Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Benjamin J. Thompson
Tor
Commits
a8a0542c
Commit
a8a0542c
authored
15 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
minor fixes in proposal 169
still need to finish reading it, but so far so good
parent
60343209
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/spec/proposals/169-eliminating-renegotiation.txt
+9
-9
9 additions, 9 deletions
doc/spec/proposals/169-eliminating-renegotiation.txt
with
9 additions
and
9 deletions
doc/spec/proposals/169-eliminating-renegotiation.txt
+
9
−
9
View file @
a8a0542c
...
...
@@ -31,7 +31,7 @@ Target: 0.2.2
In the current Tor TLS connection handshake protocol ("V2", or
"renegotiating"), the parties begin with a single certificate
sent from the server (responder) to the client (initiator), and
then renegotiate
d
to a two-certs-from-each-authenticating party.
then renegotiate to a two-certs-from-each-authenticating party.
We made this change to make Tor's handshake look like a browser
speaking SSL to a webserver. (See proposal 130, and
tor-spec.txt.) To tell whether to use the V1 or V2 handshake,
...
...
@@ -77,12 +77,12 @@ Target: 0.2.2
certificate and let the handshake complete.
- Do not accept any data until the client has renegotiated.
- When the client is renegotiating, send a certificate
chain, and expect (possibly multiple certificates in
reply
)
.
chain, and expect (possibly multiple
)
certificates in
reply.
- Check the certificates when the renegotiation is done.
Then exchange VERSIONS cells.
Late in 2009, researchers found a flaw in most application
'
s use
Late in 2009, researchers found a flaw in most applications
'
use
of TLS renegotiation: Although TLS renegotiation does not
reauthenticate any information exchanged before the renegotiation
takes place, many applications were treating it as though it did,
...
...
@@ -118,10 +118,10 @@ Target: 0.2.2
with Tor cells instead of with TLS.
Using _yet another_ variant response from the responder (server),
we allow the client to learn that doesn't need to rehandshake
,
and
it
can use a cell-based authentication system. Once the
we allow the client to learn that
it
doesn't need to rehandshake
and can
instead
use a cell-based authentication system. Once the
TLS handshake is done, the client and server exchange VERSIONS
cells to determine
what
link protocol version (including
cells to determine link protocol version (including
handshake version). If they're using the handshake version
specified here, the client and server arrive at link protocol
version 3 (or higher), and use cells to exchange further
...
...
@@ -134,7 +134,7 @@ Target: 0.2.2
handshake or later, so we can't encode more information there.
We can, however, change the DN in the certificate passed by the
server
to
back the client. Currently, all V2 certificates are
server back
to
the client. Currently, all V2 certificates are
generated with CN values ending with ".net". I propose that we
have the ".net" commonName ending reserved to indicate the V2
protocol, and use commonName values ending with ".com" to
...
...
@@ -220,7 +220,7 @@ Target: 0.2.2
cert for its identity.
Tor instances MUST ignore any certificate with an unrecognized
CertType or CertPurpose.
CertType or CertPurpose
, and MUST ignore extra bytes in the cert
.
The AUTHENTICATE cell proves to the server that the client with
whom it completed the initial TLS handshake is the one possessing
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment