diff --git a/i2p2www/spec/proposals/111-ntcp-2.rst b/i2p2www/spec/proposals/111-ntcp-2.rst index 312cbdf4641ecf6f455f3ca1e93b8b9246520f3d..f6ab07439cac8ba67c81638cd4c772552f332a0f 100644 --- a/i2p2www/spec/proposals/111-ntcp-2.rst +++ b/i2p2www/spec/proposals/111-ntcp-2.rst @@ -5,7 +5,7 @@ NTCP 2 :author: zzz :created: 2014-02-13 :thread: http://zzz.i2p/topics/1577 - :lastupdated: 2016-09-27 + :lastupdated: 2016-09-29 :status: Open :supercedes: 106 @@ -63,8 +63,8 @@ Design Goals - Add resistance to malicious MitM TCP segmentation if possible - Don't add significantly to CPU required for connection setup; if possible, reduce it significantly -- Replace HMAC-MD5 with something more secure (see RFC 6151), - possibly HMAC-SHA256 or Poly1305 (see alternatives below). +- Add message authentication (MAC), possibly HMAC-SHA256 or Poly1305 + (see alternatives below), and remove Adler checksum - If possible, reduce the 4-message, two-round-trip handshake to a 3-message, one-round-trip handshake, as in SSU. This would require moving Bob's signature in message 4 to message 2.