@@ -1222,42 +1222,36 @@ non-volatile storage as FILENAME.EXT.
1222
1222
trusted root metadata file. If the new targets metadata file is not signed
1223
1223
as required, discard it, abort the update cycle, and report the failure.
1224
1224
1225
- * ** 4.3** . ** Check for a rollback attack.** The version number of the trusted
1226
- targets metadata file, if any, MUST be less than or equal to the version
1227
- number of the new targets metadata file. If the new targets metadata file is
1228
- older than the trusted targets metadata file, discard it, abort the update
1229
- cycle, and report the potential rollback attack.
1230
-
1231
- * ** 4.4** . ** Check for a freeze attack.** The latest known time should be
1225
+ * ** 4.3** . ** Check for a freeze attack.** The latest known time should be
1232
1226
lower than the expiration timestamp in the new targets metadata file. If so,
1233
1227
the new targets metadata file becomes the trusted targets metadata file. If
1234
1228
the new targets metadata file is expired, discard it, abort the update cycle,
1235
1229
and report the potential freeze attack.
1236
1230
1237
- * ** 4.5 ** . ** Perform a preorder depth-first search for metadata about the
1231
+ * ** 4.4 ** . ** Perform a preorder depth-first search for metadata about the
1238
1232
desired target, beginning with the top-level targets role.** Note: If
1239
- any metadata requested in steps 4.5 .1 - 4.5 .2.3 cannot be downloaded nor
1233
+ any metadata requested in steps 4.4 .1 - 4.4 .2.3 cannot be downloaded nor
1240
1234
validated, end the search and report that the target cannot be found.
1241
1235
1242
- * ** 4.5 .1** . If this role has been visited before, then skip this role (so
1236
+ * ** 4.4 .1** . If this role has been visited before, then skip this role (so
1243
1237
that cycles in the delegation graph are avoided). Otherwise, if an
1244
1238
application-specific maximum number of roles have been visited, then go to
1245
1239
step 5 (so that attackers cannot cause the client to waste excessive
1246
1240
bandwidth or time). Otherwise, if this role contains metadata about the
1247
1241
desired target, then go to step 5.
1248
1242
1249
- * ** 4.5 .2** . Otherwise, recursively search the list of delegations in order
1243
+ * ** 4.4 .2** . Otherwise, recursively search the list of delegations in order
1250
1244
of appearance.
1251
1245
1252
- * ** 4.5 .2.1** . If the current delegation is a multi-role delegation,
1246
+ * ** 4.4 .2.1** . If the current delegation is a multi-role delegation,
1253
1247
recursively visit each role, and check that each has signed exactly the
1254
1248
same non-custom metadata (i.e., length and hashes) about the target (or
1255
1249
the lack of any such metadata).
1256
1250
1257
- * ** 4.5 .2.2** . If the current delegation is a terminating delegation,
1251
+ * ** 4.4 .2.2** . If the current delegation is a terminating delegation,
1258
1252
then jump to step 5.
1259
1253
1260
- * ** 4.5 .2.3** . Otherwise, if the current delegation is a non-terminating
1254
+ * ** 4.4 .2.3** . Otherwise, if the current delegation is a non-terminating
1261
1255
delegation, continue processing the next delegation, if any. Stop the
1262
1256
search, and jump to step 5 as soon as a delegation returns a result.
1263
1257
0 commit comments