commit a43fdf273de87f5b66b52d95972ef503e76d56e0
Author: Nick Mathewson <ni...@torproject.org>
Date:   Fri Mar 7 11:51:17 2014 -0500

    clarifications in proposal 224 based on questions from George
---
 proposals/224-rend-spec-ng.txt |    8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index 5e4c511..dc8b7b2 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -1186,6 +1186,11 @@ Status: Draft
    point authentication key and introduction point encryption key.  If
    they do, the cell is relayed; if not, it is not.
 
+   (After checking AUTH_KEYID and ENC_KEYID and finding no match, the
+   introduction point should check to see whether a legacy hidden service is
+   running whose PK_ID is the first 20 bytes of AUTH_KEYID.  If so, it
+   behaves as in rend-spec.txt.)
+
    The AUTH_KEYID for an Ed25519 public key is the public key itself.
    The ENC_KEYID for a Curve25519 public key is the first 8 bytes of the
    public key. (This key ID is safe to truncate, since all the keys are
@@ -1250,7 +1255,8 @@ Status: Draft
    The service host then checks whether it has received a cell with
    these contents before. If it has, it silently drops it as a
    replay. (It must maintain a replay cache for as long as it accepts
-   cells with the same encryption key.)
+   cells with the same encryption key. Note that the encryption format below
+   should be non-malleable.)
 
    If the cell is not a replay, it decrypts the ENCRYPTED field,
    establishes a shared key with the client, and authenticates the whole

_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to