[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] address most of roger\"s issues



Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv31858

Modified Files:
	minion-spec.tex 
Log Message:
address most of roger\'s issues

Index: minion-spec.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-spec.tex,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -d -r1.16 -r1.17
--- minion-spec.tex	4 Jun 2002 03:14:22 -0000	1.16
+++ minion-spec.tex	4 Jun 2002 09:45:20 -0000	1.17
@@ -115,10 +115,7 @@
 Shared Secret:   16 bytes
 Digest:          20 bytes
 Routing Size:    2 bytes
-Routing Type:    2 bytes  [total 43 bytes]
-  [XXXX 43? Is this a fencepost error? I count 42. And it says 42
-        below.
-   -RD]
+Routing Type:    2 bytes  [total 42 bytes]
 Routing info:    [Routing Size] bytes
 
 * The Version is present to manage concurrent versions of the
@@ -139,6 +136,11 @@
       Otherwise a bad server can modify the directly-next-header
       (he still can't know what he's changing, but hey). -RD]
 
+[XXXX OAEP is supposed to detect modifications to the RSA-encrypted
+      next header, and reject it.  This can't be used to mount a
+      tagging attack; such attacks are useless if you try to make the 
+      immediately next hop drop. -NM]
+
 * The Routing Type of a message defines how the MIX should deliver or
   relay it.  Most routing methods require addition addressing information.
   The Routing Size field indicates the total size of the routing
@@ -171,6 +173,10 @@
         size of the plaintext of a subheader), but here we talk about
         128, the size of the crypttext of the subheader. What's up?
    -RD]
+ 
+  [XXXX OAEP padding adds 41 bytes.  Thus, for PK_Encrypt(Foo, K) to
+        fit in 127 bytes (to be input for RSA), you need Len(Foo)<=86.
+   -NM]
 
 The Routing Extension corresponding to a particular subheader is
 encrypted using the Encrypt function with key=Hash(Shared Secret,