aboutsummaryrefslogtreecommitdiff
path: root/proposals/ideas/xxx-what-uses-sha1.txt
diff options
context:
space:
mode:
authorKarsten Loesing <karsten.loesing@gmx.net>2009-01-04 00:21:28 +0000
committerKarsten Loesing <karsten.loesing@gmx.net>2009-01-04 00:21:28 +0000
commit87e5e26842a04053645865d7b6fa6d20d9af3aaf (patch)
tree07b5244e23b28ea1e8080f211450cb4985f5871a /proposals/ideas/xxx-what-uses-sha1.txt
parentb0c837321bacc09ba242d4e77cc7de9b95c750b9 (diff)
downloadtorspec-87e5e26842a04053645865d7b6fa6d20d9af3aaf.tar.gz
torspec-87e5e26842a04053645865d7b6fa6d20d9af3aaf.zip
List places where the hidden service protocol uses SHA-1.
svn:r17866
Diffstat (limited to 'proposals/ideas/xxx-what-uses-sha1.txt')
-rw-r--r--proposals/ideas/xxx-what-uses-sha1.txt21
1 files changed, 20 insertions, 1 deletions
diff --git a/proposals/ideas/xxx-what-uses-sha1.txt b/proposals/ideas/xxx-what-uses-sha1.txt
index 00ea56b..9b6e20c 100644
--- a/proposals/ideas/xxx-what-uses-sha1.txt
+++ b/proposals/ideas/xxx-what-uses-sha1.txt
@@ -102,7 +102,26 @@ What Tor uses hashes for today:
4. The rendezvous protocol
- XXXX write me
+ A. Hidden servers use SHA-1 to establish introduction points on relays,
+ and relays use SHA-1 to check incoming introduction point
+ establishment requests.
+ B. Hidden servers use SHA-1 in multiple places when generating hidden
+ service descriptors.
+ C. Hidden servers performing basic-type client authorization for their
+ services use SHA-1 when encrypting introduction points contained in
+ hidden service descriptors.
+ D. Hidden service directories use SHA-1 to check whether a given hidden
+ service descriptor may be published under a given descriptor
+ identifier or not.
+ E. Hidden servers use SHA-1 to derive .onion addresses of their
+ services.
+ F. Clients use SHA-1 to generate the current hidden service descriptor
+ identifiers for a given .onion address.
+ G. Hidden servers use SHA-1 to remember digests of the first parts of
+ Diffie-Hellman handshakes contained in introduction requests in order
+ to detect replays.
+ H. Hidden servers use SHA-1 during the Diffie-Hellman key exchange with
+ a connecting client.
5. The bridge protocol