@@ -1322,7 +1322,7 @@ it in the next step.
1322
1322
when attackers arbitrarily increase the version numbers in any of the
1323
1323
timestamp, snapshot, targets, or delegated targets metadata. The attacker goal
1324
1324
is to cause clients to refuse to update the metadata later because the attacker's
1325
- listed metadata version number (possibly MAX_INT) is greater than the new valid
1325
+ listed metadata version number (possibly MAX_INT) is greater than the new valid
1326
1326
version. To recover from
1327
1327
fast-forward attacks after the repository has been compromised and recovered,
1328
1328
certain metadata files need to be deleted as specified in this section.
@@ -1484,55 +1484,55 @@ it in the next step.
1484
1484
2 . Otherwise, recursively search the list of delegations in
1485
1485
order of appearance.
1486
1486
1487
- 1 . Let DELEGATE denote the current target role TARGETS is
1487
+ 1 . Let DELEGATEE denote the current target role TARGETS is
1488
1488
delegating to.
1489
1489
1490
1490
2 . ** Fast-forward attack recovery.** If a threshold of
1491
1491
delegated targets keys for the current delegation are removed from the
1492
- TARGETS metadata, delete the trusted DELEGATE metadata, if any, and the
1492
+ TARGETS metadata, delete the trusted DELEGATEE metadata, if any, and the
1493
1493
previously trusted snapshot metadata.
1494
1494
1495
1495
3 . ** Check for a rollback attack via snapshot.** The version number of the
1496
- DELEGATE metadata in the previous trusted snapshot metadata, if any, MUST
1496
+ DELEGATEE metadata in the previous trusted snapshot metadata, if any, MUST
1497
1497
be less than or equal to its version number in the new trusted snapshot
1498
1498
metadata. If this is not the case, abort the update cycle, and report the
1499
1499
potential rollback attack.
1500
1500
1501
- 4 . ** Download the DELEGATE targets metadata file** , up to either
1501
+ 4 . ** Download the DELEGATEE targets metadata file** , up to either
1502
1502
the number of bytes specified in the snapshot metadata file, or some Z
1503
1503
number of bytes. The value for Z is set by the authors of the application
1504
- using TUF. For example, Z may be tens of kilobytes. IF DELEGATE cannot be
1504
+ using TUF. For example, Z may be tens of kilobytes. IF DELEGATEE cannot be
1505
1505
found, end the search and report the target cannot be found. If
1506
1506
consistent snapshots are not used (see Section 7), then the filename used
1507
1507
to download the targets metadata file is of the fixed form FILENAME.EXT
1508
1508
(e.g., delegated_role.json). Otherwise, the filename is of the form
1509
1509
VERSION_NUMBER.FILENAME.EXT (e.g., 42.delegated_role.json), where
1510
- VERSION_NUMBER is the version number of the DELEGATE metadata file listed
1510
+ VERSION_NUMBER is the version number of the DELEGATEE metadata file listed
1511
1511
in the snapshot metadata file. In either case, the client MUST write the
1512
1512
file to non-volatile storage as FILENAME.EXT.
1513
1513
1514
1514
5 . ** Check against snapshot metadata.** The hashes (if any), and
1515
- version number of the new DELEGATE metadata file MUST match the trusted
1515
+ version number of the new DELEGATEE metadata file MUST match the trusted
1516
1516
snapshot metadata, if any. This is done, in part, to prevent a mix-and-match
1517
- attack by man-in-the-middle attackers. If the new DELEGATE metadata file
1517
+ attack by man-in-the-middle attackers. If the new DELEGATEE metadata file
1518
1518
does not match, abort the update cycle, and report the failure.
1519
1519
1520
- 6 . ** Check for an arbitrary software attack.** The new DELEGATE
1520
+ 6 . ** Check for an arbitrary software attack.** The new DELEGATEE
1521
1521
metadata file MUST have been signed by a threshold of keys specified in the
1522
- TARGETS metadata file. If the new DELEGATE metadata file is not signed
1522
+ TARGETS metadata file. If the new DELEGATEE metadata file is not signed
1523
1523
as required, abort the update cycle, and report the failure.
1524
1524
1525
- 7 . ** Check for a rollback attack on the DELEGATE metadata.**
1526
- The version number of the trusted DELEGATE metadata file, if any, MUST be
1525
+ 7 . ** Check for a rollback attack on the DELEGATEE metadata.**
1526
+ The version number of the trusted DELEGATEE metadata file, if any, MUST be
1527
1527
less than or equal to the version number of the new DELEGATE metadata
1528
- file. If the new DELEGATE metadata file is older than the trusted
1529
- DELEGATE metadata file abort the update cycle, and report the potential
1528
+ file. If the new DELEGATEE metadata file is older than the trusted
1529
+ DELEGATEE metadata file abort the update cycle, and report the potential
1530
1530
rollback attack.
1531
1531
1532
1532
8 . ** Check for a freeze attack.** The latest known time
1533
- should be lower than the expiration timestamp in the new DELEGATE
1534
- metadata file. If so, the new DELEGATE file becomes the trusted DELEGATE
1535
- file. If the new DELEGATE metadata file is expired, abort the update
1533
+ should be lower than the expiration timestamp in the new DELEGATEE
1534
+ metadata file. If so, the new DELEGATEE file becomes the trusted DELEGATEE
1535
+ file. If the new DELEGATEE metadata file is expired, abort the update
1536
1536
cycle, and report the potential freeze attack.
1537
1537
1538
1538
9 . If the current delegation is a multi-role delegation,
@@ -1546,7 +1546,7 @@ it in the next step.
1546
1546
1547
1547
11 . Otherwise, if the current delegation is a non-terminating
1548
1548
delegation, continue processing the next delegation, if any, by repeating
1549
- the preorder depth-first search with DELEGATE as the current TARGET role.
1549
+ the preorder depth-first search with DELEGATEE as the current TARGET role.
1550
1550
Stop the search, and jump to step [[ #fetch-target]] . as soon as a
1551
1551
delegation returns a result.
1552
1552
0 commit comments