diff --git a/README.md b/README.md index cc2d7c2f2a..975099248c 100644 --- a/README.md +++ b/README.md @@ -22,7 +22,7 @@ received content. ## Goals -Notary is based on [The Update Framework](http://theupdateframework.com/), a secure general design for the problem of software distribution and updates. By using TUF, notary achieves a number of key advantages: +Notary is based on [The Update Framework](https://www.theupdateframework.com/), a secure general design for the problem of software distribution and updates. By using TUF, notary achieves a number of key advantages: * **Survivable Key Compromise**: Content publishers must manage keys in order to sign their content. Signing keys may be compromised or lost so systems must be designed in order to be flexible and recoverable in the case of key compromise. TUF's notion of key roles is utilized to separate responsibilities across a hierarchy of keys such that loss of any particular key (except the root role) by itself is not fatal to the security of the system. * **Freshness Guarantees**: Replay attacks are a common problem in designing secure systems, where previously valid payloads are replayed to trick another system. The same problem exists in the software update systems, where old signed can be presented as the most recent. notary makes use of timestamping on publishing so that consumers can know that they are receiving the most up to date content. This is particularly important when dealing with software update where old vulnerable versions could be used to attack users. diff --git a/docs/advanced_usage.md b/docs/advanced_usage.md index 48fd5f4b56..7e91da6897 100644 --- a/docs/advanced_usage.md +++ b/docs/advanced_usage.md @@ -102,14 +102,16 @@ The targets key must be locally managed - to rotate the targets key, for instanc ### Use a Yubikey -Notary can be used with [Yubikey -4](https://www.yubico.com/products/yubikey-hardware/yubikey4/) keys, via a PKCS11 interface when the Yubikey has CCID mode enabled. +Notary can be used with +Yubikey +4 keys, via a PKCS11 interface when the Yubikey has CCID mode enabled. The Yubikey will be prioritized to store root keys, and will require user touch-input for signing. >**Note**: Yubikey support for signing docker images is only supported in the experimental branch. -Yubikey support requires [Yubico PIV libraries (which are bundled with the PIV -tools)](https://www.yubico.com/support/downloads) to be available in standard +Yubikey support requires +Yubico PIV libraries +(which are bundled with the PIV tools) to be available in standard library locations. ## Work with delegation roles diff --git a/docs/changelog.md b/docs/changelog.md index 533480c164..cb23bf6d2e 100644 --- a/docs/changelog.md +++ b/docs/changelog.md @@ -13,16 +13,20 @@ weight=99 ## v0.2 #### 2/24/2016 -Adds support for [delegation roles](https://github.com/theupdateframework/tuf/blob/develop/docs/tuf-spec.txt#L387) in TUF. +Adds support for +delegation +roles in TUF. Delegations allow for easier key management amongst collaborators in a notary trusted collection, and fine-grained permissions on what content each delegate is allowed to modify and sign. This version also supports managing the snapshot key on notary server, which should be used when enabling delegations on a trusted collection. Moreover, this version also adds more key management functionality to the notary CLI, and changes the docker-compose development configuration to use the official MariaDB image. -> Detailed release notes can be found here: [v0.2 release notes](https://github.com/docker/notary/releases/tag/v0.2.0). +> Detailed release notes can be found here: +v0.2 release notes. ## v0.1 #### 11/15/2015 Initial notary non-alpha release. Implements The Update Framework (TUF) with root, targets, snapshot, and timestamp roles to sign and verify content of a trusted collection. -> Detailed release notes can be found here: [v0.1 release notes](https://github.com/docker/notary/releases/tag/v0.1). +> Detailed release notes can be found here: +v0.1 release notes. diff --git a/docs/getting_started.md b/docs/getting_started.md index 78920d805a..36dcdf379a 100644 --- a/docs/getting_started.md +++ b/docs/getting_started.md @@ -24,16 +24,17 @@ and origin of content. This ability is built on a straightforward key management and signing interface to create signed collections and configure trusted publishers. With Notary anyone can provide trust over arbitrary collections of data. Using -[The Update Framework (TUF)](http://theupdateframework.com/) as the underlying -security framework, Notary takes care of the operations necessary to create, manage -and distribute the metadata necessary to ensure the integrity and freshness of -your content. +The Update Framework (TUF) +as the underlying security framework, Notary takes care of the operations necessary +to create, manage and distribute the metadata necessary to ensure the integrity and +freshness of your content. ## Install Notary You can download precompiled notary binary for 64 bit Linux or Mac OS X from the -Notary repository's [releases page on -GitHub](https://github.com/docker/notary/releases). Windows is not officially +Notary repository's +releases page on +GitHub. Windows is not officially supported, but if you are a developer and Windows user, we would appreciate any insight you can provide regarding issues. diff --git a/docs/reference/common-configs.md b/docs/reference/common-configs.md index 04f1d6692a..8acc485d43 100644 --- a/docs/reference/common-configs.md +++ b/docs/reference/common-configs.md @@ -54,9 +54,9 @@ below to configure it. The reporting section contains any configuration for useful for running the service, such as reporting errors. Currently, Notary only supports reporting errors -to [Bugsnag](https://bugsnag.com). +to Bugsnag. -See [bugsnag-go](https://github.com/bugsnag/bugsnag-go/) for more information +See bugsnag-go for more information about these configuration parameters. ```json diff --git a/docs/reference/server-config.md b/docs/reference/server-config.md index 848b472ce1..c527248e24 100644 --- a/docs/reference/server-config.md +++ b/docs/reference/server-config.md @@ -267,7 +267,7 @@ configure it. **Token authentication:** This is an implementation of the same authentication used by version 2 of the -[Docker registry](https://github.com/docker/distribution). (JWT token-based +Docker registry. (JWT token-based authentication post login.)