[tor-commits] [torspec/master] SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA is not on the v1 ciphers list

nickm at torproject.org nickm at torproject.org
Fri Nov 23 15:15:30 UTC 2012


commit 490c777859b96223421e247675367c792a031c75
Author: Nick Mathewson <nickm at torproject.org>
Date:   Fri Nov 23 10:14:49 2012 -0500

    SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA is not on the v1 ciphers list
    
    Fixes #6963; reported by cced.
---
 tor-spec.txt |    6 ++----
 1 files changed, 2 insertions(+), 4 deletions(-)

diff --git a/tor-spec.txt b/tor-spec.txt
index 186b7c0..a3df860 100644
--- a/tor-spec.txt
+++ b/tor-spec.txt
@@ -181,7 +181,6 @@ see tor-design.pdf.
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
-     SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
 
    In "renegotiation" (a.k.a. "the v2 handshake"),
    the connection initiator sends no certificates, and
@@ -335,9 +334,8 @@ see tor-design.pdf.
 
    If the client sends the Fixed Ciphersuite List, the responder MUST NOT
    select any ciphersuite besides TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
-   TLS_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, and
-   SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA: such ciphers might not actually be
-   supported by the client.
+   TLS_DHE_RSA_WITH_AES_128_CBC_SHA, and SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA:
+   such ciphers might not actually be supported by the client.
 
    If the client sends a v2+ ClientHello with a list of ciphers other then
    the Fixed Ciphersuite List, the responder can trust that the client



More information about the tor-commits mailing list