When the BitSeal Authority key rotates, what triggers a rotation, how the ceremony is performed, and how long retired keys remain valid for verification.
The BitSeal Authority key is rotated on a fixed annual schedule in Q4 of each calendar year, and unscheduled if any of the Section 3 triggers fire. Retired keys remain published on the well-known endpoint indefinitely so that seals issued under them stay independently verifiable forever. A ceremony procedure in Section 5 governs both scheduled and unscheduled rotations.
This policy governs the life cycle of the Ed25519 Authority key used by BitSeal to sign seal manifests. Its purpose is to bound the damage of a key compromise, establish a predictable operational cadence, and commit publicly to a rotation timeline that relying parties can audit.
The companion Authority Key Ceremony document identifies the current key. This document says when and how it will change.
The Authority key is rotated on a scheduled basis once per calendar year. The rotation window is October 1 through December 31 of each year. The exact rotation date within that window is selected to minimize user-visible disruption and is announced at least fourteen days in advance via the BitSeal changelog.
Scheduled rotation does not by itself imply that the retiring key was compromised. It reflects a defense-in-depth policy of limiting the effective lifetime of any long-lived signing key.
In addition to the scheduled cadence, Orygn will rotate the Authority key out of band on any of the following triggers. The target turnaround for an emergency rotation, measured from the moment the trigger is confirmed, is seventy-two hours.
Emergency rotation may be accompanied by a public security advisory, a list of seal root hashes issued during the suspect window, and, where appropriate, a re-sign campaign under the new key for unaffected seals.
A retired Authority key remains published on the well-known endpoint indefinitely, and seals signed under it remain independently verifiable forever. This is the central point: rotation does not invalidate history.
timestamp_utc falls inside the key's effective window. BitSeal's verifier tries the current key first and then each historical key in effective-date order.rotation_reason and relying parties are advised to re-verify affected seals against the contemporaneous ledger.Every rotation, scheduled or emergency, follows the procedure below. The intent is to produce a contemporaneous, independently verifiable record that improves on the retroactive attestation described in the Key Ceremony document for the initial key.
BITSEAL_PRIVATE_KEY for the Production, Preview, and Development environments. The previous key is simultaneously moved into BITSEAL_HISTORICAL_PUBLIC_KEYS as a public-key-only JSON entry including key_id, public_key_pem, effective_from, effective_until, and, for emergency rotations, rotation_reason.The primary notification channel for rotations is the BitSeal changelog at bitseal.orygn.tech/changelog. Emergency rotations are additionally announced through a security advisory on the BitSeal homepage and a notice on the Security page.
Automated consumers of the well-known endpoint should expect and handle changes to current_key and growth of historical_keys. Clients that hard-code a single public-key fingerprint will break on rotation by design, this is a feature, not a bug, because it forces contemporaneous human review of what they are trusting.
Relying parties who wish to be notified proactively can email the address in Section 9.
During the 30-day overlap window that follows every scheduled rotation, BitSeal's verifier accepts either the retiring or the new key for any seal whose timestamp falls before the cutover, and requires the new key for any seal whose timestamp falls on or after the cutover.
Independent verifiers following the offline procedure in the Key Ceremony document should try keys in the order they appear on the well-known endpoint: current first, then each historical key. A successful verification under any published key is, for the purposes of BitSeal's attestation, a successful verification.
This policy may be updated to reflect operational changes, improvements in key custody (for example, a migration from Vercel environment variables to a hardware-backed KMS), or in response to external events. The effective date at the top of this page is updated on every change. Prior versions are available on request at [email protected].