FYI that we are spinning up a "ztrust" project under the Open Mainframe
Project umbrella.
I note, with delight, that RPM has built-in support for PGP signing.
I've been learning about that.
Acorse, PKI code signing is the norm, so we gotta support that too.
The OMP TAC meeting is tomorrow.
-- R; <><
On 11/11/25 9:17 PM, Rick Troth wrote:
This is to let y'all know that I'm presenting the "ztrust" working
group to the OMP TAC on Thursday.
Some of us have been working on the of a community trust anchor for
mainframers. For me, it started as a folder in my "vmworkshop"
skeletal repository. But it naturally extends to the MVS crowd. (So
I'll prolly drop a note to IBM-MAIN tomorrow. And it applies to Linux
too.)
Most PKI certificates are issued by commercial, institutional,
government, or military CAs. This commonly leaves volunteer projects
out in the cold. (Most PKI certs cost real money, often in short
supply when you're coding something for the CBT tape on your own time.
So we're collecting PKI root certs from other than the usual issuers.
But there's more: the PKI certs are to be signed using PGP keys. The
PGP keys, forming a companion collection, will be cross-signed. Some
of the PGP keys will also be signed by people in the greater Web of
Trust. All of this means that you can follow the chain to an entity
that you actually know.
That's the plan anyway.
In the VM world, we have a rich history of publicly shared code. We
have a level of trust in each other because we know each other. But as
security concerns grow, it's understandable that the "supply chain" be
cryptographically verified. I'm leaving out details of code signing
mechanisms. Those details are part of what goes into the ZTRUST effort.
So this project is to provide a trust anchor which mainframers can use
to assure authenticity of packages which are signed outside the usual
framework.
This makes sense in the context of supply chain defense. My friend Dan
Rathbun (a CISO) put it well:
Trust anchors for mainframe software may not seem urgent to many, but
in regulated industries, they’re directly tied to resilience and risk
posture. Volunteer-driven signing solutions could help close that gap
in ways enterprises actually respect.
The project is only just getting going. Matt Hogstrom and I have begun
collecting PGP signatures. We need more.
If you've ever used PGP (for attestation, not just for email) then you
probably have a good idea of how it works.
If anyone has an established (but volunteer) CA with a root cert that
should be included, please speak up.
The collection of keys and certs is NOT itself trustworthy. It is the
SIGNATURES which verify authenticity.
So the collection will not contain any PKI cert which does not also
have a PGP signature or does not chain up to a trusted cert,
nor will it have any PGP keys without supplemental signatures.
John Mertic said that this project should operate as a "working group"
in OMP space.
There is no code (at this time), just a collection of cross-signed PGP
keys and some PKI root certs.
I believe the meeting Thursday is to formally initiate that working
group.
Thanks Mike MacIsaac for getting me/us connected with the OMP and
(especially) the z/VM Community Tools collection.
There is an initial collection here:
https://github.com/openmainframeproject/zvm-community-tools/tree/main/ztrust/
I presume that OMP will create a "repository" (in Git speak) for ZTRUST.
If anyone can contribute, please contact me.
--
-- R; <><
--
-- R; <><
----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www2.marist.edu/htbin/wlvindex?LINUX-390