Signing Singularity Containers to Ensure Trust and Reproducibility

By Staff
Ensuring Long-term Trust and Reliability of SIF Images: What You Need to Know
As container runtimes technologies become more prevalent, it presents a dilemma for government, public, and private sector organizations. They must consider the long-term implications of using the same containers and data for future experiments, particularly in the realm of AI and ML. The concern is that aging containers may introduce significant security risks over the container’s lifetime. How can we balance the benefits of containerization with the need for ongoing security and risk management?A federal push for improving software security
The 2021 Executive Order on Improving the Nation’s Cybersecurity brought the issue of trustworthiness of and transparency into digital infrastructure to the forefront of federal priorities. In the order, the administration outlines a set of standards and requirements designed to ensure that federal agencies are taking essential steps to “…identify, deter, protect against, detect, and respond to…” malicious cyber campaigns that threaten national security.The security of software used by the Federal Government is vital to the Federal Government’s ability to perform its critical functions. The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors. There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended. The security and integrity of “critical software” — software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) — is a particular concern. Accordingly, the Federal Government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software.
You don’t have to look further than the SolarWinds hack or the security flaw in the ubiquitous Log4j framework to understand why this has taken on an increased urgency. Of course, verifying the authenticity and integrity of any software currently running on a system using X.509 certificates is a straightforward process. But digital signatures in container images that haven’t been used in many years introduce management challenges since digital signatures used to sign software and/or data containers may expire before a container’s usable lifetime. And there are many areas where long-term signing of containers is an important consideration.
Putting the security considerations and dangers into perspective
The dangers of ignoring digital signatures in containers are clearcut; without signatures, it’s impossible to know whether a given container is authentic and what’s in it. This includes determining if the software is up to date with the latest patches. It’s also difficult to detect if someone modifies the container or adds a backdoor or some other exploit without your knowledge. The challenges and dangers of containers with expired signatures are another matter.Long-term signature verification in SIF images
While signing a SIF image is a relatively straightforward process, signature expiration dates and other variables do complicate long-term container usage considerations. One of the biggest issues is that over time malicious actors or third parties may gain access to the private key material used to protect a given environment, so best practices are to either limit the lifetime of private keys or ensure there is a way to revoke key material in the event of a compromise. For long-lived SIF containers, the question of how to manage digital signatures if you choose to periodically rotate the private key materials is critically important. For the moment, Sylabs has identified the following three strategies as potential options.- Periodically re-issue certificates—With this option, the signing party uses long-lived private key material and periodically re-issues certificates that all contain public key material. In this model, the signing party does not periodically rotate its private key material except in the event of a compromise. Updated certificates are periodically published and must be distributed to all parties wishing to verify a container.
- Periodically resign containers—In this model, the signing party periodically rotates the private key it uses to sign containers. The new signature and the new public key material must then be distributed to all parties wishing to verify the container.
- “Keyless” certificates—This option is radically different from traditional PKI approaches and was pioneered by the SigStore project (Sigstore Security Model, 2023). In this model, the signing party authenticates with a zero-trust identity provider and uses ephemeral keys and certificates, which are signed automatically by a special root CA. Signatures and certificates are stored in a transparency log, ensuring they are globally visible, discoverable, and auditable. Certificates in this model are extremely short-lived, often on the order of minutes.
Learn more
For a deeper dive into each of the options, read 3 Strategies for Long-Term Signature Verification of SIF Images When Using X.509 Certificates: Examining contrasting methods for long-term validation of digital signatures in Singularity Image Format (SIF) containers. The white paper explores the following topics:- An overview of SIF and a brief history of certificate-related considerations in SIF containers
- High-level descriptions of asymmetric encryption and digital signatures to enhance the clarity of the verification options for readers with limited familiarity of these concepts
- Three options for supporting the long-term verification of digital signatures in SIF containers using X.509 certificates
- The pros and cons of each approach, based on environment types and other factors
Join Our Mailing List
Recent Posts
Related Posts
Upgrade CentOS 7 to Alma 8 While Keeping SingularityCE Updated
Overview With CentOS 7 reaching end of life on June 30th, 2024 and CentOS 8 already discontinued in favor of CentOS Stream, users of open source SingularityCE might find themselves in a situation where a migration to another open source operating system is necessary....
Introducing CDI Support to SingularityCE 4.0
With the ever increasing adoption of AI techniques in scientific research, as well as growing use of accelerators for traditional numerical workloads, easy access to GPUs and other devices in HPC environments is critical.The 4.0 release of the SingularityCE container...
Transforming Alzheimer’s Research with Singularity Containers: A Milestone in Scientific Reproducibility
Addressing The Grand Challenges of Our Time Through Singularity Container TechnologyAt Sylabs, our mission and vision aren't just statements on a wall, they're an ethos we embody daily. We're committed to facilitating cutting-edge research that seeks to address...