Signing and Verification

OCM uses cryptographic signatures to guarantee that component versions are authentic (created by a trusted party) and have not been tampered with during storage or transfer.

Why Sign Components?

Software supply chains involve multiple stages: development, build, packaging, distribution, and deployment. At each stage, components could potentially be:

  • Modified — malicious actors could inject code or alter resources
  • Replaced — components could be swapped for compromised versions
  • Misattributed — components could falsely claim to come from a trusted source

Signing addresses these risks by creating a cryptographic proof of:

  1. Integrity: The component has not changed since it was signed
  2. Authenticity: The signature was created by someone with access to the private key
  3. Provenance: The signer cannot deny having signed the component

How OCM Signing Works

  flowchart TB
    subgraph sign ["Sign (Producer)"]
        direction TB
        A[Component Version] --> B[Normalize & Hash]
        B --> C[Sign with Private Key]
        C --> D["Signature embedded in CV"]
    end
    
    sign --> T["Transfer Component Version"]
    
    T --> verify
    
    subgraph verify ["Verify (Consumer)"]
        direction TB
        E[Component Version] --> F[Extract Signature]
        E --> G[Normalize & Hash]
        F --> H[Verify with Public Key]
        G --> H
        H --> I{Valid?}
        I -->|Yes| VALID["✓ Trusted"]
        I -->|No| INVALID["✗ Rejected"]
    end

Normalization and Digest Calculation

OCM uses a two-layer approach to ensure consistent and reproducible digests:

Component Descriptor Normalization

Before hashing, the component descriptor is normalized into a canonical form, eliminating any ambiguities that could cause the same logical descriptor to produce different digests. The default normalization algorithm ( jsonNormalisation/v4alpha1) defines exactly how this canonical form is derived, ensuring identical component descriptors always yield the same digest.

Artifact Digest Normalization

Each artifact’s digest is calculated using a type-specific normalization algorithm:

Artifact TypeAlgorithmDescription
OCI artifactociArtifactDigest/v1Digest of the OCI manifest (used for container images, Helm charts, and other OCI-native content)
Generic blobgenericBlobDigest/v1Direct hash of blob content (used for executables, blueprints, and other non-OCI content)

This allows OCM to use the most appropriate digest mechanism for each artifact type. OCI artifacts use their manifest digest rather than re-hashing the blob, improving performance and ensuring consistency with OCI registry behavior. Generic blobs are hashed directly.

Recursive Component References

When a component references other components, their digests are calculated and embedded:

references:
  - componentName: ocm.software/helper
    name: helper
    version: 1.0.0
    digest:
      hashAlgorithm: SHA-256
      normalisationAlgorithm: jsonNormalisation/v4alpha1
      value: 01c211f5c9cfd7c40e5b84d66a2fb7d19cb0...

This creates a complete integrity chain — verifying the root component automatically verifies all transitive dependencies.

What Gets Signed?

OCM signs a digest of the component descriptor, which includes:

  • Component metadata (name, version, provider)
  • Resource descriptors (including digest, if available)
  • Source descriptors (including digest, if available)
  • Component references (including digest, if available)

The signature does not cover the raw resource content directly — instead, it covers the digests of those resources as recorded in the component descriptor. Crucially, the access field (which describes where a resource is stored) is excluded from the signed digest by the normalization process. This is a key design principle:

  • Location-independent integrity — a component version can be transferred to a different registry (changing all access references) without invalidating its signature. The digest remains stable because it depends only on what the artifacts contain, not where they are stored.
  • Any change to resource content changes its digest, invalidating the signature.
  • Signature verification is fast (no need to re-hash large binaries).

This separation of content identity from storage location is what enables secure delivery across environments: a producer signs a component version once, and consumers can verify it after any number of transfers — even into air-gapped environments with completely different registries.

The following example shows a signed component descriptor. Notice that each resource has both an access field (storage location) and a digest field (content hash). Only the digest is included in the signature — the access can change freely during transfers:

