commit f9313163c3f85d7bbb92f90947dfe9021f637c89 Author: John Brooks special@torproject.org Date: Tue May 10 14:25:21 2016 -0400
prop224: More trivial fixups.
- Sectioning fixes --- proposals/224-rend-spec-ng.txt | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-)
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt index 292ab3f..5db0ae3 100644 --- a/proposals/224-rend-spec-ng.txt +++ b/proposals/224-rend-spec-ng.txt @@ -1165,12 +1165,9 @@ Table of contents: earlier fields.
Older versions of Tor always use a 1024-bit RSA key for these introduction - authentication keys. Newer hidden services MAY use RSA keys up 1904 - bits. Any more than that will not fit in a RELAY cell payload. + authentication keys.
-[There is no 3.1.3?] - -3.1.4. Acknowledging establishment of introduction point [INTRO_ESTABLISHED] +3.1.3. Acknowledging establishment of introduction point [INTRO_ESTABLISHED]
After setting up an introduction circuit, the introduction point reports its status back to the hidden service host with an INTRO_ESTABLISHED cell. @@ -1183,9 +1180,8 @@ Table of contents: EXT_FIELD_LEN [1 byte] EXT_FIELD [EXT_FIELD_LEN bytes]
- [Worth mentioning that old-school Tor relays send back an empty - payload here? Or, even better, not mentioning it if we simplify - 3.1.2 to "don't do that". -RD] + Older versions of Tor send back an empty INTRO_ESTABLISHED cell instead. + Services must accept an empty INTRO_ESTABLISHED cell from a legacy relay.
3.2. Sending an INTRODUCE1 cell to the introduction point. [SEND_INTRO1]