-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Outside of time checks, are there other ways to determine metadata freshness? #92
Comments
There has been no comment on this Issue since it was introduced in January. What do we need to move this forward? |
There are other ways that metadata can be malicious, but Uptane leaves that up to the developers/testing environment. If a vulnerability is discovered, metadata can be revoked so that future updates do not use the compromised image. I think that the detection of malware is out of scope for Uptane, but we should ensure that the deployment pages make it clear what implementers can do if malware is discovered. |
Should we add "detection of malware" to the "non-goals for the Standard"? And, what would implementers do in this case? |
If a role dev, which was delegated from the top-level targets, issues metadata that includes malware, implementers could do one of two things, depending on how the malware ended up being deployed, and who is able to respond:
If dev's signing keys were compromised, the top-level targets role could also replace these compromised keys. These steps should be taken on both repositories. |
This issue deals with the use of secure monotonic counters, a tamper-resistant counter embedded in a device whose value, once incremented, cannot be reverted back to a previous value. |
@mnm678 since you have already commented on this, can you go ahead and make the suggested changes? |
We are holding off on dealing with this issue for now. It will not be considered for 2.0.0 |
While not urgent and not related to the time server, some recent TUF specification / implementation issues are loosely related to the concept of doing further verification. We should take a look at the Uptane spec and try to reconcile it with TUF to ensure we are applying the same checks everywhere (unless there is a reason not to). theupdateframework/specification#227 |
This is helpful. I'll take a look and try to set up as an issue(s) that we can use for future discussions. |
Refer to this as a freshness issue instead. Maybe rephrase this. |
There are a few unresolved components of this issue to address.
|
I've been wondering about this for ages: there are subtle differences between TUF and Uptane, where I would assume they should be identical. I can't say if that's actually desirable or possible, but it gets confusing when changes are made to one but not the other. |
I'd prefer to have TUF as effectively a subset of Uptane. (This might be
modulo a few TAPs.)
…On Mon, Dec 5, 2022 at 3:05 AM Patti Vacek ***@***.***> wrote:
We should take a look at the Uptane spec and try to reconcile it with TUF
to ensure we are applying the same checks everywhere (unless there is a
reason not to).
I've been wondering about this for ages: there are subtle differences
between TUF and Uptane, where I would assume they should be identical. I
can't say if that's actually desirable or possible, but it gets confusing
when changes are made to one but not the other.
—
Reply to this email directly, view it on GitHub
<#92 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAGROD7XDWYHPBWAM5QBRETWLWO5VANCNFSM4WWCXLZA>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
I 100% agree! That would make life so much easier for implementers. In fact, I would love it if used the same text, formatting, etc. to the extent possible. If not, then I think Uptane sections that are derived from TUF should contain explicit references to the TUF section that it was derived from. |
@JustinCappos can you expand on how TUF could be made "effectively a subset of Uptane"? This sounds like a fundamental repositioning of the two projects that we should make a priority in the New Year. Some guidance in moving this idea forward would be appreciated. |
I believe this TUF/Uptane positioning piece should be moved to its own issue as it certainly is larger than the "metadata freshness" check that the original question asks. |
@JustinCappos has opened a new issue (Issue #141 ) to address the TUF/Uptane positioning question. As for the original question, about alternatives to time checks to confirm freshness, is this a question we want to engage with, or should we just let it be for now? |
Consider this for 2.2 |
This is a spin-off from Issue #45. While that issue focuses on the effects of a Time Server key compromise, the original author had speculated on the thread about whether an implementer could use other methods to determine if metadata is malicious or not. This thread solicits suggestions for what methods could be proposed that would not serve this function without introducing new threats.
The text was updated successfully, but these errors were encountered: