aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2007-02-24 07:54:47 +0000
committerNick Mathewson <nickm@torproject.org>2007-02-24 07:54:47 +0000
commit38dcc368c401e3ce6b8258a0edbb38ca5f54ba2a (patch)
tree70ec377c3b81b556f5877d271eceee6289ffa2ab /doc
parent50f22e858a2045649984a4f7c863f22106efcd95 (diff)
downloadtor-38dcc368c401e3ce6b8258a0edbb38ca5f54ba2a.tar
tor-38dcc368c401e3ce6b8258a0edbb38ca5f54ba2a.tar.gz
r11911@catbus: nickm | 2007-02-24 02:51:37 -0500
Clarify rules about certificates on incoming connections. Does it make more sense now? svn:r9635
Diffstat (limited to 'doc')
-rw-r--r--doc/spec/tor-spec.txt13
1 files changed, 6 insertions, 7 deletions
diff --git a/doc/spec/tor-spec.txt b/doc/spec/tor-spec.txt
index c3aba0fd8..672ecce41 100644
--- a/doc/spec/tor-spec.txt
+++ b/doc/spec/tor-spec.txt
@@ -174,13 +174,12 @@ see tor-design.pdf.
EXTEND cell, the expected identity key is the one given in the cell.) If
the key is not as expected, the party must close the connection.
- All parties SHOULD reject connections to or from ORs that have malformed
- or missing certificates.
- [XXX How can we recognize that it's an OR if it's an incoming connection
- with malformed/missing certs? Should we change the above to just "to
- ORs"? -RD]
- ORs SHOULD NOT reject incoming connections from OPs with malformed
- or missing certificates.
+ When connecting to an OR, all parties SHOULD reject the connection if that
+ OR has a malformed or missing certificate. When accepting an incoming
+ connection, an OR SHOULD NOT reject incoming connections from parties with
+ malformed or missing certificates. (However, an OR should not believe
+ that an incoming connection is from another OR unless the certificates
+ are present and well-formed.)
[Before version 0.1.2.8-rc, ORs rejected incoming connections from ORs and
OPs alike if their certificates were missing or malformed.]