aboutsummaryrefslogtreecommitdiff
path: root/doc/spec
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-12-10 22:28:00 +0000
committerNick Mathewson <nickm@torproject.org>2008-12-10 22:28:00 +0000
commit9854ebadde4c5f231efbfc12751b0bf529fe1ce2 (patch)
tree6cbc37a930feda51d54e0348a85fd8fa8f3560f7 /doc/spec
parent53d3f812bd2f97f4eb2acce73919e217baaf2772 (diff)
downloadtor-9854ebadde4c5f231efbfc12751b0bf529fe1ce2.tar
tor-9854ebadde4c5f231efbfc12751b0bf529fe1ce2.tar.gz
Clarify current client behavior WRT TLS certificates. Add a TODO to make sure that this behavior is optional, and an entry in 098-todo.txt for investigating whether this behavior is smart.
svn:r17568
Diffstat (limited to 'doc/spec')
-rw-r--r--doc/spec/proposals/098-todo.txt6
-rw-r--r--doc/spec/tor-spec.txt5
2 files changed, 11 insertions, 0 deletions
diff --git a/doc/spec/proposals/098-todo.txt b/doc/spec/proposals/098-todo.txt
index 2365a861f..e891ea890 100644
--- a/doc/spec/proposals/098-todo.txt
+++ b/doc/spec/proposals/098-todo.txt
@@ -65,6 +65,12 @@ Any time:
distribution. Need to think harder about allowing values less than 3,
and there's a tradeoff between having a wide variance and performance.
+ - Clients currently use certs during TLS. Is this wise? It does make it
+ easier for servers to tell which NATted client is which. We could use a
+ seprate set of certs for each guard, I suppose, but generating so many
+ certs could get expensive. Omitting them entirely would make OP->OR
+ easier to tell from OR->OR.
+
Things that should change...
B.1. ... but which will require backward-incompatible change
diff --git a/doc/spec/tor-spec.txt b/doc/spec/tor-spec.txt
index 8c6508f6e..8ab50242d 100644
--- a/doc/spec/tor-spec.txt
+++ b/doc/spec/tor-spec.txt
@@ -251,6 +251,11 @@ see tor-design.pdf.
(As an exception, directory servers may try to stay connected to all of
the ORs -- though this will be phased out for the Tor 0.1.2.x release.)
+ To avoid being trivially distinguished from servers, client-only Tor
+ instances are encouraged but not required to use a two-certificate chain
+ as well. Clients SHOULD NOT use keep using the same certificates when
+ their IP changes. Clients MAY send no certificates at all.
+
3. Cell Packet format
The basic unit of communication for onion routers and onion