[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6465 [Tor Relay]: Build abstraction layer around TLS
#6465: Build abstraction layer around TLS
-----------------------+----------------------------------------------------
Reporter: andrea | Owner: andrea
Type: project | Status: new
Priority: major | Milestone: Tor: 0.2.4.x-final
Component: Tor Relay | Version: Tor: unspecified
Keywords: | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by nickm):
I'll talk a little about the abstraction layer that I think we discussed,
so that we have a record and so that sjmurdoch can let us know whether it
works well.
The simplest abstraction is for a "channel" to have an interface like
(abstractly) "Start opening a new channel to host X"; "Send a cell on this
channel." It should have callbacks like "The channel opened successfully"
and "The channel closed unexpectedly" and "We received this cell on this
channel."
More (potentially) controversially, the channel itself should take the
responsibility for authentication, encryption, etc. The channel should
not report itself as having opened until it has done (approximately)
everything that's currently done on OR connections through the NETINFO
exchange.
Each channel is also responsible for making sure that it interacts
properly with the rate-limiting system (by asking how much it's allowed to
read/write before it does so, and by informing the rate-limiting system
how much it has read/written).
That's the plan, at least.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6465#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs