[tor-bugs] #31369 [Core Tor/Stem]: HSv3 descriptor support in stem
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Aug 27 03:43:06 UTC 2019
#31369: HSv3 descriptor support in stem
-----------------------------------------+-------------------------------
Reporter: asn | Owner: atagar
Type: defect | Status: reopened
Priority: Medium | Milestone:
Component: Core Tor/Stem | Version:
Severity: Normal | Resolution:
Keywords: tor-hs onionbalance scaling | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor: Sponsor27-can
-----------------------------------------+-------------------------------
Comment (by teor):
asn / atagar,
I'm happy to answer questions about certificate validation.
Here's what we have already:
Ed25519 certificate validation in stem's certificate.py.
Here's how to validate a signed hash using python's cryptography module:
https://gitweb.torproject.org/stem.git/tree/stem/descriptor/certificate.py#n256
Ed25519 key blinding in tor's unit tests.
Here's how we blind a key:
https://gitweb.torproject.org/tor.git/tree/src/test/ed25519_exts_ref.py#n34
We might be able to rewrite that code better if we have access to some low
level functions in python cryptography.
There are also some other useful tor unit tests in python:
HSv3 hash ring indexes:
https://gitweb.torproject.org/tor.git/tree/src/test/hs_indexes.py
HSv3 addresses:
https://gitweb.torproject.org/tor.git/tree/src/test/hs_build_address.py
Maybe the HSv3 ntor or plain ntor implementations could also help:
https://gitweb.torproject.org/tor.git/tree/src/test/hs_ntor_ref.py
https://gitweb.torproject.org/tor.git/tree/src/test/ntor_ref.py
ntor uses curve25519.
Let me know what you're missing, and I'll do my best to help.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31369#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list