aboutsummaryrefslogtreecommitdiff
path: root/rend-spec-v3.txt
AgeCommit message (Collapse)Author
2023-02-08Grammar fixgabi-250
2023-02-07Remove mention of "password" auth in rend-spec.Nick Mathewson
It was never implemented, is not specified, and neither dgoulet nor I can quite remember how it was supposed to work.
2023-02-07Fix name of KP_hs_blind_idNick Mathewson
By our current logic, it needs to have `hs` in it.
2023-02-07Remove K_desc_enc.Nick Mathewson
It has no independent existence outside of the encryption algorithm of 2.5.3.
2023-02-07Name and clarify a few more objects.Nick Mathewson
2023-02-07Rename three keys.Nick Mathewson
These names are slightly shorter and a bit more descriptive IMO, and now (when they are still fresh) is the best time to rename these keys. `hs_intro_tid` becomes `hs_ipt_sid`: It is a _session identifier_ key used with an _introduction point_. Using `ipt` here emphasizes that it is not part of the introduction _handshake_. `hs_intro_ntor` becomes `hss_ntor`. The extra "s" means it is owned by the service. Renaming "intro" here removes the implication that it is held by or used by the introduction point. `onion_ntor` becomes `ntor`: There is no such thing as an ntor key that is not an onion key.
2023-01-31rend-spec: Document how the cross-certificates (don't) work.Nick Mathewson
(See text for more info!)
2023-01-31rend-spec: Clarify that enc-key and auth-key may appear multiple times.Nick Mathewson
The spec says "exactly once", but that only refers to the ntor variant.
2023-01-31Merge branch 'tor-gitlab/mr/109'David Goulet
2023-01-30Document missing NL in the middle layer of an HsDesc.Nick Mathewson
It looks like C tor doesn't include a final newline in the middle layer of its onion service descriptors. That made arti reject them the first time I tried to parse one! Here I document this behavior, and tell other implementations what to do.
2023-01-24rend-spec-v3: Clarify how the time period offset is computed.Nick Mathewson
Based on this email thread with dgoulet: https://lists.torproject.org/pipermail/tor-dev/2023-January/014808.html
2023-01-19Rename onion keys back to K*_onion_ntorIan Jackson
As per review comments
2023-01-19Provide names for HS client authentication keysIan Jackson
2023-01-19Rename KP_hs_intro_auth to KP_hs_intro_tidIan Jackson
2023-01-19Revert "Say that HS identity keys are not the same as relay identity keys"Ian Jackson
This reverts commit 81c1be641557d1cd3fb6d9195de08e9f411be517.
2023-01-19Properly say KP_relayid rather than K_relayidIan Jackson
2023-01-19Properly say KS_onion_ed is a keypairIan Jackson
2023-01-19K_hs_intro_ntor: rename from K_hs_intro_encIan Jackson
Prompted by https://gitlab.torproject.org/tpo/core/torspec/-/merge_requests/105#note_2869614
2023-01-19Make all HS key names contain _hs_Ian Jackson
Suggested here https://gitlab.torproject.org/tpo/core/torspec/-/merge_requests/105#note_2869613
2023-01-19Use _ed rather than _ntor for ed25519 keysIan Jackson
Even the ones that are actually ntor. Perhaps that's wrong and those should be ntor? Personally I like it this way.
2023-01-19Uwe formal notation for credential and subcredentialIan Jackson
In particular, give these formal names which contain "hs" (since they are part of the hidden service protocol, and not any other kind of authentication or authorisation scheme), and "N" to indicate that they are hash-generated nonces, not passwords. Change the references in the formulae, which it really seems to me ought to refer to the formal names.
2023-01-19Give a formal name to shared_random_valueIan Jackson
2023-01-19rend-spec: Clarify and slightly reword credential explanationIan Jackson
Introduce the credential and subcredential before we use them. Talk about the public identity key rather than the credential, when we can.
2023-01-19Say that HS identity keys are not the same as relay identity keysIan Jackson
2023-01-19Introduce names for the principal rendezvous keysIan Jackson
2022-12-20rend-spec-v3: mark some sections as obsoleteNick Mathewson
All supported versions for relays on the Tor network support v3 onion services. As such, we can mark the sections about "how do I use an 0.2.9.x relay as my intro/rend point?" as obsolete.
2022-12-20Clarify that revision counter needs to support 64-bit values.Nick Mathewson
2022-02-17Be explicit about EXT_FIELD_LEN=0Nick Mathewson
2022-02-17ntor3, rend3: clarify extension field defaults.Nick Mathewson
These patch changes describe new default behaviors for extension field lists, as appear in ntor3 and in many places throughout the ntor3 protocol. In general: * Unrecognized extensions MUST be ignored. Additionally, all the following rules apply _unless otherwise stated in the documentation for an extension. * Extensions are sent in sorted order. * Extensions should only be sent once in a message * If you receive multiple copies of an extension, only the first one counts. This comes out of discussions on tor!525.
2021-10-25Fix typos and cleanupDimitris Apostolou
2021-06-23fix some logic errors and typos in specs+proposalsRoger Dingledine
2020-10-27rend-spec-v3: Fix typo, HSDirV3 never existedDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-08-09fix three small typos in the specsRoger Dingledine
2020-03-04rend-spec-v3.txt: Various spec fixes from OBv3 development.George Kadianakis
- "auth-client" is actually a mandatory field right now. - The intro point cross-certificates are the other way around (#29853) - The descriptor MAC includes the salt_len and it's not the standard v3 MAC format.
2019-12-10convert text blocks into widely compatible "blockquote" syntaxHans-Christoph Steiner
This only adds newline characters to make the existing text blocks act like "blockquote" or "code block" syntax in Markdown, asciidoc, and others. This was accomplished by manually reviewing the output of this script: ```bash for f in *.txt; do cat $f | python -c "import sys,re;print(re.sub(r'(\n {0,3}[^ \n][^\n]*\n)( {4,}[^\n]*)', r'\1\n\2', sys.stdin.read()))" > ${f}.tmp mv ${f}.tmp $f done ```
2019-12-02Merge remote-tracking branch 'dgoulet/ticket32617_01'George Kadianakis
2019-11-26rend-spec-v3.txt: Merge prop305 in itDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-26standardize whitespace in the titlesHans-Christoph Steiner
This is one small step towards making these a standard, parsable format.
2019-10-15rend-spec-v3: Update client authorization implementation dateDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-23rend-v3: Tor supports IPv4 and IPv6 link specifiers as of 0.4.1.1-alphateor
Spec for #23588.
2019-08-23rend-v3: single onion services retry intro and rend with 3-hop pathsteor
Spec for 23507 and 23818.
2019-02-15Merge branch 'ope_spec2'Nick Mathewson
2019-02-15Appendix to rend-spec.txt about how to generate revision countersNick Mathewson
2018-10-17HSv3: Actually do base32 in the client auth pubkey example.George Kadianakis
Pointed out by Jean Chevalier.
2018-09-06HSv3: Include HS public identity key to the client auth KDF.George Kadianakis
2018-08-14rend-v3: More improvements to the client auth section.George Kadianakis
- Add file extension to the client auth files. - Better specify suggested client auth file format. - Suggest better client auth logic for client and service side.
2018-08-14rend-v3: Specify the client authorization file formatDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-14rend-v3: Switch to single-file-per-client client auth UX.George Kadianakis
2018-08-06fix a typo twiceRoger Dingledine
2018-07-25Add a missing "teor