[tor-commits] [torspec/master] Update proposal 228 to reflect implementation status

nickm at torproject.org nickm at torproject.org
Fri Nov 7 16:38:17 UTC 2014


commit cc453f956b8f8979e7bfa2f17be7de5587da992a
Author: Nick Mathewson <nickm at torproject.org>
Date:   Wed Oct 1 14:15:08 2014 -0400

    Update proposal 228 to reflect implementation status
---
 proposals/228-cross-certification-onionkeys.txt |   15 +++++++++++++++
 1 file changed, 15 insertions(+)

diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt
index d28b714..b3b401c 100644
--- a/proposals/228-cross-certification-onionkeys.txt
+++ b/proposals/228-cross-certification-onionkeys.txt
@@ -85,6 +85,8 @@ Status: Open
    Note that this cert format has 32 bytes of of redundant data, since it
    includes the identity key an extra time.  That seems okay to me.
 
+   The signed key here is the master identity key.
+
    The TYPE field in this certificate should be set to
       [0A] - ntor onion key cross-certifying ntor identity key
 
@@ -151,3 +153,16 @@ B. Security notes
    oracle for our curve25519 ntor keys.  Fortunately, we don't, since
    nobody else can influence the certificate contents.
 
+C. Implementation notes
+
+   As implemented in Tor, I've decided to make this proposal cross-dependent
+   on proposal 220. A router descriptor must have ALL or NONE
+   of the following:
+            * An Ed25529 identity key
+            * A TAP cross-certification
+            * An ntor cross-certification
+
+   Further, if it has the above, it must also have:
+            * An ntor onion key.
+
+





More information about the tor-commits mailing list