[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] rend-v3: Tor supports IPv4 and IPv6 link specifiers as of 0.4.1.1-alpha
commit 87698dc1c0fa4cf2186f180a636fc7ad1c5fb5fd
Author: teor <teor@xxxxxxxxxxxxxx>
Date: Fri Aug 23 15:45:49 2019 +1000
rend-v3: Tor supports IPv4 and IPv6 link specifiers as of 0.4.1.1-alpha
Spec for #23588.
---
rend-spec-v3.txt | 16 ++++++++++++++++
1 file changed, 16 insertions(+)
diff --git a/rend-spec-v3.txt b/rend-spec-v3.txt
index b401134..7c80f1a 100644
--- a/rend-spec-v3.txt
+++ b/rend-spec-v3.txt
@@ -240,6 +240,11 @@ Table of contents:
(TLS-over-TCP, IPv4), [02] (legacy node identity) and [03] (ed25519
identity key).
+ As of 0.4.1.1-alpha, Tor includes both IPv4 and IPv6 link specifiers
+ in v3 onion service protocol link specifier lists. All available
+ addresses SHOULD be included as link specifiers, regardless of the
+ address that Tor actually used to connect/extend to the remote relay.
+
We also incorporate Tor's circuit extension handshakes, as used in
the CREATE2 and CREATED2 cells described in tor-spec.txt. In these
handshakes, a client who knows a public key for a server sends a
@@ -1343,6 +1348,12 @@ Table of contents:
The link-specifiers is a base64 encoding of a link specifier
block in the format described in BUILDING-BLOCKS.
+ As of 0.4.1.1-alpha, services include both IPv4 and IPv6 link
+ specifiers in descriptors. All available addresses SHOULD be
+ included in the descriptor, regardless of the address that the
+ onion service actually used to connect/extend to the intro
+ point.
+
The client SHOULD NOT reject any LSTYPE fields which it doesn't
recognize; instead, it should use them verbatim in its EXTEND
request to the introduction point.
@@ -1718,6 +1729,11 @@ Table of contents:
in [BUILDING-BLOCKS], the "TLS-over-TCP, IPv4" and "Legacy node
identity" specifiers must be present.
+ As of 0.4.1.1-alpha, clients include both IPv4 and IPv6 link specifiers
+ in INTRODUCE1 cells. All available addresses SHOULD be included in the
+ cell, regardless of the address that the client actually used to extend
+ to the rendezvous point.
+
The hidden service should handle invalid or unrecognised link specifiers
the same way as clients do in section 2.5.2.2. In particular, services
MAY perform basic validity checks on link specifiers, and SHOULD NOT
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits