2 Commits

Author SHA1 Message Date
zzz
34aaef0cbb roadmap update
Some checks failed
Sync Primary Repository to GitHub Mirror / sync (push) Has been cancelled
2025-06-03 12:59:08 -04:00
zzz
a2b9e4c8a7 spec update 2025-06-03 12:58:15 -04:00
2 changed files with 6 additions and 6 deletions

View File

@ -47,7 +47,7 @@
<h2 id="2.9.0">2.9.0 (API 0.9.66)</h2>
<p><b>Target release: June 3, 2025</b></p>
<p><b>Released: June 2, 2025</b></p>
<ul>
<li>
Netdb map

View File

@ -3,8 +3,8 @@ ECIES-X25519 Tunnel Creation
=============================
.. meta::
:category: Protocols
:lastupdated: 2025-03
:accuratefor: 0.9.65
:lastupdated: 2025-06
:accuratefor: 0.9.66
.. contents::
@ -913,10 +913,9 @@ The recommended minimum number of build records is 4.
If there are more build records than hops, "fake" records must be added,
containing random or implementation-specific data.
For inbound tunnel builds, there must always be one "fake" record for the
originating router, with the correct 16-byte hash prefix, otherwise
originating router, with the correct 16-byte hash prefix
and a real X25519 ephemeral key, otherwise
the closest hop will know that the next hop is the originator.
The MSB of the ephemeral key (data[47] & 0x80) must also be cleared
so it looks like a real X25519 public key.
The remainder of the "fake" record may be random data, or may encrypted in any format
for the originator to send data to itself about the build,
@ -926,6 +925,7 @@ Originators of inbound tunnels must use some method to validate
that their "fake" record has not been modified by the previous hop,
as this may also be used for deanonimization.
The orignator may store and verify a checksum of the record,
or include the checksum in the record,
or use an AEAD encryption/decryption function, implementation-dependent.
If the 16-byte hash prefix or other build record contents were
modified, the router must discard the tunnel.