diff --git a/threatmodel.md b/threatmodel.md index 806f3e0b..6f402887 100644 --- a/threatmodel.md +++ b/threatmodel.md @@ -10,3 +10,15 @@ It is assumed that an attacker may perform one or more the following actions: While it is not always possible to protect against all scenarios, the system should to the extent possible mitigate and/or reduce the damage caused by a successful attack, detect the occurrence of an attack and notify appropriate parties, yet remain usable for parties operating the system. Furthermore, the system should recover from successful attacks in a way that presents low operational overhead and risk to users. +Attacker Goals: +1. To have a party deploy a malicious artifact under the attacker's control. +2. Trying to have a party install an outdated image. For example, one with known security vulnerabilities. +3. Making images unavailable for installation. +4. Prevent a party from learning about updates to currently installed artifacts. +5. Convince a party to download large amounts of data, such as signatures or metadata, that interfere with the party's system. +6. Enable future attacks of the above types to be carried out more easily. For example, by causing a party to trust the attacker's key. + +## Out of Scope +The following attacks are considered out of scope for Notary v2: +1. Denial of Service (DoS) attacks. +2. Registry validation. A registry may choose to do validation when artifacts are uploaded, but this validation is out of scope of Notary v2.