aboutsummaryrefslogtreecommitdiff
path: root/proposals/220-ecc-id-keys.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-02-24 12:33:59 -0500
committerNick Mathewson <nickm@torproject.org>2014-02-24 12:33:59 -0500
commit92cc4f9c2d28cb49c43eeaa4243df200fa22d387 (patch)
tree5112eb9c5ba180efdb86918692081f74e4417553 /proposals/220-ecc-id-keys.txt
parent9492dbb6efcdcc7b60325dcd12665d10a9a53a5c (diff)
parent65c048ea31a10e8c30a3c9e4dd3d92bad8f7eccb (diff)
downloadtorspec-92cc4f9c2d28cb49c43eeaa4243df200fa22d387.tar.gz
torspec-92cc4f9c2d28cb49c43eeaa4243df200fa22d387.zip
Merge remote-tracking branch 'linus/prop220-nits'
Conflicts: proposals/220-ecc-id-keys.txt
Diffstat (limited to 'proposals/220-ecc-id-keys.txt')
-rw-r--r--proposals/220-ecc-id-keys.txt10
1 files changed, 5 insertions, 5 deletions
diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt
index 153e0c9..fef8beb 100644
--- a/proposals/220-ecc-id-keys.txt
+++ b/proposals/220-ecc-id-keys.txt
@@ -11,8 +11,8 @@ Status: Draft
0. Introduction
- In current Tor designs, identity keys are limited to 1024-bit RSA
- keys.
+ In current Tor designs, router identity keys are limited to
+ 1024-bit RSA keys.
Clearly, that should change, because RSA doesn't represent a good
performance-security tradeoff nowadays, and because 1024-bit RSA is
@@ -220,7 +220,7 @@ Status: Draft
Current versions of Tor will handle these new formats by ignoring the
new fields, and not checking any ed25519 information.
- New version of Tor will have a flag that tells them whether to check
+ New versions of Tor will have a flag that tells them whether to check
ed25519 information. When it is set, they must check:
* All RSA information and signatures that Tor implementations
@@ -238,7 +238,7 @@ Status: Draft
2.5.2. Extra-info documents
- Extrainfo documents now include "identity-ed25519" and
+ Extra-info documents now include "identity-ed25519" and
"router-signature-ed25519" fields in the same positions in which they
appear in router descriptors.
@@ -556,7 +556,7 @@ Status: Draft
7. Hidden service changes out of scope
- Hidden services need to be able to identity nodes by ECC keys, just as
+ Hidden services need to be able to identify nodes by ECC keys, just as
they will need to include ntor keys as well as TAP keys. Not just
yet though. This needs to be part of a bigger hidden service
revamping strategy.