aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-07-17 06:26:19 +0000
committerRoger Dingledine <arma@torproject.org>2006-07-17 06:26:19 +0000
commit8868830ac5730e455bbc727893b2234b5f1f33fe (patch)
tree1ec3ea7a837447ff7103bf93c8d26864d5698d29 /doc
parentfc7c32da8a32675b15bd69143138041bb9f8e47c (diff)
downloadtor-8868830ac5730e455bbc727893b2234b5f1f33fe.tar
tor-8868830ac5730e455bbc727893b2234b5f1f33fe.tar.gz
we are constrained more than we realized, on what g^x values we can
accept or refuse. svn:r6773
Diffstat (limited to 'doc')
-rw-r--r--doc/tor-spec.txt13
1 files changed, 8 insertions, 5 deletions
diff --git a/doc/tor-spec.txt b/doc/tor-spec.txt
index f5d9a2c1c..35b71e00d 100644
--- a/doc/tor-spec.txt
+++ b/doc/tor-spec.txt
@@ -302,11 +302,14 @@ when do we rotate which keys (tls, link, etc)?
and server MUST verify that the received g^x or g^y value is not degenerate;
that is, it must be strictly greater than 1 and strictly less than p-1
where p is the DH modulus. Implementations MUST NOT complete a handshake
- with degenerate keys. Implementations MAY discard other "weak" g^x values.
-
- (Discarding degenerate keys is critical for security; if bad keys are not
- discarded, an attacker can substitute the server's CREATED cell's g^y with
- 0 or 1, thus creating a known g^xy and impersonating the server.)
+ with degenerate keys. Implementations MUST NOT discard other "weak"
+ g^x values.
+
+ (Discarding degenerate keys is critical for security; if bad keys
+ are not discarded, an attacker can substitute the server's CREATED
+ cell's g^y with 0 or 1, thus creating a known g^xy and impersonating
+ the server. Discarding other keys may allow attacks to learn bits of
+ the private key.)
(The mainline Tor implementation, in the 0.1.1.x-alpha series, discarded
all g^x values less than 2^24, greater than p-2^24, or having more than