Sounds like a great way to do it.
I do want to make validation against the network, specifically with the contact info however I don't think there is any validation in the network as to the values of the email and/or host.
Is there an easy way for me to get a node's public key from itself or the network? That way they can sign the fingerprint of the node + requested domain name using their private key and I can verify it with their public key.
Eran
On Sun, Oct 25, 2015 at 9:41 PM Tor Relays at brwyatt.net tor@brwyatt.net wrote:
Link requested subdomains to the relay's fingerprint, and require all change/update requests to be signed by the node's keys, and have some validation that the node can be found on the network (and is an exit node). This will ensure only Tor exit nodes can apply, and that nodes can only change their own subdomain, and even makes it reletively scriptable, if desired.
On 2015-10-25 12:26, Geoff Down wrote:
On Sun, Oct 25, 2015, at 05:49 AM, Eran Sandler wrote:
If so, I'll write a small something that will allow adding new subdomains to it. So that you can always add and update subdomains on it.
As long as you don't let other people do that themselves. That would be open to abuse. GD
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays