commit 410335394dd7f1682fe25ff8a3343653fcd0bb98 Author: Nick Mathewson nickm@torproject.org Date: Tue Sep 19 10:32:58 2017 -0400
make validation MUST; clarify behavior on failure. --- proposals/224-rend-spec-ng.txt | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt index 9c8b77e..73f8936 100644 --- a/proposals/224-rend-spec-ng.txt +++ b/proposals/224-rend-spec-ng.txt @@ -974,9 +974,10 @@ Table of contents:
2.2.7. Client-side validation of onion addresses
- When a Tor client receives a prop224 onion address from the user, it should - validate the onion address before attempting to connect or fetch its - descriptor. + When a Tor client receives a prop224 onion address from the user, it + MUST first validate the onion address before attempting to connect or + fetch its descriptor. If the validation fails, the client MUST + refuse to connect.
As part of the address validation, Tor clients should check that the underlying ed25519 key does not have a torsion component. If Tor accepted