughly investigated by a set of community volunteers.

0 commit comments

Comments
 (0)