aboutsummaryrefslogtreecommitdiff
path: root/proposals/224-rend-spec-ng.txt
diff options
context:
space:
mode:
authorGeorge Kadianakis <desnacked@riseup.net>2016-04-12 15:18:25 +0300
committerGeorge Kadianakis <desnacked@riseup.net>2016-05-08 17:35:10 -0400
commit0567494b3f1cd51cc6f5404fc8d84ec5f4434bc8 (patch)
treeab9ef6dcb558fdfa9912669e11bef7e71c5412c5 /proposals/224-rend-spec-ng.txt
parentf4026eec6858ff9e085b6c46224d7b0367d93cff (diff)
downloadtorspec-0567494b3f1cd51cc6f5404fc8d84ec5f4434bc8.tar.gz
torspec-0567494b3f1cd51cc6f5404fc8d84ec5f4434bc8.zip
prop224: Clarify when we need fresh salt for descriptors.
Diffstat (limited to 'proposals/224-rend-spec-ng.txt')
-rw-r--r--proposals/224-rend-spec-ng.txt12
1 files changed, 3 insertions, 9 deletions
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index 237ffdd..a3fb40b 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -851,15 +851,9 @@ Status: Draft
The encrypted part of the hidden service descriptor is encrypted and
authenticated with symmetric keys generated as follows:
- SALT = 16 bytes from H(random), different for each post to each replica,
- even if the content of the descriptor hasn't changed.
- (This avoids leaking service stability, and linking replicas
- via encrypted data comparison.)
-
- (We hash salt so that we don't leak the raw bytes returned by a PRNG
- to the network. See [RANDOM-REFS].)
-
- [ XX/teor - is the extra load on the HSDirs worth it? ]
+ SALT = 16 bytes from H(random), changes each time we rebuld the
+ descriptor even if the content of the descriptor hasn't changed.
+ (So that we don't leak whether the intro point list etc. changed)
secret_input = blinded_public_key | subcredential | INT_4(revision_counter)
keys = KDF(secret_input, salt, "hsdir-encrypted-data",