aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRobert Ransom <rransom.8774@gmail.com>2010-12-13 22:42:11 -0800
committerRobert Ransom <rransom.8774@gmail.com>2010-12-13 22:42:11 -0800
commit9776ba7fa44af429cff984d183e387cf00476a8f (patch)
tree0cd2c7f2fa690da606e4e07eab9514107bb5ca92
parent021e4ac07eee9db9e535f3e5671a76e768f6042f (diff)
downloadtor-9776ba7fa44af429cff984d183e387cf00476a8f.tar.gz
tor-9776ba7fa44af429cff984d183e387cf00476a8f.zip
List another place router identity keys are used.
-rw-r--r--doc/spec/proposals/ideas/xxx-crypto-migration.txt2
1 files changed, 2 insertions, 0 deletions
diff --git a/doc/spec/proposals/ideas/xxx-crypto-migration.txt b/doc/spec/proposals/ideas/xxx-crypto-migration.txt
index edbc7a23cb..1c734229b8 100644
--- a/doc/spec/proposals/ideas/xxx-crypto-migration.txt
+++ b/doc/spec/proposals/ideas/xxx-crypto-migration.txt
@@ -283,6 +283,8 @@ Created: 12 December 2010
algorithm. The identity key itself is used:
- To sign the router descriptors
- To sign link-key certificates
+ - To determine the least significant bits of circuit IDs used on a
+ Tor instance's links (see tor-spec ยง5.1)
The fingerprint is used:
- To identify a router identity key in EXTEND cells