diff options
author | Robert Ransom <rransom.8774@gmail.com> | 2010-12-13 22:42:11 -0800 |
---|---|---|
committer | Robert Ransom <rransom.8774@gmail.com> | 2010-12-13 22:42:11 -0800 |
commit | 9776ba7fa44af429cff984d183e387cf00476a8f (patch) | |
tree | 0cd2c7f2fa690da606e4e07eab9514107bb5ca92 | |
parent | 021e4ac07eee9db9e535f3e5671a76e768f6042f (diff) | |
download | tor-9776ba7fa44af429cff984d183e387cf00476a8f.tar.gz tor-9776ba7fa44af429cff984d183e387cf00476a8f.zip |
List another place router identity keys are used.
-rw-r--r-- | doc/spec/proposals/ideas/xxx-crypto-migration.txt | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/doc/spec/proposals/ideas/xxx-crypto-migration.txt b/doc/spec/proposals/ideas/xxx-crypto-migration.txt index edbc7a23cb..1c734229b8 100644 --- a/doc/spec/proposals/ideas/xxx-crypto-migration.txt +++ b/doc/spec/proposals/ideas/xxx-crypto-migration.txt @@ -283,6 +283,8 @@ Created: 12 December 2010 algorithm. The identity key itself is used: - To sign the router descriptors - To sign link-key certificates + - To determine the least significant bits of circuit IDs used on a + Tor instance's links (see tor-spec ยง5.1) The fingerprint is used: - To identify a router identity key in EXTEND cells |