diff options
author | Nick Mathewson <nickm@torproject.org> | 2007-12-01 08:09:46 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2007-12-01 08:09:46 +0000 |
commit | 1789f94668f8da029d18efb51bc3d0652488f706 (patch) | |
tree | eda08e0e6866bd45859f43acb422efe595e3f918 /doc | |
parent | f8df8d791e4a58ab65d8903a0522b4cfa55cc163 (diff) | |
download | tor-1789f94668f8da029d18efb51bc3d0652488f706.tar.gz tor-1789f94668f8da029d18efb51bc3d0652488f706.zip |
r15087@tombo: nickm | 2007-11-30 22:32:26 -0500
Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER.
svn:r12622
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 14 |
1 files changed, 14 insertions, 0 deletions
@@ -31,6 +31,20 @@ Things we'd like to do in 0.2.0.x: D 118 if feasible and obvious D Maintain a skew estimate and use ftime consistently. - 105+TLS, if possible. + . TLS backend work + - New list of ciphers for clients + o Servers detect new ciphers, and only send ID cert when they + get an older cipher list, and only request client cert when + they get an older cipher list. + - Clients only send certificates when asked for them. + o Servers disable callback once negotiation is finished, so + that renegotiation happens according to the old rules. + - Clients initiate renegotiation immediately on completing + a v2 connection. + - Servers detect renegotiation, and if there is now a client + cert, they adust the client ID. + o Detect. + - Adjust. o Add a separate handshake structure that handles version negotiation, and stores netinfo data until authentication is done. o Revise versions and netinfo to use separate structure; make |