diff options
author | David Goulet <dgoulet@torproject.org> | 2023-06-13 12:20:56 -0400 |
---|---|---|
committer | David Goulet <dgoulet@torproject.org> | 2023-06-13 12:20:56 -0400 |
commit | 4a14d01cbaea7193bcf4da34f6e413aa73d3f924 (patch) | |
tree | d2cf9ad6b6546fc83cf44126e0e1c9a1b7211cd4 /proposals | |
parent | b345ca044131b2eb18e6ae0d5f23643a92aeff34 (diff) | |
parent | 67f8481596b010c58c406ee5c5631202a59bfc6f (diff) | |
download | torspec-4a14d01cbaea7193bcf4da34f6e413aa73d3f924.tar.gz torspec-4a14d01cbaea7193bcf4da34f6e413aa73d3f924.zip |
Merge branch 'tor-gitlab/mr/139'
Diffstat (limited to 'proposals')
-rw-r--r-- | proposals/343-rend-caa.txt | 16 |
1 files changed, 10 insertions, 6 deletions
diff --git a/proposals/343-rend-caa.txt b/proposals/343-rend-caa.txt index f5d449f..0859690 100644 --- a/proposals/343-rend-caa.txt +++ b/proposals/343-rend-caa.txt @@ -3,6 +3,7 @@ Title: CAA Extensions for the Tor Rendezvous Specification Author: Q Misell <q@as207960.net> Created: 2023-04-25 Status: Open +Ticket: https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/716 Overview: The document defines extensions to the Tor Rendezvous Specification Hidden @@ -22,8 +23,11 @@ Motivation: As Tor hidden service domains are not in the DNS another way to provide the same security benefits as CAA does in the DNS needed to be devised. + It is important to note that a hidden service is not required to publish a CAA + record to obtain a certificate, as is the case in the DNS. + More information about this project in general can be found at - https://e.as207960.net/w4bdyj/Gm2AylEF + https://acmeforonions.org. Specification: To enable maximal code re-use in CA codebases the same CAA record format is @@ -62,10 +66,10 @@ Specification: [At most once] Security Considerations: - The second layer descriptor is signed and MACed in a way that only a party - with access to the secret key of the hidden service could manipulate what is - published there. Therefore, Tor CAA records have at least the same security as - those in the DNS secured by DNSSEC. + The second layer descriptor is signed, encrypted and MACed in a way that only + a party with access to the secret key of the hidden service could manipulate + what is published there. Therefore, Tor CAA records have at least the same + security as those in the DNS secured by DNSSEC. The "caa-critical" flag is visible to anyone with knowledge of the hidden service's public key, however it reveals no information that could be used to @@ -104,4 +108,4 @@ References: [tor-rend-spec-v3] The Tor Project, "Tor Rendezvous Specification - Version 3", - <https://spec.torproject.org/rend-spec-v3>. + <https://spec.torproject.org/rend-spec-v3>.
\ No newline at end of file |