An S/MIME signing utility for use with Git
Перейти к файлу
Ben Toews 0cacf715af
fix up help output
2018-07-26 11:51:42 -06:00
vendor ommit issuer by default if cert has AIA 2018-07-26 11:15:20 -06:00
.gitignore rename. add readme. add license 2017-11-29 11:09:16 -07:00
Gopkg.lock ommit issuer by default if cert has AIA 2018-07-26 11:15:20 -06:00
Gopkg.toml implement gpgsm's --include-certs argument 2018-07-26 08:56:36 -06:00
LICENSE.md rename. add readme. add license 2017-11-29 11:09:16 -07:00
README.md recommend opensc for windows too since that works better 2018-02-16 15:28:57 -07:00
command_sign.go ommit issuer by default if cert has AIA 2018-07-26 11:15:20 -06:00
command_sign_test.go ommit issuer by default if cert has AIA 2018-07-26 11:15:20 -06:00
command_verify.go implement gpgsm's --include-certs argument 2018-07-26 08:56:36 -06:00
list_keys_command.go use the new pkix.Name String() function 2018-07-16 08:26:02 -06:00
main.go fix up help output 2018-07-26 11:51:42 -06:00
main_test.go ommit issuer by default if cert has AIA 2018-07-26 11:15:20 -06:00
parse_user_id.go get signing working 2017-11-22 08:31:25 -07:00
status.go update vendored cms 2018-07-16 08:39:02 -06:00
utils.go implement --list-keys command 2017-11-29 12:36:08 -07:00

README.md

smimesign (S/MIME Sign)

Smimesign is an S/MIME signing utility that is compatible with Git. This allows developers to sign their Git commits and tags using X.509 certificates issued by pubic certificate authorities or their organization's internal certificate authority. Smimesign uses keys and certificates already stored in the macOS Keychain or the Windows Certificate Store.

Git Signing, GnuPG, PKI, and S/MIME

Git allows developers to sign their work using GnuPG. This is a form of public key cryptography whereby the notion of trust is distributed. The party verifying a signature may directly know of the signer's identity and public key, or the signer's identity may be vouched for by a third party known to the verifier. Through layers of "vouching", a web-of-trust is established.

Such a model is well suited to an unstructured environment. In hierarchical environments though, such as a corporation or other large organizations, a simpler approach is for digital identities to be issued and vouched for by a centralized authority. With this approach — known as Public Key Infrastructure, or PKI — an organization's certificate authority (CA) issues signed certificates that identify subjects such as people or computers. Embedded in these certificates is the identity's public key, allowing others who trust the CA to verify that identity's signatures.

PKI is used in a variety of applications for encrypting or authenticating communications. Secure Mime (S/MIME) standardized a protocol for encrypting and signing emails using PKI. While protecting email was the original intent, S/MIME can protect any type of data, including Git commits and tags. Signing Git data with S/MIME provides the same protections as GnuPG while allowing for the more hierarchical trust model of PKI.

Installation

  • Make sure you have the Go compiler installed.
  • You'll probably want to put $GOPATH/bin on your $PATH.
  • Run go get github.com/github/smimesign

Configuring Git

Git needs to be told to sign commits and tags using smimesign instead of GnuPG. This can be configured on a global or per-repository level.

Configure Git to use smimesign for a single repository:

$ cd /path/to/my/repository
$ git config --local gpg.program smimesign

Configure Git to use smimesign for all repositories:

$ git config --global gpg.program smimesign

Configuring smimesign

No configuration is needed to use smimesign. However, you must already have a certificate and private key in order to make signatures. Furthermore, to sign Git commits or tags, it is best to have a certificate that includes your Git email address.

Find your Git email address:

$ git config --get user.email

List available signing identities

$ smimesign --list-keys

Smart cards (PIV/CAC/Yubikey)

Many large organizations and government agencies distribute certificates and keys to end users via smart cards. These cards allow applications on the user's computer to use private keys for signing or encryption without giving them the ability to export those keys. The native certificate stores on both Windows and macOS can talk to smart cards, though special drivers or middleware may be required.

If you can find your certificate in the Keychain Access app on macOS or in the Certificate Manager (certmgr) on Windows, it will probably work with smimesign. If you can't find it, you may need to install some drivers or middlware.

Yubikey

Many Yubikey models support the PIV smart card interface. To get your operating system to discover certificates and keys on your Yubikey, you may have to install the OpenSC middleware. On macOS avoid installing OpenSC using homebrew, as it omits an important component. Instead use the installer provided by OpenSC or use the homebrew-cask formula.

Additionally, to manage the manage certificates and keys on the Yubikey on macOS, you'll need the Yubikey PIV Manager (GUI) or the Yubikey PIV Tool (command line).

Yubikey PIV Keychain in macOS Keychain Access app