diff options
author | Roger Dingledine <arma@torproject.org> | 2006-12-13 22:42:52 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-12-13 22:42:52 +0000 |
commit | 5cce710e2b86ffcaf3bad81b95ba94f26f1d2838 (patch) | |
tree | b370d14af5971a4420dfc30b893caafa02382b6f /doc | |
parent | 04409f202d2f6c9ceb3619aa8f19adb013336e5f (diff) | |
download | tor-5cce710e2b86ffcaf3bad81b95ba94f26f1d2838.tar.gz tor-5cce710e2b86ffcaf3bad81b95ba94f26f1d2838.zip |
Some more documentation and specs for CONNECT_DIR and BEGIN_DIR.
Demand that BEGIN_DIR cells have an empty payload.
svn:r9104
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 5 | ||||
-rw-r--r-- | doc/socks-extensions.txt | 10 | ||||
-rw-r--r-- | doc/tor-spec.txt | 3 |
3 files changed, 16 insertions, 2 deletions
@@ -54,7 +54,10 @@ R - Specify actual events. o Implement o Use for something, so we can be sure it works. o Test and debug - - be able to connect without having a server descriptor, to bootstrap + - turn the received socks addr:port into a digest for setting .exit + - be able to connect without having a server descriptor, to bootstrap. + - handle connect-dir streams that don't have a chosen_exit_name set. + - include ORPort in DirServers lines so we can know where to connect. N - Document .noconnect addresses... but where? diff --git a/doc/socks-extensions.txt b/doc/socks-extensions.txt index 46cd983f84..8097c66456 100644 --- a/doc/socks-extensions.txt +++ b/doc/socks-extensions.txt @@ -53,7 +53,15 @@ Tor's extensions to the SOCKS protocol address" portion of the reply. (This command was not supported before Tor 0.1.2.2-alpha.) -3. HTTP-resistance +3. Other command extensions. + + Tor 0.1.2.4-alpha added a new command value: "CONNECT_DIR" [F2]. + In this case, Tor will open an encrypted direct TCP connection to the + directory port of the Tor server specified by address:port (the port + specified should be the ORPort of the server). It uses a one-hop tunnel + and a "BEGIN_DIR" relay cell to accomplish this secure connection. + +4. HTTP-resistance Tor checks the first byte of each SOCKS request to see whether it looks more like an HTTP request (that is, it starts with a "G", "H", or "P"). If diff --git a/doc/tor-spec.txt b/doc/tor-spec.txt index 1f18f199c6..ca82e1cd74 100644 --- a/doc/tor-spec.txt +++ b/doc/tor-spec.txt @@ -733,6 +733,9 @@ TODO: If the Tor server is not running a directory service, it should respond with a REASON_NOTDIRECTORY RELAY_END cell. + Clients MUST generate an all-zero payload for RELAY_BEGIN_DIR cells, + and servers MUST ignore the payload. + [RELAY_BEGIN_DIR was not supported before Tor 0.1.2.2-alpha; clients SHOULD NOT send it to routers running earlier versions of Tor.] |