[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] Clarify control port authentication.
commit 043051b79f929b39d77eb1520b4fc65a721e85ae
Author: Mike Perry <mikeperry-git@xxxxxxxxxx>
Date: Wed Aug 10 09:58:42 2011 -0700
Clarify control port authentication.
Encoded hex strings are useful, but the previous revision conflated them
with how the tor implementations stores them on disk.
---
control-spec.txt | 10 +++++++---
1 files changed, 7 insertions(+), 3 deletions(-)
diff --git a/control-spec.txt b/control-spec.txt
index 160adf4..4aba1fa 100644
--- a/control-spec.txt
+++ b/control-spec.txt
@@ -293,14 +293,18 @@
3.5. AUTHENTICATE
Sent from the client to the server. The syntax is:
- "AUTHENTICATE" [ SP 1*HEXDIG / QuotedString ] CRLF
+ "AUTHENTICATE" [ SP N*HEXDIG / QuotedString ] CRLF
The server responds with "250 OK" on success or "515 Bad authentication" if
the authentication cookie is incorrect. Tor closes the connection on an
authentication failure.
- The format of the 'cookie' is implementation-dependent; see 5.1 below for
- information on how the standard Tor implementation handles it.
+ The authentication token can be specified as either a quoted ASCII string,
+ or as an unquoted hexadecimal encoding of that same string (to avoid escaping
+ issues).
+
+ For information on how the implementation securely stores authentication
+ information on disk, see section 5.1.
Before the client has authenticated, no command other than PROTOCOLINFO,
AUTHENTICATE, or QUIT is valid. If the controller sends any other command,
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits