|
@@ -292,7 +292,7 @@ when do we rotate which keys (tls, link, etc)?
|
|
|
other side has an obsolete certificate (organizationName equal to "Tor"
|
|
|
or "TOR"). If the other party presented an obsolete certificate,
|
|
|
we assume a v0 connection. Otherwise, both parties send VERSIONS
|
|
|
- cells listing all their supported versions. Upon receiving the
|
|
|
+ cells listing all their supported versions. Upon receiving the
|
|
|
other party's VERSIONS cell, the implementation begins using the
|
|
|
highest-valued version common to both cells. If the first cell from
|
|
|
the other party is _not_ a VERSIONS cell, we assume a v0 protocol.
|
|
@@ -382,7 +382,7 @@ when do we rotate which keys (tls, link, etc)?
|
|
|
As usual with DH, x and y MUST be generated randomly.
|
|
|
|
|
|
[
|
|
|
- To implement backwar-compatible version negotiation, parties MUST
|
|
|
+ To implement backward-compatible version negotiation, parties MUST
|
|
|
drop CREATE cells with all-[00] onion-skins.
|
|
|
]
|
|
|
|