(FWD) TLS False Start
Adam Langley
agl at imperialviolet.org
Wed Jun 2 21:47:38 UTC 2010
On Wed, Jun 2, 2010 at 12:42 PM, Roger Dingledine <arma at mit.edu> wrote:
> Forwarding for Adam.
>
> Any nice volunteer want to play with combining this with Tor?
While I'm on the subject, I'm probably going to send the OpenSSL patch
for nextprotoneg[1] upstream tomorrow.
This allows an application level protocol to be negotiated with the
TLS handshake. For example, a server could run a standard HTTPS server
on port 443 and also have that same port serve Tor when requested.
The server may choose to advertise Tor support in its handshake (in
the clear) or it may not and the Tor client can still request the Tor
protocol. The client's request is encrypted (and padded to a constant
length).
If that's interesting, let me know.
AGL
[1] http://tools.ietf.org/html/draft-agl-tls-nextprotoneg-00
--
Adam Langley agl at imperialviolet.org http://www.imperialviolet.org
More information about the tor-dev
mailing list