commit 7ab099c16aec1b30b0c9217793afb8391ba70a56
Author: Roger Dingledine <arma(a)torproject.org>
Date: Sun Feb 2 22:32:53 2014 -0500
fix some typos on proposal 220
---
proposals/220-ecc-id-keys.txt | 33 +++++++++++++++++----------------
1 file changed, 17 insertions(+), 16 deletions(-)
diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt
index ebbc3b5..b14fea7 100644
--- a/proposals/220-ecc-id-keys.txt
+++ b/proposals/220-ecc-id-keys.txt
@@ -59,7 +59,7 @@ Status: Draft
1.1. 'Personalized' signatures
Each of the keys introduced here is used to sign more than one kind
- of document. While these documents should be unambiguous, I'd going
+ of document. While these documents should be unambiguous, I'm going
to forward-proof the signatures by specifying each signature to be
generated, not on the document itself, but on the document prefixed
with some distinguishing string.
@@ -106,7 +106,7 @@ Status: Draft
SIGNATURE [64 Bytes]
FIXED_PREFIX is "REVOKEID" or "REVOKESK". VERSION is [01]. KEYTYPE is
- [01] for revoking a signing key or [02] or revoking an identity key.
+ [01] for revoking a signing key or [02] for revoking an identity key.
REVOKED_KEY is the key being revoked; IDENTITY_KEY is the node's
Ed25519 identity key. PUBLISHED is the time that the document was
generated, in seconds since the epoch. EXTRA_STUFF is left for a
@@ -132,7 +132,7 @@ Status: Draft
But we also support offline identity keys:
* When a Tor node starts with an Ed25519 public identity key
- but no private identity key, it checks wither it has
+ but no private identity key, it checks whether it has
a currently valid certified signing keypair. If it does,
it starts. Otherwise, it refuses to start.
* If a Tor node's signing key is going to expire soon, it starts
@@ -152,9 +152,9 @@ Status: Draft
signing key and checking the signature before fully parsing the rest
of the document. -NM]
- When an identity-ed25519 element is present, there must also be an
+ When an identity-ed25519 element is present, there must also be a
"router-signature-ed25519" element. It MUST be the next-to-last
- element in the descriptor, appearing immediately before RSA
+ element in the descriptor, appearing immediately before the RSA
signature. It MUST contain an ed25519 signature of the entire
document, from the first character up to but not including the
"router-signature-ed25519" element, prefixed with the string "Tor
@@ -162,9 +162,9 @@ Status: Draft
"router-signature-ed25519" SP signature NL
- Were 'signature' is encoded in base64 with terminating =s removed.
+ Where 'signature' is encoded in base64 with terminating =s removed.
- The identity key in the identity-ed25519 key MUST be the one used to
+ The identity-key in the identity-ed25519 key MUST be the one used to
sign the certification, and the signing key in the certification MUST
be the one used to sign the document.
@@ -204,9 +204,9 @@ Status: Draft
appear in router descriptors.
Additionally, we add the base64-encoded, =-stripped SHA256 digest of
- a node's extra-info document field to the extra-info-digest line.
- (All versions of Tor that recognize this line allow an extra field
- there.)
+ a node's extra-info document field to the extra-info-digest line in
+ the router descriptor. (All versions of Tor that recognize this line
+ allow an extra field there.)
2.3.3. A note on signature verification
@@ -259,7 +259,7 @@ Status: Draft
"id" SP ed25519-identity NL
- where ed25519-identity is base-64 encoded, with trailing = characters
+ where ed25519-identity is base64-encoded, with trailing = characters
omitted. In vote documents, it may be replaced by the format:
"id" SP "none" NL
@@ -348,7 +348,7 @@ Status: Draft
7: RSA cross-certification for Ed25519 identity key
The content of certificate type 4 is:
- Ed25519 identity key [32 byets]
+ Ed25519 identity key [32 bytes]
Signing key certificate as in 2.1 above [variable length]
The content of certificate type 5 is:
@@ -463,9 +463,9 @@ Status: Draft
Anywhere in the interface that takes an $identity should be able to
take an ECC identity too. ECC identities are case-sensitive base64
encodings of Ed25519 identity keys. You can use $ to indicate them as
- well; we distinguish RSA identity digests length.
+ well; we distinguish RSA identity digests by length.
- When we need to indicate an Ed25519 identity key in an hostname
+ When we need to indicate an Ed25519 identity key in a hostname
format (as in a .exit address), we use the lowercased version of the
name, and perform a case-insensitive match. (This loses us a little
less than one bit per byte of name, leaving plenty of bits to make
@@ -477,7 +477,7 @@ Status: Draft
Clients shouldn't accept .exit addresses with Ed25519 names on SOCKS
or DNS ports by default, even when AllowDotExit is set. We can add
- another option for the later if there's a good reason to have this.
+ another option for them later if there's a good reason to have this.
We need an identity-to-node map for ECC identity and for RSA
identity.
@@ -488,7 +488,7 @@ Status: Draft
7. Hidden service changes out of scope
- Hidden services need to be able identity nodes by ECC keys, just as
+ Hidden services need to be able to identity nodes by ECC keys, just as
they will need to include ntor keys as well as TAP keys. Not just
yet though. This needs to be part of a bigger hidden service
revamping strategy.
@@ -518,3 +518,4 @@ Status: Draft
* Ed25519 support for hidden services
* Bridge identity support.
* Ed25519-aware family support
+