[tor-commits] [torspec/master] some typo fixes i found in my sandbox
arma at torproject.org
arma at torproject.org
Sun Apr 14 20:31:08 UTC 2013
commit d48eaa7db2b165b2e1f5817381d978f498806525
Author: Roger Dingledine <arma at torproject.org>
Date: Sun Apr 14 16:30:51 2013 -0400
some typo fixes i found in my sandbox
---
proposals/205-local-dnscache.txt | 7 ++++---
proposals/216-ntor-handshake.txt | 4 +---
2 files changed, 5 insertions(+), 6 deletions(-)
diff --git a/proposals/205-local-dnscache.txt b/proposals/205-local-dnscache.txt
index 624e793..d0a0107 100644
--- a/proposals/205-local-dnscache.txt
+++ b/proposals/205-local-dnscache.txt
@@ -28,8 +28,9 @@ Status: Closed
cache. This lets us implement exit policies and exit enclaves --
if we remember that www.mit.edu is 18.9.22.169 the first time we
see it, then we can avoid making future requests for www.mit.edu
- via any node that blocks net 18. Also, if there happened to be a
- Tor node at 18.9.22.169, we could use that node as an exit enclave.
+ via any node whose exit policy refuses net 18. Also, if there
+ happened to be a Tor node at 18.9.22.169, we could use that node as
+ an exit enclave.
But there are security issues with DNS caches. A malicious exit
node or DNS server can lie. And unlike other traffic, where the
@@ -94,7 +95,7 @@ Status: Closed
controller, the configuration file, trackhostexits maps,
virtual-address maps, DNS replies, and so on.
- With this design, the DNS cache will not be part of the address
+ With this proposed design, the DNS cache will not be part of the address
map. That means that entries in the address map which relied on
happening after the DNS cache entries can no longer work so well.
These would include:
diff --git a/proposals/216-ntor-handshake.txt b/proposals/216-ntor-handshake.txt
index e0c4f63..f76e81c 100644
--- a/proposals/216-ntor-handshake.txt
+++ b/proposals/216-ntor-handshake.txt
@@ -85,7 +85,7 @@ Protocol:
The server sends a CREATED cell containing:
SERVER_PK: Y -- G_LENGTH bytes
- AUTH: H(auth_input, t_mac) -- H_LENGTH byets
+ AUTH: H(auth_input, t_mac) -- H_LENGTH bytes
The client then checks Y is in G^* [see NOTE below], and computes
@@ -211,5 +211,3 @@ Test vectors for HKDF-SHA256:
b4dc21d69363e2895321c06184879d94b18f0784
11be70b767c7fc40679a9440a0c95ea83a23efbf
-
-
More information about the tor-commits
mailing list