aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/spec/proposals/ideas/xxx-crypto-migration.txt2
1 files changed, 2 insertions, 0 deletions
diff --git a/doc/spec/proposals/ideas/xxx-crypto-migration.txt b/doc/spec/proposals/ideas/xxx-crypto-migration.txt
index edbc7a23cb..1c734229b8 100644
--- a/doc/spec/proposals/ideas/xxx-crypto-migration.txt
+++ b/doc/spec/proposals/ideas/xxx-crypto-migration.txt
@@ -283,6 +283,8 @@ Created: 12 December 2010
algorithm. The identity key itself is used:
- To sign the router descriptors
- To sign link-key certificates
+ - To determine the least significant bits of circuit IDs used on a
+ Tor instance's links (see tor-spec ยง5.1)
The fingerprint is used:
- To identify a router identity key in EXTEND cells