[or-cvs] r13478: Update TODO with TLS progress. (in tor/trunk: . doc)

nickm at seul.org nickm at seul.org
Tue Feb 12 04:45:12 UTC 2008


Author: nickm
Date: 2008-02-11 23:45:11 -0500 (Mon, 11 Feb 2008)
New Revision: 13478

Modified:
   tor/trunk/
   tor/trunk/doc/TODO
Log:
 r18043 at catbus:  nickm | 2008-02-11 23:45:07 -0500
 Update TODO with TLS progress.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r18043] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO	2008-02-12 04:43:25 UTC (rev 13477)
+++ tor/trunk/doc/TODO	2008-02-12 04:45:11 UTC (rev 13478)
@@ -60,32 +60,15 @@
 N - Before the feature freeze:
     - 105+TLS, if possible.
       . TLS backend work
-        - New list of ciphers for clients
-        o Servers detect new ciphers, and only send ID cert when they
-          get an older cipher list, and only request client cert when
-          they get an older cipher list.
-        . Clients only send certificates when asked for them.
-          o Implement
-          - Enable
-        o Servers disable callback once negotiation is finished, so
-          that renegotiation happens according to the old rules.
-        o Clients initiate renegotiation immediately on completing
-          a v2 connection.
-        o Servers detect renegotiation, and if there is now a client
-          cert, they adust the client ID.
-          o Detect.
-          o Adjust.
-        o Better cname and organizationName generation.
-      o New revised handshake: post-TLS:
-        o start by sending VERSIONS cells
-        o once we have a version, send a netinfo and become open
-        o Ban most cell types on a non-OPEN connection.
+        . Enable.
       - Test
         o Verify version negotiation on client
-        - Verify version negotiation on server
-        . Verify that client->server connection becomes open
+        o Verify version negotiation on server
+        o Verify that client->server connection becomes open
         - Verify that server->server connection becomes open and
           authenticated.
+        - Verify that initiator sends no cert in first stage of TLS
+          handshake.
       - NETINFO fallout
         - Don't extend a circuit over a noncanonical connection with
           mismatched address.



More information about the tor-commits mailing list