[tor-commits] [torspec/master] rend-v3: Tor supports IPv4 and IPv6 link specifiers as of 0.4.1.1-alpha

teor at torproject.org teor at torproject.org
Tue Aug 27 12:48:51 UTC 2019


commit 87698dc1c0fa4cf2186f180a636fc7ad1c5fb5fd
Author: teor <teor at torproject.org>
Date:   Fri Aug 23 15:45:49 2019 +1000

    rend-v3: Tor supports IPv4 and IPv6 link specifiers as of 0.4.1.1-alpha
    
    Spec for #23588.
---
 rend-spec-v3.txt | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)

diff --git a/rend-spec-v3.txt b/rend-spec-v3.txt
index b401134..7c80f1a 100644
--- a/rend-spec-v3.txt
+++ b/rend-spec-v3.txt
@@ -240,6 +240,11 @@ Table of contents:
    (TLS-over-TCP, IPv4), [02] (legacy node identity) and [03] (ed25519
    identity key).
 
+   As of 0.4.1.1-alpha, Tor includes both IPv4 and IPv6 link specifiers
+   in v3 onion service protocol link specifier lists. All available
+   addresses SHOULD be included as link specifiers, regardless of the
+   address that Tor actually used to connect/extend to the remote relay.
+
    We also incorporate Tor's circuit extension handshakes, as used in
    the CREATE2 and CREATED2 cells described in tor-spec.txt. In these
    handshakes, a client who knows a public key for a server sends a
@@ -1343,6 +1348,12 @@ Table of contents:
           The link-specifiers is a base64 encoding of a link specifier
           block in the format described in BUILDING-BLOCKS.
 
+          As of 0.4.1.1-alpha, services include both IPv4 and IPv6 link
+          specifiers in descriptors. All available addresses SHOULD be
+          included in the descriptor, regardless of the address that the
+          onion service actually used to connect/extend to the intro
+          point.
+
           The client SHOULD NOT reject any LSTYPE fields which it doesn't
           recognize; instead, it should use them verbatim in its EXTEND
           request to the introduction point.
@@ -1718,6 +1729,11 @@ Table of contents:
    in [BUILDING-BLOCKS], the "TLS-over-TCP, IPv4" and "Legacy node
    identity" specifiers must be present.
 
+   As of 0.4.1.1-alpha, clients include both IPv4 and IPv6 link specifiers
+   in INTRODUCE1 cells. All available addresses SHOULD be included in the
+   cell, regardless of the address that the client actually used to extend
+   to the rendezvous point.
+
    The hidden service should handle invalid or unrecognised link specifiers
    the same way as clients do in section 2.5.2.2. In particular, services
    MAY perform basic validity checks on link specifiers, and SHOULD NOT



More information about the tor-commits mailing list