[tor-commits] [torspec/master] rend-spec-v3: harmonise client and service link specifiers in EXTENDs
nickm at torproject.org
nickm at torproject.org
Mon Jul 30 12:36:16 UTC 2018
commit cd6058ed8ebf2ffef4944cab076f605c52e9049b
Author: teor <teor at torproject.org>
Date: Wed Jul 25 15:37:57 2018 +1000
rend-spec-v3: harmonise client and service link specifiers in EXTENDs
Closes bug 26925.
---
rend-spec-v3.txt | 16 +++++++++++++---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/rend-spec-v3.txt b/rend-spec-v3.txt
index 0b56fce..eb1ba42 100644
--- a/rend-spec-v3.txt
+++ b/rend-spec-v3.txt
@@ -1343,6 +1343,15 @@ Table of contents:
The link-specifiers is a base64 encoding of a link specifier
block in the format described in BUILDING-BLOCKS.
+ The client SHOULD NOT reject any LSTYPE fields which it doesn't
+ recognize; instead, it should use them verbatim in its EXTEND
+ request to the introduction point.
+
+ The client MAY perform basic validity checks on the link
+ specifiers in the descriptor. These checks SHOULD NOT leak
+ detailed information about the client's version, configuration,
+ or consensus. (See 3.3 for service link specifier handling.)
+
"onion-key" SP "ntor" SP key NL
[Exactly once per introduction point]
@@ -1702,9 +1711,10 @@ Table of contents:
in [BUILDING-BLOCKS], the "TLS-over-TCP, IPv4" and "Legacy node
identity" specifiers must be present.
- The hidden service SHOULD NOT reject any LSTYPE fields which it
- doesn't recognize; instead, it should use them verbatim in its EXTEND
- request to the rendezvous point.
+ The hidden service should handle invalid or unrecognised link specifiers
+ the same way as clients do in section 2.5.2.2. In particular, services
+ MAY perform basic validity checks on link specifiers, and SHOULD NOT
+ reject unrecognised link specifiers, to avoid information leaks.
The ONION_KEY_TYPE field is:
More information about the tor-commits
mailing list