@@ -307,33 +307,33 @@ Version: **1.0 (Draft)**
307
307
Delegated trust can be revoked at any time by the delegating role signing
308
308
new metadata that indicates the delegated role is no longer trusted.
309
309
310
- - ** 2.1.3 Snapshot role**
310
+ - ** 2.1.3 Snapshot role**
311
311
312
- The snapshot role signs a metadata file that provides information about the
313
- latest version of all of the other metadata on the repository (excluding the
314
- timestamp file, discussed below). This information allows clients to know
315
- which metadata files have been updated and also prevents mix-and-match
316
- attacks.
312
+ The snapshot role signs a metadata file that provides information about the
313
+ latest version of all of the other metadata on the repository (excluding the
314
+ timestamp file, discussed below). This information allows clients to know
315
+ which metadata files have been updated and also prevents mix-and-match
316
+ attacks.
317
317
318
- - ** 2.1.4 Timestamp role**
318
+ - ** 2.1.4 Timestamp role**
319
319
320
- To prevent an adversary from replaying an out-of-date signed metadata file
321
- whose signature has not yet expired, an automated process periodically signs
322
- a timestamped statement containing the hash of the snapshot file. Even
323
- though this timestamp key must be kept online, the risk posed to clients by
324
- compromise of this key is minimal.
320
+ To prevent an adversary from replaying an out-of-date signed metadata file
321
+ whose signature has not yet expired, an automated process periodically signs
322
+ a timestamped statement containing the hash of the snapshot file. Even
323
+ though this timestamp key must be kept online, the risk posed to clients by
324
+ compromise of this key is minimal.
325
325
326
- - ** 2.1.5 Mirrors role**
326
+ - ** 2.1.5 Mirrors role**
327
327
328
- Every repository has one or more mirrors from which files can be downloaded
329
- by clients. A software update system using the framework may choose to
330
- hard-code the mirror information in their software or they may choose to use
331
- mirror metadata files that can optionally be signed by a mirrors role.
328
+ Every repository has one or more mirrors from which files can be downloaded
329
+ by clients. A software update system using the framework may choose to
330
+ hard-code the mirror information in their software or they may choose to use
331
+ mirror metadata files that can optionally be signed by a mirrors role.
332
332
333
- The importance of using signed mirror lists depends on the application and
334
- the users of that application. There is minimal risk to the application's
335
- security from being tricked into contacting the wrong mirrors. This is
336
- because the framework has very little trust in repositories.
333
+ The importance of using signed mirror lists depends on the application and
334
+ the users of that application. There is minimal risk to the application's
335
+ security from being tricked into contacting the wrong mirrors. This is
336
+ because the framework has very little trust in repositories.
337
337
338
338
* ** 2.2. Threat Model And Analysis**
339
339
0 commit comments