[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] a few resolutions, and more unresolved issues
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc
Modified Files:
minion-spec.tex
Log Message:
a few resolutions, and more unresolved issues
Index: minion-spec.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-spec.tex,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -d -r1.42 -r1.43
--- minion-spec.tex 6 Jul 2002 01:53:57 -0000 1.42
+++ minion-spec.tex 6 Jul 2002 02:02:58 -0000 1.43
@@ -17,6 +17,12 @@
plaintext of the message. [For stateless SURBs, the encryption key
is derived from the seed like the rest of the secrets.] -NM
+ And for non-anonymous SURB-using senders, the mail gateway they
+ use does it for them when takes the reply block and attaches their
+ payload. -RD
+
+2b. Mail gateways. We should specify these.
+
3. Email transport exchange format.
Proposal: At the final hop, when the delivery mechanism is SMTP, we
@@ -80,6 +86,14 @@
Proposal: save for for later. -NM
+15. We should write the nymserver spec too. We can keep it pretty much
+ separate from this Mixminion spec.
+
+16. We'll also want somebody from the Mixmaster crowd to go through and
+ write a "backward compatibility with Mixmaster" addendum, to specify
+ what dual Mixmaster/Mixminion servers should do when they receive a
+ given packet. (Len?)
+
\section{Message Format}
@@ -375,7 +389,7 @@
respective subheaders), the header is constructed by appending
random padding to achieve a total size
of 128*16 bytes. Then, each subheader key is used to create a key
-Hash(SharedSecret, ``HEADER SECRET KEY'') with which the part of the
+Hash(SharedSecret | ``HEADER SECRET KEY'') with which the part of the
header after the subheader (but including its routing extension) is
encrypted using counter-mode AES.