As far as I know (if
there is any error, please tell me), the onion v3 services allow the master
keys -public and secret (or private)- ed25519, generated in the directory
stipulated in "HiddenServiceDir" to be stored offline (on a pendrive,
for example), because the secret key is used "only" to generate
derived keys, which are what the service actually uses. As far as I can read in
the corresponding protocol, the derivations of the master keys (which can be
stored offline) are: "blinded signing keys and descriptor signing keys
(and their credentials), and their corresponding descriptor encryption keys"
(https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt#n529).
Assuming the above is correct,I have some doubts:
1. The keys and other elements derived from the public and
private master keys (like “blinded signing keys”) are generated by the
operator, according to the protocol. Will Tor incorporate any software/tools
that make this procedure easier for the user?
2. If the operator does not generate the derived elements,
and only modifies the torrc file to add "HiddenServiceDir" and
"HiddenServicePort", will the onion service work, or will the lack of
the derived elements not work?
3. As far as I understand, currently the option to save
offline the master keys is not available. Does this mean that derived elements,
such as "blinded signing keys" are not used yet? To what extent is
the v3 protocol implemented?
4. V3 encrypts the
onion service descriptor sent to the "HSDir" node to prevent these
nodes from collecting onion addresses. But is this currently happening, even if
the operator does not generate the derived keys using the master key pair?
I apologize for any write errors (English is not my mother
tongue).