From 5ba6f2e3ed93007c573bcd22ca55cc9afa6ba29e Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Tue, 20 Sep 2011 11:00:35 -0400 Subject: trivial fixes to prop 176 --- proposals/176-revising-handshake.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'proposals/176-revising-handshake.txt') diff --git a/proposals/176-revising-handshake.txt b/proposals/176-revising-handshake.txt index 8ede6cb..39f4465 100644 --- a/proposals/176-revising-handshake.txt +++ b/proposals/176-revising-handshake.txt @@ -231,7 +231,7 @@ Supersedes: 169 accept v2 certificates. Fortunately, current certificates have a few characteristics that - make them fairly mannered as it is. We say that a certificate + make them fairly well-mannered as it is. We say that a certificate indicates a V2-only server if ALL of the following hold: * The certificate is not self-signed. * There is no DN field set in the certificate's issuer or @@ -280,7 +280,7 @@ Supersedes: 169 On learning the link protocol, the server then sends the client a CERT cell and a NETINFO cell. If the client wants to authenticate to the server, it sends a CERT cell, an AUTHENTICATE - cell, and a NETINFO cell, or it may simply send a NETINFO cell if + cell, and a NETINFO cell; or it may simply send a NETINFO cell if it does not want to authenticate. The CERT cell describes the keys that a Tor instance is claiming -- cgit v1.2.3-54-g00ecf