aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-03-18 15:41:56 +0100
committerRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-03-18 15:41:56 +0100
commitb4426cd6f8c266edf9183df5de9887e8cde524ef (patch)
tree96960f43da67c8ebbed460fc237bc359acaf697d /README.md
parentd67790456b9e11365795c912c3422fe250c3e5e6 (diff)
minor edits and corrections
Diffstat (limited to 'README.md')
-rw-r--r--README.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/README.md b/README.md
index c5b65ba..a1e8b9c 100644
--- a/README.md
+++ b/README.md
@@ -7,15 +7,15 @@ document. A log leaf contains:
- A _checksum_ that covers something opaque, e.g., an executable binary.
- An _identifier_ that is tied to what the checksum represents, e.g., name,
version, and platform.
-- A _namespace_ that is tied to the submitters verification key, e.g., think of
-it as a hashed public key.
- A _signature_ that covers `checksum` and `identifier` using the submitter's
secret signing key.
+- A _namespace_ that is tied to the submitters verification key, e.g., think of
+it as a hashed public key.
The log verifies that the entry is signed for the specified namespace but
nothing more than that. A client that wishes to enforce transparency logging
could require that, say, a valid Debian package is only used if its checksum
-appears in three logs with a correct identifier and namespace. Such a use-case
+appears in the log with a correct namespace and identifier. Such a use-case
scenario enables us to:
1. **Facilitate detection of compromised signing keys**, e.g., a software
publisher can inspect the log to see if there are any unexpected checksums in
@@ -51,9 +51,9 @@ following factors in mind as the ecosystem bootstraps and develops:
1. Client-side tooling should ultimately fail-close if a signed checksum is not
transparency logged. This requires a reliable and available log ecosystem.
This is easier to achieve if there are multiple independent log operators.
-2. Client-side tooling should verify that the signed checksums appears in one
-or more logs. This requires inclusion proof verification. STFE forces this by never
-issuing so-called _promises to log_ as in [Certificate
+2. Client-side tooling should verify that the signed checksums appears in a log.
+This requires inclusion proof verification. STFE forces this by never issuing
+so-called _promises to log_ as in [Certificate
Transparency](https://tools.ietf.org/html/rfc6962).<sup>[2](#footnote-2)</sup>
3. Client-side tooling should verify that the log is append-only. This requires
consistency proof verification.