summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2007-12-01 08:09:46 +0000
committerNick Mathewson <nickm@torproject.org>2007-12-01 08:09:46 +0000
commit1789f94668f8da029d18efb51bc3d0652488f706 (patch)
treeeda08e0e6866bd45859f43acb422efe595e3f918 /doc
parentf8df8d791e4a58ab65d8903a0522b4cfa55cc163 (diff)
downloadtor-1789f94668f8da029d18efb51bc3d0652488f706.tar.gz
tor-1789f94668f8da029d18efb51bc3d0652488f706.zip
r15087@tombo: nickm | 2007-11-30 22:32:26 -0500
Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER. svn:r12622
Diffstat (limited to 'doc')
-rw-r--r--doc/TODO14
1 files changed, 14 insertions, 0 deletions
diff --git a/doc/TODO b/doc/TODO
index 92d9a79722..9c35111ca3 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -31,6 +31,20 @@ Things we'd like to do in 0.2.0.x:
D 118 if feasible and obvious
D Maintain a skew estimate and use ftime consistently.
- 105+TLS, if possible.
+ . TLS backend work
+ - New list of ciphers for clients
+ o Servers detect new ciphers, and only send ID cert when they
+ get an older cipher list, and only request client cert when
+ they get an older cipher list.
+ - Clients only send certificates when asked for them.
+ o Servers disable callback once negotiation is finished, so
+ that renegotiation happens according to the old rules.
+ - Clients initiate renegotiation immediately on completing
+ a v2 connection.
+ - Servers detect renegotiation, and if there is now a client
+ cert, they adust the client ID.
+ o Detect.
+ - Adjust.
o Add a separate handshake structure that handles version negotiation,
and stores netinfo data until authentication is done.
o Revise versions and netinfo to use separate structure; make