From 75a18debcb3ab19ac9e37b5e37bc8de026915ecc Mon Sep 17 00:00:00 2001
From: jrandom $Id: tunnel.html,v 1.5 2005/01/14 17:43:44 jrandom Exp $
+$Id: tunnel.html,v 1.6 2005/01/14 19:06:40 jrandom Exp $
1) Tunnel overview
2) Tunnel operation
@@ -264,9 +264,9 @@ peer who is the first hop (usually the peer1.recv row) and forward that entirely
tunnel key using AES256 in CTR mode with the first 16 bytes as the IV. They then
calculate the hash of what they see as the payload (bytes 16 through $size-288) and
search for that hash within the decrypted checksum block. If no match is found, the
-message is discarded. Otherwise, the IV is updated by decrypting it and replacing it
-with the first 16 bytes of its hash. The resulting message is then forwarded on to
-the next peer for processing.