diff options
| author | Damian Johnson <atagar@torproject.org> | 2019-03-01 16:27:44 -0800 |
|---|---|---|
| committer | Damian Johnson <atagar@torproject.org> | 2019-03-01 16:27:44 -0800 |
| commit | 85e96a0a294b6a43b216a6261d7eb55771150491 (patch) | |
| tree | 92d36a2e13e05ae2b13b89035fd78437bc3f11be | |
| parent | 0fc61ddb1df72762d1e833c3977c4dd8e9c06617 (diff) | |
Adjust safecookie faq wording
Couple small tweaks suggested by wagon:
https://trac.torproject.org/projects/tor/ticket/28300#comment:11
| -rw-r--r-- | docs/faq.rst | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/faq.rst b/docs/faq.rst index 3aa7b02a..23d0c3f1 100644 --- a/docs/faq.rst +++ b/docs/faq.rst @@ -213,7 +213,7 @@ you vulnerable to replay attacks if you accidently connect to a malicious port or have a man-in-the-middle. **SAFECOOKIE** authentication avoids this through a two way handshake, but authenticating by hand requires some extra work. -This demonstration will use **xxd** to for hex conversion and **openssl** for +This demonstration will use **xxd** for hex conversion and **openssl** for crypto. First we need to call **AUTHCHALLENGE** with a random one-time token... :: @@ -231,9 +231,9 @@ crypto. First we need to call **AUTHCHALLENGE** with a random one-time token... 250 AUTHCHALLENGE SERVERHASH=16274D83FC2240DF9D50D74009D9AE107B77EA317F0034D3638C7942F350D1F9 SERVERNONCE=1C2E73C41FA8537FDD3A59C2ECBE26DFC85E0A05389373AD8C130C0F5795A036 -Next combine the server challenge with our cookie content. This token will -prove to Tor that we have our authentication cookie without divulging its -content... +In another terminal prompt next combine the server challenge with our cookie +content. This token will prove to Tor that we have our authentication cookie +without divulging its content... :: |
