Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion of TAP 6: Include specification version in metadata #35

Closed
vladimir-v-diaz opened this issue May 31, 2017 · 9 comments
Closed

Comments

@vladimir-v-diaz
Copy link
Contributor

TAP 6 is available at https://github.com/theupdateframework/taps/blob/master/tap6.md

Pull requests related to TAP 6:
#18

Discussion of TAP 6 on the TUF mailing list:
https://groups.google.com/d/msg/theupdateframework/iDdRsl-gUII/4N9xVahdAwAJ

@vladimir-v-diaz vladimir-v-diaz changed the title Acceptance of TAP 6: Include specification version identifier in metadata Discussion of TAP 6: Include specification version identifier in metadata Jul 24, 2017
@vladimir-v-diaz
Copy link
Contributor Author

An issue with TAP 6 was raised here (it forces parsing of untrusted metadata).

@JustinCappos
Copy link
Member

So @heartsucker raised a good point. @endophage, what are your thoughts?

@JustinCappos
Copy link
Member

The other point we need to define is how clients are supposed to deal with metadata of different versions. Are they supposed to only accept exactly the version they were written for? Should they have rules about what to ignore and what to use?

@endophage
Copy link

Yeah, I don't know how to address the need to parse at least some of the JSON. I don't think putting it in the URL/path is the right solution for two reasons:

  1. That should be reserved for potential changes to how pathing is performed (i.e. the API to access the TUF files).
  2. The version should be signed to ensure an attacker can't change the version and for example, set it to an older mode that causes some newer piece of verification to not be performed.

It's an imperfect solution but maybe we can have the spec_version only apply to the signed component and be included in there? Then it can be parsed like the expires, and version fields after signature verification. My instinct is that the signed section will be the location of most spec changes while signatures will see very little iteration.

@JustinCappos
Copy link
Member

JustinCappos commented Aug 18, 2017 via email

@vladimir-v-diaz
Copy link
Contributor Author

I also feel that the "signed" portion of metadata is the best place to store "spec_version." Parsing untrusted JSON/metadata is a separate issue in my opinion, and we should deal with it in a separate TAP/issue. Parsing untrusted data is a problem for all of the other keys in "signed," as well. Perhaps the solution is signing the "signed" portion as it is written to disk/file, or maybe the base64 string is the best option... Nevertheless, we should discuss this issue elsewhere.

Does anyone not agree? May I go ahead and accept TAP 6 if there is no other disagreement?

@heartsucker
Copy link
Contributor

How concerned are we all about the need to parse at least some JSON?

This should be fine as the signature verification would happen first, and then we'd check the spec_version field like we check the expires and other fields. I agree with @endophage that the signatures portion is unlikely to see iteration after TAP 9. With that change, each signature object contains the absolute minimum amount of data necessary to check a signature, so it (hopefully) won't change again.

@vladimir-v-diaz vladimir-v-diaz changed the title Discussion of TAP 6: Include specification version identifier in metadata Discussion of TAP 6: Include specification version in metadata Aug 25, 2017
@JustinCappos
Copy link
Member

JustinCappos commented Aug 25, 2017 via email

@vladimir-v-diaz
Copy link
Contributor Author

PR has been merged. Closing this issue now that TAP 6 has been accepted!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants