12345678910111213141516171819202122232425262728 |
- o Major features (ed25519 identity keys):
- - Relays now understand requests to extend to other relays
- by their Ed25519 identity keys. When an Ed25519 identity key
- is included in an EXTEND2 cell, the relay will only extend
- the circuit if the other relay can prove ownership of that identity.
- Implements part of ticket 15056; part of proposal 220.
- - Clients now support including Ed25519 identity keys in the EXTEND2
- cells they generate. By default, this is controlled by a consensus
- parameter, currently disabled. You can turn this feature on for
- testing by setting ExtendByEd25519ID in your configuration. This might
- make your traffic appear different than the traffic generated by other
- users, however.
- Implements part of ticket 15056; part of proposal 220.
- o Code simplification and refactoring:
- - The code to generate and parse EXTEND and EXTEND2 cells has
- been replaced with code automatically generated by the "trunnel"
- utility.
- - Remove data structures that were used to index or_connection objects by
- their RSA identity digests. These structures are fully redundant with
- the similar structures used in the channel abstraction.
- o Minor features (directory authority):
- - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
- default) to control whether authorities should try to probe relays by
- their Ed25519 link keys. This option will go away in a few
- releases--unless we encounter major trouble in our ed25519 link
- protocol rollout, in which case it will serve as a safety option.
|