[or-cvs] r16327: Proposal 121: Use first part of Diffie-Hellman handshake for (tor/trunk/doc/spec/proposals)

kloesing at seul.org kloesing at seul.org
Fri Aug 1 11:19:44 UTC 2008


Author: kloesing
Date: 2008-08-01 07:19:43 -0400 (Fri, 01 Aug 2008)
New Revision: 16327

Modified:
   tor/trunk/doc/spec/proposals/121-hidden-service-authentication.txt
Log:
Proposal 121: Use first part of Diffie-Hellman handshake for replay protection instead of rendezvous cookie.

Modified: tor/trunk/doc/spec/proposals/121-hidden-service-authentication.txt
===================================================================
--- tor/trunk/doc/spec/proposals/121-hidden-service-authentication.txt	2008-08-01 11:00:02 UTC (rev 16326)
+++ tor/trunk/doc/spec/proposals/121-hidden-service-authentication.txt	2008-08-01 11:19:43 UTC (rev 16327)
@@ -28,6 +28,8 @@
                with Nick
   31-Jul-2008  Limit maximum descriptor size to 20 kilobytes to prevent
                abuse.
+  01-Aug-2008  Use first part of Diffie-Hellman handshake for replay
+               protection instead of rendezvous cookie.
 
 Overview:
 
@@ -385,10 +387,13 @@
   When receiving a v3 INTRODUCE2 cell, Bob checks whether a client has
   provided valid authorization data to him. He also requires that the
   timestamp is no more than 30 minutes in the past or future and that the
-  rendezvous cookie has not been used in the past 60 minutes to prevent
-  replay attacks by rogue introduction points. If all checks pass, Bob
-  builds a circuit to the provided rendezvous point and otherwise drops the
-  cell.
+  first part of the Diffie-Hellman handshake has not been used in the past
+  60 minutes to prevent replay attacks by rogue introduction points. (The
+  reason for not using the rendezvous cookie to detect replays---even
+  though it is only sent once in the current design---is that it might be
+  desirable to re-use rendezvous cookies for multiple introduction requests
+  in the future.) If all checks pass, Bob builds a circuit to the provided
+  rendezvous point and otherwise drops the cell.
 
   1.4. Summary of authorization data fields
 



More information about the tor-commits mailing list