diff options
author | Nick Mathewson <nickm@torproject.org> | 2007-11-02 03:21:54 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2007-11-02 03:21:54 +0000 |
commit | dddff3acf9f95d8eb27d36fd9b2d960d861e66f6 (patch) | |
tree | bace05f47fcc150c02236206af4874cdeb034c42 | |
parent | 2136c82ae0ea15714ac3762a4d81ea95e42c3b02 (diff) | |
download | tor-dddff3acf9f95d8eb27d36fd9b2d960d861e66f6.tar.gz tor-dddff3acf9f95d8eb27d36fd9b2d960d861e66f6.zip |
r14625@tombo: nickm | 2007-11-01 23:21:25 -0400
Merge revised behavior on proposal 105
svn:r12323
-rw-r--r-- | doc/spec/proposals/105-handshake-revision.txt | 14 |
1 files changed, 11 insertions, 3 deletions
diff --git a/doc/spec/proposals/105-handshake-revision.txt b/doc/spec/proposals/105-handshake-revision.txt index 634c1c50d6..bd46dbd0ce 100644 --- a/doc/spec/proposals/105-handshake-revision.txt +++ b/doc/spec/proposals/105-handshake-revision.txt @@ -193,9 +193,17 @@ Proposal: traffic through his own computers to enable timing and packet-counting attacks. - If a party connects to an OR based on an EXTEND cell, and the address - given in the EXTEND cell is not listed in the NETINFO cell, the first - party SHOULD close the connection as a likely MITM attack. + A Tor instance should use the other Tor's reported address + information as part of logic to decide whether to treat a given + connection as suitable for extending circuits to a given address/ID + combination. When we get an extend request, we use an use an + existing OR connection if the ID matches, and ANY of the following + conditions hold: + - The IP matches the requested IP. + - We know that the IP we're using is canonical because it was + listed in the NETINFO cell. + - We know that the IP we're using is canonical because it was + listed in the server descriptor. [NOTE: The NETINFO cell is assigned the command number 8.] |