[tor-commits] [torspec/master] prop224: Minor fixes to descriptor format
asn at torproject.org
asn at torproject.org
Sat Apr 9 11:15:20 UTC 2016
commit fdd5cc01bcb3c02901c51e3bd9f5812e4066c43b
Author: John Brooks <special at torproject.org>
Date: Thu Mar 10 19:25:45 2016 +0100
prop224: Minor fixes to descriptor format
---
proposals/224-rend-spec-ng.txt | 12 +++++++-----
1 file changed, 7 insertions(+), 5 deletions(-)
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index f7a4304..78b2071 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -942,11 +942,14 @@ Status: Draft
The encrypted part of the hidden service descriptor is encrypted and
authenticated with symmetric keys generated as follows:
- salt = 16 random bytes, different for each post to each replica,
+ SALT = 16 bytes from H(random), different for each post to each replica,
even if the content of the descriptor hasn't changed.
(This avoids leaking service stability, and linking replicas
via encrypted data comparison.)
+ (We hash salt so that we don't leak the raw bytes returned by a PRNG
+ to the network. See [RANDOM-REFS].)
+
[ XX/teor - is the extra load on the HSDirs worth it? ]
secret_input = blinded_public_key(replica-keynum) |
@@ -960,13 +963,10 @@ Status: Draft
The encrypted data has the format:
- H(SALT) H(random bytes from above) [16 bytes]
+ SALT hashed random bytes from above [16 bytes]
ENCRYPTED The plaintext encrypted with S [variable]
MAC MAC of both above fields [32 bytes]
- (We hash salt so that we don't leak the raw bytes returned by a PRNG
- to the network. See [RANDOM-REFS].)
-
The encryption format is ENCRYPTED =
STREAM(SECRET_IV,SECRET_KEY) xor Plaintext
@@ -1040,6 +1040,8 @@ Status: Draft
[TODO: I'd like to have a cross-certification here too.]
+ To remain compatible with future revisions to the descriptor format,
+ clients should ignore unrecognized lines in the descriptor.
Other encryption and authentication key formats are allowed; clients
should ignore ones they do not recognize.
More information about the tor-commits
mailing list