Example Signed Component Descriptor
component:
  name: github.com/acme.org/helloworld
  version: 1.0.0
  provider: acme.org
  resources:
    - name: mylocalfile
      type: blob
      version: 1.0.0
      relation: local
      access:                          # NOT included in signature
        type: localBlob
        localReference: sha256:70a257...
        mediaType: text/plain; charset=utf-8
      digest:                          # Included in signature
        hashAlgorithm: SHA-256
        normalisationAlgorithm: genericBlobDigest/v1
        value: 70a2577d7b649574cbbba99a2f2ebdf27904a4abf80c9729923ee67ea8d2d9d8
    - name: image
      type: ociImage
      version: 1.0.0
      relation: external
      access:                          # NOT included in signature
        type: ociArtifact
        imageReference: ghcr.io/stefanprodan/podinfo:6.9.1@sha256:262578cd...
      digest:                          # Included in signature
        hashAlgorithm: SHA-256
        normalisationAlgorithm: genericBlobDigest/v1
        value: 262578cde928d5c9eba3bce079976444f624c13ed0afb741d90d5423877496cb
signatures:
  - name: default
    digest:
      hashAlgorithm: SHA-256
      normalisationAlgorithm: jsonNormalisation/v4alpha1
      value: 91dd197868907487e62872695db1fa7b397fde300bcbae23e24abc188fb147ad
    signature:
      algorithm: RSASSA-PSS
      mediaType: application/vnd.ocm.signature.rsa.pss
      value: 7feb449229c6ffe368144995432befd1505d2d29...

Signature Storage

Signatures are stored as part of the component version:

signatures:
  - name: acme-release-signing
    digest:
      hashAlgorithm: SHA-256
      normalisationAlgorithm: jsonNormalisation/v4alpha1
      value: abc123...
    signature:
      algorithm: RSASSA-PSS
      mediaType: application/vnd.ocm.signature.rsa
      value: <base64-encoded-signature>

A component version can have multiple signatures from different parties, enabling:

  • Separation of build and release signing
  • Multiple approval workflows
  • Cross-organizational trust chains

Supported Signing Algorithms

OCM currently only supports RSA-based signing algorithms:

AlgorithmTypeCharacteristics
RSASSA-PSS (default)AsymmetricProbabilistic, stronger security guarantees, recommended for new implementations
RSA-PKCS#1 v1.5AsymmetricDeterministic, widely supported, compatible with legacy systems

To override the default signing algorithm or encoding policy, see the –signer-spec flag in the CLI reference. The signer spec file configures only the algorithm and encoding policy — credentials are always resolved separately via the .ocmconfig file.

For key management, OCM uses PEM-encoded key files configured in the .ocmconfig:

  • Private keys: Used by producers to sign component versions
  • Public keys: Distributed to consumers for verification

See How-to: Generate Signing Keys for creating RSA key pairs.

Upcoming Sigstore Support

We are planning to add support for Sigstore and Cosign as an additional signing mechanism. This will enable keyless signing workflows and improved supply chain security. Stay tuned for updates.

Signature Encoding Policies

The signatureEncodingPolicy in the signer spec controls how the signature output is serialized and stored. It does not affect the format of key input files, which are always PEM-encoded.

PolicySignature FormatMedia TypeCertificate ChainVerification Requires
Plain (default)Hex-encoded raw bytesapplication/vnd.ocm.signature.rsa.pssNot embeddedExternally supplied public key
PEM (experimental)PEM SIGNATURE block + CERTIFICATE blocksapplication/x-pem-fileEmbedded in signatureValid certificate chain in signature

Plain Encoding (Default)

The raw RSA signature bytes are hex-encoded and stored directly. This is the most compact representation. Verification always requires the public key to be provided separately via .ocmconfig credentials.

Example signature in a component descriptor:

signature:
  algorithm: RSASSA-PSS
  mediaType: application/vnd.ocm.signature.rsa.pss
  value: d1ea6e0cd850c8dbd0d20cd39b9c7954...

PEM Encoding (Experimental)

The signature is wrapped in a PEM block of type SIGNATURE, optionally followed by the signer’s X.509 certificate chain. This makes the signature self-contained: verifiers can extract and validate the public key from the embedded chain without needing a separately distributed key.

Example of a PEM-encoded signature value:

-----BEGIN SIGNATURE-----
Signature Algorithm: RSASSA-PSS
<base64-encoded signature bytes>
-----END SIGNATURE-----
-----BEGIN CERTIFICATE-----
<leaf certificate>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<intermediate CA>
-----END CERTIFICATE-----

PEM encoding is experimental

This encoding policy may change or be deprecated in future versions. For production use, prefer the default Plain encoding.

Key files vs. signature encoding

A common source of confusion: “PEM” in signatureEncodingPolicy refers to the signature output format, not the key input format. Input keys are always PEM-encoded files (e.g. -----BEGIN RSA PRIVATE KEY-----), regardless of which encoding policy is selected.

When using PEM encoding for signing, the credential referenced by public_key_pem / public_key_pem_file must contain X.509 certificates (not bare public keys), because the certificate chain is embedded into the signature for self-contained verification.

Next Steps