aboutsummaryrefslogtreecommitdiff
path: root/proposals/224-rend-spec-ng.txt
diff options
context:
space:
mode:
authorGeorge Kadianakis <desnacked@riseup.net>2017-09-06 19:54:29 +0300
committerGeorge Kadianakis <desnacked@riseup.net>2017-09-06 19:54:29 +0300
commit49f9be98a520320a52f69712b1c5e48cade47570 (patch)
treed542f320b484940fd6324faa59dc4513c094ecfb /proposals/224-rend-spec-ng.txt
parent3bdbe6c9f290603c51c9b6700df5473f5c8b9073 (diff)
downloadtorspec-49f9be98a520320a52f69712b1c5e48cade47570.tar.gz
torspec-49f9be98a520320a52f69712b1c5e48cade47570.zip
prop224: We only use upgraded relays for rendezvous points.
Diffstat (limited to 'proposals/224-rend-spec-ng.txt')
-rw-r--r--proposals/224-rend-spec-ng.txt5
1 files changed, 5 insertions, 0 deletions
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index 8ee5cdd..ba057bd 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -1888,6 +1888,11 @@ Table of contents:
this length with random bytes, to make them difficult to distinguish from
older protocols at the rendezvous point.
+ Relays older than 0.2.9.1 should not be used for rendezvous points by next
+ generation onion services because they enforce too-strict legth checks to
+ rendezvous cells. Hence the "HSRend" protocol from proposal#264 should be
+ used to select relays for rendezvous points.
+
5. Encrypting data between client and host
A successfully completed handshake, as embedded in the