[or-cvs] r16003: Remove from the spec a reference forward-compatiblity featur (tor/trunk/doc/spec)
nickm at seul.org
nickm at seul.org
Thu Jul 17 02:35:18 UTC 2008
Author: nickm
Date: 2008-07-16 22:35:17 -0400 (Wed, 16 Jul 2008)
New Revision: 16003
Modified:
tor/trunk/doc/spec/tor-spec.txt
Log:
Remove from the spec a reference forward-compatiblity feature that we never implemented (bug 774). Also remove backward compatibility notes for versions older than 0.1.1.15-rc; those are long-unsupported, and do not work with the current network. Still to fix are future-tense statements about 0.1.2.x.
Modified: tor/trunk/doc/spec/tor-spec.txt
===================================================================
--- tor/trunk/doc/spec/tor-spec.txt 2008-07-16 22:46:22 UTC (rev 16002)
+++ tor/trunk/doc/spec/tor-spec.txt 2008-07-17 02:35:17 UTC (rev 16003)
@@ -5,9 +5,11 @@
Roger Dingledine
Nick Mathewson
-Note: This document aims to specify Tor as implemented in 0.1.2.x
-and earlier. Future versions of Tor may implement improved protocols, and
-compatibility is not guaranteed.
+Note: This document aims to specify Tor as implemented in 0.2.1.x. Future
+versions of Tor may implement improved protocols, and compatibility is not
+guaranteed. Compatibility notes are given for versions 0.1.1.15-rc and
+later; earlier versions are not compatible with the Tor network as of this
+writing.
This specification is not a design document; most design criteria
are not examined. For more information on why Tor acts as it does,
@@ -293,8 +295,8 @@
DESTROY: Payload contains a reason for closing the circuit.
(see 5.4)
Upon receiving any other value for the command field, an OR must
- drop the cell. [XXXX Versions prior to 0.1.0.?? logged a warning
- when dropping the cell; this is bad behavior. -NM]
+ drop the cell. Since more cell types may be added in the future, ORs
+ should generally not warn when encountering unrecognized commands.
The payload is padded with 0 bytes.
@@ -419,11 +421,6 @@
As usual with DH, x and y MUST be generated randomly.
-[
- To implement backward-compatible version negotiation, parties MUST
- drop CREATE cells with all-[00] onion-skins.
-]
-
5.1.1. CREATE_FAST/CREATED_FAST cells
When initializing the first hop of a circuit, the OP has already
@@ -445,9 +442,6 @@
The values of X and Y must be generated randomly.
- [Versions of Tor before 0.1.0.6-rc did not support these cell types;
- clients should not send CREATE_FAST cells to older Tor servers.]
-
If an OR sees a circuit created with CREATE_FAST, the OR is sure to be the
first hop of a circuit. ORs SHOULD reject attempts to create streams with
RELAY_BEGIN exiting the circuit at the first hop: letting Tor be used as a
@@ -469,10 +463,6 @@
the server. Discarding other keys may allow attacks to learn bits of
the private key.)
- (The mainline Tor implementation, in the 0.1.1.x-alpha series, discarded
- all g^x values less than 2^24, greater than p-2^24, or having more than
- 1024-16 identical bits. This served no useful purpose, and we stopped.)
-
If CREATE or EXTEND is used to extend a circuit, the client and server
base their key material on K0=g^xy, represented as a big-endian unsigned
integer.
@@ -626,9 +616,6 @@
11 -- DESTROYED (The circuit was destroyed w/o client TRUNCATE)
12 -- NOSUCHSERVICE (Request for unknown hidden service)
- [Versions of Tor prior to 0.1.0.11 didn't send reasons; implementations
- MUST accept empty TRUNCATED and DESTROY cells.]
-
5.5. Routing relay cells
When an OR receives a RELAY cell, it checks the cell's circID and
@@ -732,9 +719,7 @@
If the RELAY cell is recognized but the relay command is not
understood, the cell must be dropped and ignored. Its contents
- still count with respect to the digests, though. [Before
- 0.1.1.10, Tor closed circuits when it received an unknown relay
- command. Perhaps this will be more forward-compatible. -RD]
+ still count with respect to the digests, though.
6.2. Opening streams and transferring data
@@ -766,10 +751,9 @@
An address type (6) [1 octet]
The IPv6 address to which the connection was made [16 octets]
A number of seconds (TTL) for which the address may be cached [4 octets]
- [XXXX Versions of Tor before 0.1.1.6 ignore and do not generate the TTL
- field. No version of Tor currently generates the IPv6 format.
+ [XXXX No version of Tor currently generates the IPv6 format.]
- Tor servers before 0.1.2.0 set the TTL field to a fixed value. Later
+ [Tor servers before 0.1.2.0 set the TTL field to a fixed value. Later
versions set the TTL to the last value seen from a DNS server, and expire
their own cached entries after a fixed interval. This prevents certain
attacks.]
@@ -831,8 +815,8 @@
non-directory server.)
(With REASON_EXITPOLICY, the 4-byte IPv4 address or 16-byte IPv6 address
- forms the optional data; no other reason currently has extra data.
- As of 0.1.1.6, the body also contains a 4-byte TTL.)
+ forms the optional data, along with a 4-byte TTL; no other reason
+ currently has extra data.)
OPs and ORs MUST accept reasons not on the above list, since future
versions of Tor may provide more fine-grained reasons.
More information about the tor-commits
mailing list