diff options
author | Tom Ritter <tom@ritter.vg> | 2017-10-20 13:41:38 -0500 |
---|---|---|
committer | Tom Ritter <tom@ritter.vg> | 2017-10-20 13:44:11 -0500 |
commit | 9e9d61ba48c5ec6a854eef730a6cca8323c7a5f9 (patch) | |
tree | 1ea248b2bd9856e3f72cbc2f911f6dbbffeebd03 /control-spec.txt | |
parent | 144f33690d523acad9cbe54af26e8dac83f1adb2 (diff) | |
download | torspec-9e9d61ba48c5ec6a854eef730a6cca8323c7a5f9.tar.gz torspec-9e9d61ba48c5ec6a854eef730a6cca8323c7a5f9.zip |
Add clarifications to the authenticaiton mechanisms
Diffstat (limited to 'control-spec.txt')
-rw-r--r-- | control-spec.txt | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/control-spec.txt b/control-spec.txt index 555e625..6b2c2eb 100644 --- a/control-spec.txt +++ b/control-spec.txt @@ -360,6 +360,12 @@ Sent from the client to the server. The syntax is: "AUTHENTICATE" [ SP 1*HEXDIG / QuotedString ] CRLF + This command is used to authenticate to the server. The provided string is + either the original password represented as a QuotedString if HASHEDPASSWORD + is to be used, the contents of the cookie file formatted as hexidecimal if + COOKIE is to be used, or the resulting HMAC if AUTHCHALLENGE has been + previously sent (and therefore SAFECOOKIE is to be used). + The server responds with "250 OK" on success or "515 Bad authentication" if the authentication cookie is incorrect. Tor closes the connection on an authentication failure. @@ -1377,6 +1383,9 @@ ClientNonce = 2*HEXDIG / QuotedString + This command is used to begin the authentication routine for the + SAFECOOKIE method of authentication. + If the server accepts the command, the server reply format is: "250 AUTHCHALLENGE" SP "SERVERHASH=" ServerHash |