LinkAuth=1 is the older one that pokes inside the world of TLS master secrets. NSS sensibly doesn't let us do that, and makes us use RFC5705 like sensible people.
We shouldn't claim to support it, though.
I'm making this a separate ticket from the rest of NSS-TLS, though, since once we merge this, Tor clients and servers will stop working with NSS until #27286 (moved) is merged to update the list of required protocols.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
This also looks fine to me. I'm assuming it will run on CI, so I don't actually need to run it.
I'm slightly disappointed that we now have 3 copies of the supported protocols string, where we used to have 2. But that's an issue for another ticket.
Update -- the code for authorities to no longer vote for LinkAuth=1 is merged (#27286 (moved)), but not enough authorities have upgraded yet. When they do, we can merge this.
chutney's mixed network logs a warning, but doesn't fail:
PASS: mixed+hs-v2Detail: chutney/tools/warnings.sh /Users/base/chutney/net/nodes.1536899915Warning: At least one protocol listed as recommended in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will eventually stop working as a client on the Tor network. The missing protocols are: LinkAuth=1 Number: 6Warning: At least one protocol listed as recommended in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will eventually stop working as a relay on the Tor network. The missing protocols are: LinkAuth=1 Number: 27
New tors only fail in a network with a majority of old authorities. (And the network itself would only fail if it was a minimal network, and those new tors were essential to transmitting client data.)