[tor-commits] [torspec/master] Add 240, tweak 227
nickm at torproject.org
nickm at torproject.org
Sat Jan 10 20:46:03 UTC 2015
commit 3c0422acc464a9da74bc35d3027ae966bf59d8d0
Author: Nick Mathewson <nickm at torproject.org>
Date: Sat Jan 10 15:45:59 2015 -0500
Add 240, tweak 227
---
proposals/000-index.txt | 2 +
proposals/227-vote-on-package-fingerprints.txt | 5 +--
proposals/240-auth-cert-revocation.txt | 48 ++++++++++++++++++++++++
3 files changed, 52 insertions(+), 3 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 9af0405..b8d4490 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -160,6 +160,7 @@ Proposals by number:
237 All relays are directory servers [OPEN]
238 Better hidden service stats from Tor relays [DRAFT]
239 Consensus Hash Chaining [DRAFT]
+240 Early signing key revocation for directory authorities [DRAFT]
Proposals by status:
@@ -184,6 +185,7 @@ Proposals by status:
235 Stop assigning (and eventually supporting) the Named flag [for 0.2.5]
238 Better hidden service stats from Tor relays
239 Consensus Hash Chaining
+ 240 Early signing key revocation for directory authorities
NEEDS-REVISION:
131 Help users to verify they are using Tor
190 Bridge Client Authorization Based on a Shared Secret
diff --git a/proposals/227-vote-on-package-fingerprints.txt b/proposals/227-vote-on-package-fingerprints.txt
index d82f76c..83ac3da 100644
--- a/proposals/227-vote-on-package-fingerprints.txt
+++ b/proposals/227-vote-on-package-fingerprints.txt
@@ -31,12 +31,11 @@ Status: Open
VERSION = NONSPACE
URL = NONSPACE
DIGESTS = DIGEST | DIGESTS SP DIGEST
- DIGEST = DIGESTTYPE "=" BASE64
+ DIGEST = DIGESTTYPE "=" DIGESTVAL
NONSPACE = one or more non-space printing characters
- BASE64 = one or more base-64 characters, with trailing =s
- removed.
+ DIGESTVAL = any number of non-=, non-" " characters.
SP = " "
NL = a newline
diff --git a/proposals/240-auth-cert-revocation.txt b/proposals/240-auth-cert-revocation.txt
new file mode 100644
index 0000000..fa426ca
--- /dev/null
+++ b/proposals/240-auth-cert-revocation.txt
@@ -0,0 +1,48 @@
+Filename: 240-auth-cert-revocation.txt
+Title: Early signing key revocation for directory authorities.
+Author: Nick Mathewson
+Created: 09-Jan-2015
+Status: Draft
+
+1. Overview
+
+ This proposal describes a simple way for directory authorities to
+ perform signing key revocation.
+
+2. Specification
+
+ We add the following lines to the authority signing certificate
+ format:
+
+ revoked-signing-key SP algname SP FINGERPRINT NL
+
+ This line may appear zero or more times.
+
+ It indicates that a particular not-yet-expired signing key should not
+ be used.
+
+3. Client and cache operation
+
+ No client or cache should retain, use, or serve any certificate whose
+ signing key is described in a revoked-signing-key line in a
+ certificate with the same authority identity key. (If the signing
+ key fingerprint appears in a cert with a different identity key, it
+ has no effect: you aren't allowed to revoke other people's keys.)
+
+ No Tor instance should download a certificate whose signing
+ key,identity key combination is known to be revoked.
+
+4. Authority operator interface.
+
+ The 'tor-gencert' command will take a number of older certificates to
+ revoke as optional command-line arguments. It will include their
+ keys in revoked-signing-key lines only if they are still valid, or
+ have been expired for no more than a month.
+
+5. Circular revocation
+
+ My first attempt at writing a proposal here included a lengthy
+ section about how to handle cases where certificate A revokes the key
+ of certificate B, and certificate B revokes the key of certificate A.
+
+ Instead, I am inclined to say that this is a MUST NOT.
More information about the tor-commits
mailing list