[or-cvs] r13666: Enable v2 handshakes. (in tor/trunk: . doc/spec/proposals src/common)

nickm at seul.org nickm at seul.org
Thu Feb 21 22:14:33 UTC 2008


Author: nickm
Date: 2008-02-21 17:14:32 -0500 (Thu, 21 Feb 2008)
New Revision: 13666

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/doc/spec/proposals/130-v2-conn-protocol.txt
   tor/trunk/src/common/tortls.c
Log:
 r14379 at tombo:  nickm | 2008-02-21 17:14:24 -0500
 Enable v2 handshakes.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r14379] on 49666b30-7950-49c5-bedf-9dc8f3168102

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-02-21 21:57:47 UTC (rev 13665)
+++ tor/trunk/ChangeLog	2008-02-21 22:14:32 UTC (rev 13666)
@@ -5,6 +5,14 @@
       for bridge users. Also do this for people who set StrictEntryNodes.
     - When a TrackHostExits-chosen exit fails too many times in a row,
       stop using it.  Bugfix on 0.1.2.x.  Fixes bug 437.
+    - Enable the revised TLS handshake based on the one designed by
+      Steven Murdoch in proposal 124, as revised in proposal 130.  It
+      includes version negotiation for OR connections as described in
+      proposal 105.  The new handshake is meant to be harder for
+      censors to fingerprint, and it adds the ability to detect
+      certain kinds of man-in-the-middle traffic analysis attacks.
+      The version negotiation feature will allow us to improve Tor's
+      link protocol more safely in the future.
 
   o Major bugfixes:
     - Resolved problems with (re-)fetching hidden service descriptors.

Modified: tor/trunk/doc/spec/proposals/130-v2-conn-protocol.txt
===================================================================
--- tor/trunk/doc/spec/proposals/130-v2-conn-protocol.txt	2008-02-21 21:57:47 UTC (rev 13665)
+++ tor/trunk/doc/spec/proposals/130-v2-conn-protocol.txt	2008-02-21 22:14:32 UTC (rev 13666)
@@ -17,7 +17,6 @@
        Proposal 124: Blocking resistant TLS certificate usage
     It refers to aspects of:
        Proposal 105: Version negotiation for the Tor protocol
-       Proposal 110: Avoid infinite length circuits
 
 
   In summary, The Tor connection protocol has been in need of a redesign
@@ -183,8 +182,4 @@
    as in proposal 105, and communications begin as per tor-spec.txt.
    Until NETINFO cells have been exchanged, the connection is not open.
 
-   RELAY_EARLY cells are accepted as in proposal 110, and treated as
-   RELAY cells except that they are relayed as RELAY_EARLY if the next
-   host in the circuit has negotiated v2 or later; otherwise, not.
-   Command value 9 is used for RELAY_EARLY.
 

Modified: tor/trunk/src/common/tortls.c
===================================================================
--- tor/trunk/src/common/tortls.c	2008-02-21 21:57:47 UTC (rev 13665)
+++ tor/trunk/src/common/tortls.c	2008-02-21 22:14:32 UTC (rev 13666)
@@ -42,8 +42,10 @@
 #include "ht.h"
 #include <string.h>
 
-// #define V2_HANDSHAKE_SERVER
-// #define V2_HANDSHAKE_CLIENT
+/* Enable the "v2" TLS handshake.
+ */
+#define V2_HANDSHAKE_SERVER
+#define V2_HANDSHAKE_CLIENT
 
 /* Copied from or.h */
 #define LEGAL_NICKNAME_CHARACTERS \



More information about the tor-commits mailing list