Skip to content

Commit 6f8c1c3

Browse files
Merge branch 'master' into revise_attacks_text
2 parents 278b6c9 + d1104d9 commit 6f8c1c3

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

tuf-spec.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -307,33 +307,33 @@ Version: **1.0 (Draft)**
307307
Delegated trust can be revoked at any time by the delegating role signing
308308
new metadata that indicates the delegated role is no longer trusted.
309309

310-
- **2.1.3 Snapshot role**
310+
- **2.1.3 Snapshot role**
311311

312-
The snapshot role signs a metadata file that provides information about the
313-
latest version of all of the other metadata on the repository (excluding the
314-
timestamp file, discussed below). This information allows clients to know
315-
which metadata files have been updated and also prevents mix-and-match
316-
attacks.
312+
The snapshot role signs a metadata file that provides information about the
313+
latest version of all of the other metadata on the repository (excluding the
314+
timestamp file, discussed below). This information allows clients to know
315+
which metadata files have been updated and also prevents mix-and-match
316+
attacks.
317317

318-
- **2.1.4 Timestamp role**
318+
- **2.1.4 Timestamp role**
319319

320-
To prevent an adversary from replaying an out-of-date signed metadata file
321-
whose signature has not yet expired, an automated process periodically signs
322-
a timestamped statement containing the hash of the snapshot file. Even
323-
though this timestamp key must be kept online, the risk posed to clients by
324-
compromise of this key is minimal.
320+
To prevent an adversary from replaying an out-of-date signed metadata file
321+
whose signature has not yet expired, an automated process periodically signs
322+
a timestamped statement containing the hash of the snapshot file. Even
323+
though this timestamp key must be kept online, the risk posed to clients by
324+
compromise of this key is minimal.
325325

326-
- **2.1.5 Mirrors role**
326+
- **2.1.5 Mirrors role**
327327

328-
Every repository has one or more mirrors from which files can be downloaded
329-
by clients. A software update system using the framework may choose to
330-
hard-code the mirror information in their software or they may choose to use
331-
mirror metadata files that can optionally be signed by a mirrors role.
328+
Every repository has one or more mirrors from which files can be downloaded
329+
by clients. A software update system using the framework may choose to
330+
hard-code the mirror information in their software or they may choose to use
331+
mirror metadata files that can optionally be signed by a mirrors role.
332332

333-
The importance of using signed mirror lists depends on the application and
334-
the users of that application. There is minimal risk to the application's
335-
security from being tricked into contacting the wrong mirrors. This is
336-
because the framework has very little trust in repositories.
333+
The importance of using signed mirror lists depends on the application and
334+
the users of that application. There is minimal risk to the application's
335+
security from being tricked into contacting the wrong mirrors. This is
336+
because the framework has very little trust in repositories.
337337

338338
* **2.2. Threat Model And Analysis**
339339

0 commit comments

Comments
 (0)