@@ -1096,29 +1096,29 @@ repo](https://github.com/theupdateframework/specification/issues).
1096
1096
kilobytes. The filename used to download the root metadata file is of the
1097
1097
fixed form VERSION_NUMBER.FILENAME.EXT (e.g., 42.root.json). If this file is
1098
1098
not available, or we have downloaded more than Y number of root metadata
1099
- files (because the exact number is as yet unknown), then go to step 1.8. The
1100
- value for Y is set by the authors of the application using TUF. For example,
1101
- Y may be 2^10.
1099
+ files (because the exact number is as yet unknown), then go to step 5.1.9.
1100
+ The value for Y is set by the authors of the application using TUF. For
1101
+ example, Y may be 2^10.
1102
1102
1103
1103
* ** 5.1.3. Check for an arbitrary software attack.** Version N+1 of the root
1104
1104
metadata file MUST have been signed by: (1) a threshold of keys specified in
1105
1105
the trusted root metadata file (version N), and (2) a threshold of keys
1106
1106
specified in the new root metadata file being validated (version N+1). If
1107
1107
version N+1 is not signed as required, discard it, abort the update cycle,
1108
- and report the signature failure. On the next update cycle, begin at step 0
1109
- and version N of the root metadata file.
1108
+ and report the signature failure. On the next update cycle, begin at step
1109
+ 5.0 and version N of the root metadata file.
1110
1110
1111
1111
* ** 5.1.4. Check for a rollback attack.** The version number of the trusted
1112
1112
root metadata file (version N) MUST be less than or equal to the version
1113
1113
number of the new root metadata file (version N+1). Effectively, this means
1114
1114
checking that the version number signed in the new root metadata file is
1115
1115
indeed N+1. If the version of the new root metadata file is less than the
1116
1116
trusted metadata file, discard it, abort the update cycle, and report the
1117
- rollback attack. On the next update cycle, begin at step 0 and version N of
1118
- the root metadata file.
1117
+ rollback attack. On the next update cycle, begin at step 5. 0 and version N
1118
+ of the root metadata file.
1119
1119
1120
1120
* ** 5.1.5** . Note that the expiration of the new (intermediate) root metadata
1121
- file does not matter yet, because we will check for it in step 5.1.8 .
1121
+ file does not matter yet, because we will check for it in step 5.1.9 .
1122
1122
1123
1123
* ** 5.1.6** . ** Set the trusted root metadata file** to the new root metadata
1124
1124
file.
@@ -1132,7 +1132,7 @@ repo](https://github.com/theupdateframework/specification/issues).
1132
1132
lower than the expiration timestamp in the trusted root metadata file
1133
1133
(version N). If the trusted root metadata file has expired, abort the update
1134
1134
cycle, report the potential freeze attack. On the next update cycle, begin
1135
- at step 0 and version N of the root metadata file.
1135
+ at step 5. 0 and version N of the root metadata file.
1136
1136
1137
1137
* ** 5.1.10** . ** If the timestamp and / or snapshot keys have been rotated,
1138
1138
then delete the trusted timestamp and snapshot metadata files.** This is done
@@ -1254,15 +1254,15 @@ snapshot metadata file.
1254
1254
1255
1255
* ** 5.4.5** . ** Perform a pre-order depth-first search for metadata about the
1256
1256
desired target, beginning with the top-level targets role.** Note: If
1257
- any metadata requested in steps 5.4.4 .1 - 5.4.4.2.3 cannot be downloaded nor
1257
+ any metadata requested in steps 5.4.5 .1 - 5.4.5.2 cannot be downloaded nor
1258
1258
validated, end the search and report that the target cannot be found.
1259
1259
1260
1260
* ** 5.4.5.1** . If this role has been visited before, then skip this role
1261
1261
(so that cycles in the delegation graph are avoided). Otherwise, if an
1262
1262
application-specific maximum number of roles have been visited, then go to
1263
- step 5 (so that attackers cannot cause the client to waste excessive
1263
+ step 5.5 (so that attackers cannot cause the client to waste excessive
1264
1264
bandwidth or time). Otherwise, if this role contains metadata about the
1265
- desired target, then go to step 5.
1265
+ desired target, then go to step 5.5.
1266
1266
1267
1267
* ** 5.4.5.2** . Otherwise, recursively search the list of delegations in
1268
1268
order of appearance.
@@ -1273,12 +1273,12 @@ snapshot metadata file.
1273
1273
the lack of any such metadata).
1274
1274
1275
1275
* ** 5.4.5.2.2** . If the current delegation is a terminating delegation,
1276
- then jump to step 5.
1276
+ then jump to step 5.5.
1277
1277
1278
1278
* ** 5.4.5.2.3** . Otherwise, if the current delegation is a
1279
1279
non-terminating delegation, continue processing the next delegation, if
1280
- any. Stop the search, and jump to step 5 as soon as a delegation returns
1281
- a result.
1280
+ any. Stop the search, and jump to step 5.5 as soon as a delegation
1281
+ returns a result.
1282
1282
1283
1283
** 5.5** . ** Verify the desired target against its targets metadata** .
1284
1284
0 commit comments