Skip to content

Commit

Permalink
Explain that preinstalled metadata is necessary for authentication.
Browse files Browse the repository at this point in the history
Suggested-by: Trishank Karthik Kuppusamy <[email protected]>
Signed-off-by: Patrick Vacek <[email protected]>
  • Loading branch information
pattivacek committed Feb 20, 2020
1 parent 11558ad commit a2fc560
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion uptane-standard.md
Original file line number Diff line number Diff line change
Expand Up @@ -657,7 +657,7 @@ ECUs MUST have a secure source of time. An OEM/Uptane implementor MAY use any ex

For an ECU to be capable of receiving Uptane-secured updates, it MUST have the following data provisioned at the time it is manufactured or installed in the vehicle:

1. A sufficiently recent copy of required Uptane metadata at the time of manufacture or install. See the Uptane Deployment Considerations ({{DEPLOY}}) for more information.
1. A sufficiently recent copy of required Uptane metadata at the time of manufacture or install. This is necessary for the ECU to authenticate that the remote repository is legitmate when it first downloads metadata in the field. See the Uptane Deployment Considerations ({{DEPLOY}}) for more information.
* Partial verification Secondary ECUs MUST have the Root and Targets metadata from the Director repository (to reduce the scope of rollback and replay attacks). These ECUs MAY also have metadata from other roles or the Image repository if they will be used by the Secondary.
* Full verification ECUs MUST have a complete set of metadata (Root, Targets, Snapshot, and Timestamp) from both repositories (to prevent rollback and replay attacks), as well as the repository mapping metadata ({{repo_mapping_meta}}). Delegations are not required.
2. The current time, or a secure attestation of a sufficiently recent time.
Expand Down

0 comments on commit a2fc560

Please sign in to comment.