[tor-commits] [torspec/master] Clarify how clients find the expected identity key
nickm at torproject.org
nickm at torproject.org
Mon Jul 24 17:53:21 UTC 2017
commit 6c19e603c825cdbf4a6dc33196c792bf47c19bba
Author: Nick Mathewson <nickm at torproject.org>
Date: Mon Jul 24 13:52:41 2017 -0400
Clarify how clients find the expected identity key
Fixes bug 22862; based on patch from Teor.
---
tor-spec.txt | 13 +++++++++----
1 file changed, 9 insertions(+), 4 deletions(-)
diff --git a/tor-spec.txt b/tor-spec.txt
index f61e98f..86fdcc6 100644
--- a/tor-spec.txt
+++ b/tor-spec.txt
@@ -287,10 +287,15 @@ see tor-design.pdf.
In all handshake variants, once all certificates are exchanged, all
parties receiving certificates must confirm that the identity key is as
- expected. (When initiating a connection, the expected identity key is
- the one given in the directory; when creating a connection because of an
- EXTEND cell, the expected identity key is the one given in the cell.) If
- the key is not as expected, the party must close the connection.
+ expected. If the key is not as expected, the party must close the
+ connection.
+
+ (When initiating a connection, if a reasonably live consensus is
+ available, then the expected identity key is taken from that
+ consensus. But when initiating a connection otherwise, the expected
+ identity key is the one given in the hard-coded authority or fallback
+ list. Finally, when creating a connection because of an EXTEND cell, the
+ expected identity key is the one given in the cell.)
When connecting to an OR, all parties SHOULD reject the connection if that
OR has a malformed or missing certificate. When accepting an incoming
More information about the tor-commits
mailing list