Skip to content

Remove slow retrieval attacks from protections #111

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 2 additions & 6 deletions tuf-spec.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
# <p align="center">The Update Framework Specification

Last modified: **23 September 2020**
Last modified: **29 September 2020**

Version: **1.0.6**
Version: **1.0.7**

We strive to make the specification easy to implement, so if you come across
any inconsistencies or experience any difficulty, do let us know by sending an
Expand Down Expand Up @@ -183,10 +183,6 @@ repo](https://github.com/theupdateframework/specification/issues).
software that is older than that which the client previously knew to be
available.

+ **Slow retrieval attacks.** An attacker cannot prevent clients from
being aware of interference with receiving updates by responding to
client requests so slowly that automated updates never complete.

+ **Vulnerability to key compromises.** An attacker, who is able to
compromise a single key or less than a given threshold of keys, cannot
compromise clients. This includes compromising a single online key (such
Expand Down