aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorRasmus Dahlberg <32567301+rgdd@users.noreply.github.com>2021-04-12 12:35:39 +0200
committerGitHub <noreply@github.com>2021-04-12 12:35:39 +0200
commit0306d7ea5e8f1a96d70c1489d1f70f43226f0463 (patch)
tree99346b2f0f5845b87995e30bcecca384cd3f930a /README.md
parent799177cc3a591916b3ae028d7dde9df388cd7a08 (diff)
parentca89938c9f72ed189a85b7de10f677aa85dd16d5 (diff)
Merge pull request #3 from system-transparency/fix-readme-nits
Fix readme nits
Diffstat (limited to 'README.md')
-rw-r--r--README.md33
1 files changed, 16 insertions, 17 deletions
diff --git a/README.md b/README.md
index e9a4713..2d5ba5c 100644
--- a/README.md
+++ b/README.md
@@ -1,22 +1,21 @@
# System Transparency Front-End (STFE)
STFE is a [Trillian](https://transparency.dev/#trillian)
[personality](https://github.com/google/trillian/blob/master/docs/Personalities.md)
-that allows you to log signed checksums. What a checksum covers is up to the
-submitter. For example, it could be a Firefox update, a Debian package, or a
-document. A log leaf contains:
-- A _checksum_ that covers something opaque, e.g., an executable binary.
-- An _identifier_ that is tied to what the checksum represents, e.g., name,
-version, and platform.
-- A _signature_ that covers `checksum` and `identifier` using the submitter's
-secret signing key.
+that allows you to log signed checksums. What a checksum represents is up to
+the submitter. For example, it could be a Firefox update, a Debian package, or
+a document. A log leaf contains:
+- A _checksum_ that represents a data item of opaque type.
+- An _identifier_ that is tied to what the checksum represents.
+- A _signature_ over `checksum` and `identifier` using the submitter's secret
+signing key.
- A _namespace_ that is tied to the submitter's verification key, e.g., think of
it as a hashed public key.
-The log verifies that the entry is signed for the specified namespace but
-nothing more than that. A client that wishes to enforce transparency logging
-could require that, say, a valid Debian package is only used if its checksum
-appears in the log with a correct namespace and identifier. Such a use-case
-scenario enables us to:
+The log only verifies that an entry's checksum and identifier are
+cryptographically signed based on the specified namespace. A client that wishes
+to enforce transparency logging could require that, say, a valid Debian package
+is only used if its checksum appears in the log with a correct namespace and
+identifier. This allows us to:
1. **Facilitate detection of compromised signing keys**, e.g., a software
publisher can inspect the log to see if there are any unexpected checksums in
their own signing namespace(s).
@@ -87,10 +86,10 @@ checksums. As far as we can tell the log's leaf entry must at minimum indicate:
2. What opaque data does the checksum _refer to_ such that the log entry can be
analyzed by monitors.
-Additional metadata needs can be included in the data that the checksum covers,
-and the data itself can be stored in a public unauthenticated archive. Log APIs
-and data formats should also follow the principle of minimal common denominator.
-We are still in the process of analyzing this further.
+Additional metadata needs can be included in the data that the checksum
+represents, and the data itself can be stored in a public unauthenticated
+archive. Log APIs and data formats should also follow the principle of minimal
+common denominator. We are still in the process of analyzing this further.
### Spam and log poisoning
Trillian personalities usually have an _admission criteria_ that determines who