[or-cvs] r17866: {tor} List places where the hidden service protocol uses SHA-1. (tor/trunk/doc/spec/proposals/ideas)

kloesing at seul.org kloesing at seul.org
Sun Jan 4 00:21:28 UTC 2009


Author: kloesing
Date: 2009-01-03 19:21:28 -0500 (Sat, 03 Jan 2009)
New Revision: 17866

Modified:
   tor/trunk/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt
Log:
List places where the hidden service protocol uses SHA-1.

Modified: tor/trunk/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt
===================================================================
--- tor/trunk/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt	2009-01-03 23:59:30 UTC (rev 17865)
+++ tor/trunk/doc/spec/proposals/ideas/xxx-what-uses-sha1.txt	2009-01-04 00:21:28 UTC (rev 17866)
@@ -102,7 +102,26 @@
 
 4. The rendezvous protocol
 
-   XXXX write me
+   A. Hidden servers use SHA-1 to establish introduction points on relays,
+      and relays use SHA-1 to check incoming introduction point
+      establishment requests.
+   B. Hidden servers use SHA-1 in multiple places when generating hidden
+      service descriptors.
+   C. Hidden servers performing basic-type client authorization for their
+      services use SHA-1 when encrypting introduction points contained in
+      hidden service descriptors.
+   D. Hidden service directories use SHA-1 to check whether a given hidden
+      service descriptor may be published under a given descriptor
+      identifier or not.
+   E. Hidden servers use SHA-1 to derive .onion addresses of their
+      services.
+   F. Clients use SHA-1 to generate the current hidden service descriptor
+      identifiers for a given .onion address.
+   G. Hidden servers use SHA-1 to remember digests of the first parts of
+      Diffie-Hellman handshakes contained in introduction requests in order
+      to detect replays.
+   H. Hidden servers use SHA-1 during the Diffie-Hellman key exchange with
+      a connecting client.
 
 5. The bridge protocol
 



More information about the tor-commits mailing list