minor tweaks of the v2-conn-protocol text

svn:r13117
This commit is contained in:
Roger Dingledine 2008-01-12 19:50:52 +00:00
parent 01df4856f7
commit a03d0e16e4

View File

@ -41,7 +41,8 @@ Proposal:
The version of the Tor connection protocol implemented up to now is The version of the Tor connection protocol implemented up to now is
"version 1". This proposal describes "version 2". "version 1". This proposal describes "version 2".
"Old" or "Older" versions of Tor are ones not aware of this protocol; "Old" or "Older" versions of Tor are ones not aware that version 2
of this protocol exists;
"New" or "Newer" versions are ones that are. "New" or "Newer" versions are ones that are.
The connection initiator is referred to below as the Client; the The connection initiator is referred to below as the Client; the
@ -81,14 +82,14 @@ Proposal:
coming from a Tor server. The server does not ask the client for coming from a Tor server. The server does not ask the client for
certificates. certificates.
Old Servers will (mostly) ignore the cipher list respond as in the v1 Old Servers will (mostly) ignore the cipher list and respond as in the v1
protocol, and send back a two-certificate chain. protocol, sending back a two-certificate chain.
After the Client gets a response from the server, it checks for the After the Client gets a response from the server, it checks for the
number of certificates. If there are two certificates, the client number of certificates it received. If there are two certificates,
assumes a V1 connection and proceeds as in tor-spec.txt. But if there the client assumes a V1 connection and proceeds as in tor-spec.txt.
is only one certificate, the client assumes a V2 or later protocol and But if there is only one certificate, the client assumes a V2 or later
continues. protocol and continues.
At this point, the client has established a TLS connection with the At this point, the client has established a TLS connection with the
server, but the parties have not been authenticated: the server hasn't server, but the parties have not been authenticated: the server hasn't
@ -131,9 +132,13 @@ Proposal:
SSL_MODE_NO_AUTO_CHAIN flag and sets the callback as for the V1 SSL_MODE_NO_AUTO_CHAIN flag and sets the callback as for the V1
protocol. It then starts reading. protocol. It then starts reading.
The other problem to take care of is missing ciphers and OpenSSL's The other problem to take care of is missing ciphers and OpenSSL's
cipher sorting algorithms. [XXXX more on this.] cipher sorting algorithms. The two main issues are a) OpenSSL doesn't
support some of the default ciphers that Firefox advertises, and b)
OpenSSL sorts the list of ciphers it offers in a different way than
Firefox sorts them, so unless we fix that Tor will still look different
than Firefox.
[XXXX more on this.]
1.2. Compatibility for clients using libraries less hackable than OpenSSL. 1.2. Compatibility for clients using libraries less hackable than OpenSSL.