aboutsummaryrefslogtreecommitdiff
path: root/socks-extensions.txt
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-12-13 22:42:52 +0000
committerRoger Dingledine <arma@torproject.org>2006-12-13 22:42:52 +0000
commit397ec0f9be57059d264fa59f9411b8bb04b40843 (patch)
tree5956b6d2aa5a9ec39287e7d2a599d7e6097ff3c0 /socks-extensions.txt
parentf0e649519a9aca0c0c2db35e6d05329668666574 (diff)
downloadtorspec-397ec0f9be57059d264fa59f9411b8bb04b40843.tar.gz
torspec-397ec0f9be57059d264fa59f9411b8bb04b40843.zip
Some more documentation and specs for CONNECT_DIR and BEGIN_DIR.
Demand that BEGIN_DIR cells have an empty payload. svn:r9104
Diffstat (limited to 'socks-extensions.txt')
-rw-r--r--socks-extensions.txt10
1 files changed, 9 insertions, 1 deletions
diff --git a/socks-extensions.txt b/socks-extensions.txt
index 46cd983..8097c66 100644
--- a/socks-extensions.txt
+++ b/socks-extensions.txt
@@ -53,7 +53,15 @@ Tor's extensions to the SOCKS protocol
address" portion of the reply.
(This command was not supported before Tor 0.1.2.2-alpha.)
-3. HTTP-resistance
+3. Other command extensions.
+
+ Tor 0.1.2.4-alpha added a new command value: "CONNECT_DIR" [F2].
+ In this case, Tor will open an encrypted direct TCP connection to the
+ directory port of the Tor server specified by address:port (the port
+ specified should be the ORPort of the server). It uses a one-hop tunnel
+ and a "BEGIN_DIR" relay cell to accomplish this secure connection.
+
+4. HTTP-resistance
Tor checks the first byte of each SOCKS request to see whether it looks
more like an HTTP request (that is, it starts with a "G", "H", or "P"). If