diff options
author | 2015-11-06 19:07:30 -0800 | |
---|---|---|
committer | 2015-11-06 19:07:30 -0800 | |
commit | a273f1f1383b7b511b9c1348795a4de9162648b3 (patch) | |
tree | 6d3edeb45efcb5ea1bd6e50f28267276f77cb4e0 | |
parent | Clarify initiator / responder role in pipes (diff) | |
download | noise-a273f1f1383b7b511b9c1348795a4de9162648b3.tar.xz noise-a273f1f1383b7b511b9c1348795a4de9162648b3.zip |
Clarify
-rw-r--r-- | noise.md | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -458,8 +458,8 @@ responder's static public key. If the responder fails to decrypt the first `Noise_IK` message (perhaps due to changing her static key), the responder will initiate a new `Noise_XXfallback` -identical to `Noise_XX` except re-using the ephemeral public key from the first -`Noise_IK` message as a pre-message public key. +handshake identical to `Noise_XX` except re-using the ephemeral public key from +the first `Noise_IK` message as a pre-message public key. Below are the three patterns used for Noise Pipes: @@ -475,10 +475,10 @@ Below are the three patterns used for Noise Pipes: <- e, dhee, dhes Noise_XXfallback(s, rs, re): - -> e + <- e ------ - <- e, dhee, s, dhse - -> s, dhse + -> e, dhee, s, dhse + <- s, dhse Note that in the fallback case, the initiator and responder roles are switched: If Alice inititates a `Noise_IK` handshake with Bob, Bob might @@ -486,7 +486,7 @@ initiate a `Noise_XX_fallback` handshake. Note also that encrypted data sent in the first `Noise_IK` message is susceptible to replay attacks. Also, if the responder's static private key is -compromised, initial messages can be decrypted and/or forged. +compromised, `Noise_IK` initial messages can be decrypted and/or forged. To distinguish these patterns, each handshake message will be preceded by a `type` byte: |