[tor-commits] [torspec/master] Try to clarify some ed25519 stuff more

nickm at torproject.org nickm at torproject.org
Tue Aug 25 16:44:32 UTC 2015


commit 09ff9e202d4a169e95d6962c710bb05fcf062a49
Author: Nick Mathewson <nickm at torproject.org>
Date:   Tue Aug 25 12:44:20 2015 -0400

    Try to clarify some ed25519 stuff more
---
 dir-spec.txt |   26 +++++++++++++++-----------
 1 file changed, 15 insertions(+), 11 deletions(-)

diff --git a/dir-spec.txt b/dir-spec.txt
index bb657e1..9af8933 100644
--- a/dir-spec.txt
+++ b/dir-spec.txt
@@ -381,7 +381,7 @@
     "identity-ed25519" NL "-----BEGIN ED25519 CERT-----" NL certificate
            "-----END ED25519 CERT-----" NL
 
-        [At most once, in second or first position in document]
+        [At most once, in second position in document.]
 
         The certificate is a base64-encoded Ed25519 certificate (see
         cert-spec.txt) terminating =s removed.  When this element is
@@ -1358,10 +1358,8 @@
         encoded, without trailing =s.  This line is included to prevent
         collisions between microdescriptors.
 
-        Implementations MUST ignore "id" lines with unrecognized
-        key-types in place of "rsa1024". Implementations SHOULD ignore
-        "id rsa1024" lines as well: they are added to microdescriptors
-        only to prevent collisions.
+        Implementations SHOULD ignore these lines: they are
+        added to microdescriptors only to prevent collisions.
 
         (Only included when generating microdescriptors for
         consensus-method 18 or later.)
@@ -1373,16 +1371,22 @@
         The node's master Ed25519 identity key, base64 encoded,
         without trailing =s.
 
+        (Only included when generating microdescriptors for
+        consensus-method 21 or later.)
+
+     "id" SP keytype ... NL
+
+        [At most once per distinct keytype.]
+
         Implementations MUST ignore "id" lines with unrecognized
         key-types in place of "rsa1024" or "ed25519"
 
-        (Only included when generating microdescriptors for
-        consensus-method 21 or later.)
 
-   (Note that with microdescriptors, clients do not learn the identity of
-   their routers: they only learn a hash of the identity key.  This is all
-   they need to confirm the actual identity key when doing a TLS handshake,
-   and all they need to put the identity key digest in their CREATE cells.)
+   (Note that with microdescriptors, clients do not learn the RSA identity of
+   their routers: they only learn a hash of the RSA identity key.  This is
+   all they need to confirm the actual identity key when doing a TLS
+   handshake, and all they need to put the identity key digest in their
+   CREATE cells.)
 
 3.4. Exchanging votes
 



More information about the tor-commits mailing list