[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r17469: {tor} Revise 157: make the crosscert field match the other authori (tor/trunk/doc/spec/proposals)
Author: nickm
Date: 2008-12-02 22:38:40 -0500 (Tue, 02 Dec 2008)
New Revision: 17469
Modified:
tor/trunk/doc/spec/proposals/157-specific-cert-download.txt
Log:
Revise 157: make the crosscert field match the other authority cert field names.
Modified: tor/trunk/doc/spec/proposals/157-specific-cert-download.txt
===================================================================
--- tor/trunk/doc/spec/proposals/157-specific-cert-download.txt 2008-12-03 03:37:33 UTC (rev 17468)
+++ tor/trunk/doc/spec/proposals/157-specific-cert-download.txt 2008-12-03 03:38:40 UTC (rev 17469)
@@ -7,6 +7,12 @@
Status: Open
Target: 0.2.1.x
+History:
+
+ 2008 Dec 2, 22:34
+ Changed name of cross certification field to match the other authority
+ certificate fields.
+
Overview:
Tor's directory specification gives two ways to download a certificate:
@@ -66,7 +72,7 @@
Certificates SHOULD contain the following field (at most once):
- "cross-cert" NL CrossSignature NL
+ "dir-key-crosscert" NL CrossSignature NL
where CrossSignature is a signature, made using the certificate's signing
key, of the digest of the PKCS1-padded hash of the certificate's identity
@@ -75,12 +81,12 @@
-----END ID SIGNATURE----- tags. (See bug 880.) Implementations MUST allow
the "ID " portion to be omitted, however.
- When encountering a certificate with a cross-cert entry, implementations
- MUST verify that the signature is a correct signature of the hash of the
- identity key using the signing key.
+ When encountering a certificate with a dir-key-crosscert entry,
+ implementations MUST verify that the signature is a correct signature of
+ the hash of the identity key using the signing key.
- (In a future version of this specification, cross-cert entries will be
- required.)
+ (In a future version of this specification, dir-key-crosscert entries will
+ be required.)
Why cross-certify too?