diff options
author | Karsten Loesing <karsten.loesing@gmx.net> | 2009-01-04 00:21:28 +0000 |
---|---|---|
committer | Karsten Loesing <karsten.loesing@gmx.net> | 2009-01-04 00:21:28 +0000 |
commit | 87e5e26842a04053645865d7b6fa6d20d9af3aaf (patch) | |
tree | 07b5244e23b28ea1e8080f211450cb4985f5871a /proposals/ideas/xxx-what-uses-sha1.txt | |
parent | b0c837321bacc09ba242d4e77cc7de9b95c750b9 (diff) | |
download | torspec-87e5e26842a04053645865d7b6fa6d20d9af3aaf.tar.gz torspec-87e5e26842a04053645865d7b6fa6d20d9af3aaf.zip |
List places where the hidden service protocol uses SHA-1.
svn:r17866
Diffstat (limited to 'proposals/ideas/xxx-what-uses-sha1.txt')
-rw-r--r-- | proposals/ideas/xxx-what-uses-sha1.txt | 21 |
1 files changed, 20 insertions, 1 deletions
diff --git a/proposals/ideas/xxx-what-uses-sha1.txt b/proposals/ideas/xxx-what-uses-sha1.txt index 00ea56b..9b6e20c 100644 --- a/proposals/ideas/xxx-what-uses-sha1.txt +++ b/proposals/ideas/xxx-what-uses-sha1.txt @@ -102,7 +102,26 @@ What Tor uses hashes for today: 4. The rendezvous protocol - XXXX write me + A. Hidden servers use SHA-1 to establish introduction points on relays, + and relays use SHA-1 to check incoming introduction point + establishment requests. + B. Hidden servers use SHA-1 in multiple places when generating hidden + service descriptors. + C. Hidden servers performing basic-type client authorization for their + services use SHA-1 when encrypting introduction points contained in + hidden service descriptors. + D. Hidden service directories use SHA-1 to check whether a given hidden + service descriptor may be published under a given descriptor + identifier or not. + E. Hidden servers use SHA-1 to derive .onion addresses of their + services. + F. Clients use SHA-1 to generate the current hidden service descriptor + identifiers for a given .onion address. + G. Hidden servers use SHA-1 to remember digests of the first parts of + Diffie-Hellman handshakes contained in introduction requests in order + to detect replays. + H. Hidden servers use SHA-1 during the Diffie-Hellman key exchange with + a connecting client. 5. The bridge protocol |