[or-cvs] add router twins to the spec

Roger Dingledine arma at seul.org
Mon Aug 25 03:00:34 UTC 2003


Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-spec.txt 
Log Message:
add router twins to the spec


Index: tor-spec.txt
===================================================================
RCS file: /home/or/cvsroot/doc/tor-spec.txt,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -d -r1.23 -r1.24
--- tor-spec.txt	22 Aug 2003 03:34:51 -0000	1.23
+++ tor-spec.txt	25 Aug 2003 03:00:31 -0000	1.24
@@ -177,7 +177,7 @@
 
    Once the handshake is complete, the two sides send cells
    (specified below) to one another.  Cells are sent serially,
-   encrypted with the AES-CNT keystream specified by the handshake
+   encrypted with the AES-CTR keystream specified by the handshake
    protocol.  Over a connection, communicants encrypt outgoing cells
    with the connection's K_f, and decrypt incoming cells with the
    connection's K_b.
@@ -332,6 +332,10 @@
    as its payload.  The initiating onion router chooses some random
    ACI not yet used on the connection between the two onion routers.
 
+   As an extension (called router twins), if the desired next onion
+   router R in the circuit is down, and some other onion router R'
+   has the same key as R, then it's ok to extend to R' rather than R.
+
    When an onion router receives a CREATE cell, if it already has a
    circuit on the given connection with the given ACI, it drops the
    cell.  Otherwise, sometime after receiving the CREATE cell, it completes
@@ -387,7 +391,7 @@
 
    Otherwise, if the OR is not at the OP edge of the circuit (that is,
    either an 'exit node' or a non-edge node), it de/encrypts the length
-   field and the payload with AES/CNT, as follows:
+   field and the payload with AES/CTR, as follows:
         'Forward' relay cell (same direction as CREATE):
             Use Kf as key; encrypt.
         'Back' relay cell (opposite direction from CREATE):
@@ -402,13 +406,13 @@
    handshakes. -RD]
 
    Otherwise, if the data cell is coming from the OP edge of the
-   circuit, the OP decrypts the length and payload fields with AES/CNT as
+   circuit, the OP decrypts the length and payload fields with AES/CTR as
    follows:
          OP sends data cell to node R_M:
             For I=1...M, decrypt with Kf_I.
 
    Otherwise, if the data cell is arriving at the OP edge if the
-   circuit, the OP encrypts the length and payload fields with AES/CNT as
+   circuit, the OP encrypts the length and payload fields with AES/CTR as
    follows:
          OP receives data cell:
             For I=N...1, 
@@ -615,4 +619,9 @@
 directory, from the characters "signed-directory", through the newline
 after "directory-signature".  This digest is then padded with PKCS.1,
 and signed with the directory server's signing key.
+
+7.3. Behavior of a directory server
+
+lists nodes that are connected currently
+speaks http on a socket, spits out directory on request
 



More information about the tor-commits mailing list