dsse VS root-signing

Compare dsse vs root-signing and see what are their differences.

dsse

A specification for signing methods and formats used by Secure Systems Lab projects. (by secure-systems-lab)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
dsse root-signing
3 1
61 77
- -
0.0 9.5
5 days ago 3 days ago
Jupyter Notebook Go
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

dsse

Posts with mentions or reviews of dsse. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-19.
  • NPM Provenance Public Beta
    5 projects | news.ycombinator.com | 19 Apr 2023
  • What do you think about DSSE: Dead Simple Signing Envelope format?
    1 project | /r/crypto | 15 Apr 2023
  • Ditching OpenPGP, a new approach to signing APT repositories
    1 project | news.ycombinator.com | 21 Jun 2021
    I took a look at the design and think there are a few issues with the format as proposed.

    # The public key is stored with the signature.

    This should be stored separately. A public key found here is too tempting to use, rendering the signature worthless. Authenticating it would be OK, but low value. This is unauthenticated. A "key ID" should be used instead if the intention is to support lookups among multiple keys.

    # The algorithm is stored with the signature.

    This is slightly less bad than above, but still bad. Attacker-controlled algorithms have been used repeatedly in "downgrade" attacks. Agility is bad, but if you must support multiple algorithms, store this with the public key (somewhere else). Some info here: https://github.com/secure-systems-lab/dsse/issues/35

    I didn't look at the sub-key protocol in detail. The ephemeral key for every release is an interesting choice. The root key is "offline". But if it must be brought online to sign a new ephemeral key for every release anyway, you might as well just use it to sign the release itself.

    Using minisign/signify like OpenBSD does and keeping things very simple makes sense to me. The complexity designed into this system (sub-keys, multiple algorithms and signatures) starts to stretch the bounds to where TUF (https://theupdateframework.io/) might make sense. TUF is very complex and not worth it for most projects, but Debian is exactly what TUF is designed for.

root-signing

Posts with mentions or reviews of root-signing. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-19.
  • NPM Provenance Public Beta
    5 projects | news.ycombinator.com | 19 Apr 2023
    caveat, I am from the sigstore project.

    GitLab are currently working with sigstore community to rig in their CI/CD as well and the root of CA of sigstore is community created and owned. This means any provider can trade an ODIC ID token for a sigstore certificate.

    https://github.com/sigstore/root-signing

What are some alternatives?

When comparing dsse and root-signing you can also consider the following projects:

fulcio - Sigstore OIDC PKI

attestation - in-toto Attestation Framework

packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain