feature15056 1.6 KB

12345678910111213141516171819202122232425262728
  1. o Major features (ed25519 identity keys):
  2. - Relays now understand requests to extend to other relays
  3. by their Ed25519 identity keys. When an Ed25519 identity key
  4. is included in an EXTEND2 cell, the relay will only extend
  5. the circuit if the other relay can prove ownership of that identity.
  6. Implements part of ticket 15056; part of proposal 220.
  7. - Clients now support including Ed25519 identity keys in the EXTEND2
  8. cells they generate. By default, this is controlled by a consensus
  9. parameter, currently disabled. You can turn this feature on for
  10. testing by setting ExtendByEd25519ID in your configuration. This might
  11. make your traffic appear different than the traffic generated by other
  12. users, however.
  13. Implements part of ticket 15056; part of proposal 220.
  14. o Code simplification and refactoring:
  15. - The code to generate and parse EXTEND and EXTEND2 cells has
  16. been replaced with code automatically generated by the "trunnel"
  17. utility.
  18. - Remove data structures that were used to index or_connection objects by
  19. their RSA identity digests. These structures are fully redundant with
  20. the similar structures used in the channel abstraction.
  21. o Minor features (directory authority):
  22. - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
  23. default) to control whether authorities should try to probe relays by
  24. their Ed25519 link keys. This option will go away in a few
  25. releases--unless we encounter major trouble in our ed25519 link
  26. protocol rollout, in which case it will serve as a safety option.