Skip to content

Commit f9122f1

Browse files
joshuagllukpueh
authored andcommitted
Remove slow retrieval attacks from protections
Section 1.5.2. Goals to protect against specific attacks lists the types of attacks on package managers which TUF protects against. For slow retrieval attacks, nothing in the specification provides any protections against this class of attack. For each other attack type there are protections within the specification that help prevent those attacks from being successful. Therefore, protecting against slow retrieval attacks becomes an aspiration for implementations and implementers are left to their own devices to determine how best to protect against these attacks. Furthermore, implementing protections against slow retrieval attacks is a complex task for implementations which may be contrary to the desires of systems choosing to integrate TUF. Many existing software update systems choosing to integrate TUF will have their own tested network/download stack that they will not replace lightly. Finally, AFAICT base on a quick perusal of go-tuf and Tough, only the reference implementation has attempted to implement protection against slow retrieval attacks. The reference implementation does not currently protect against slow retrieval attacks. Signed-off-by: Joshua Lock <[email protected]>
1 parent 70c34df commit f9122f1

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

tuf-spec.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -183,10 +183,6 @@ repo](https://github.com/theupdateframework/specification/issues).
183183
software that is older than that which the client previously knew to be
184184
available.
185185

186-
+ **Slow retrieval attacks.** An attacker cannot prevent clients from
187-
being aware of interference with receiving updates by responding to
188-
client requests so slowly that automated updates never complete.
189-
190186
+ **Vulnerability to key compromises.** An attacker, who is able to
191187
compromise a single key or less than a given threshold of keys, cannot
192188
compromise clients. This includes compromising a single online key (such

0 commit comments

Comments
 (0)