[tor-commits] [tor/master] prop224: Add changes file for prop224

nickm at torproject.org nickm at torproject.org
Fri Sep 15 12:16:24 UTC 2017


commit 88c58078fa41cf8a5c915a18f10e714174cd90c7
Author: George Kadianakis <desnacked at riseup.net>
Date:   Fri Sep 15 13:23:48 2017 +0300

    prop224: Add changes file for prop224
---
 changes/prop224 | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

diff --git a/changes/prop224 b/changes/prop224
new file mode 100644
index 000000000..9401ff783
--- /dev/null
+++ b/changes/prop224
@@ -0,0 +1,36 @@
+  o Major features (next-generation onion services):
+    - Tor now supports the next-generation onion services protocol for clients
+      and services! As part of this release, the core of proposal 224 has been
+      implemented and is available for experimentation and testing by our
+      users. This newer version of onion services (v3) features various
+      improvements over the legacy system:
+        a) Better crypto (replaced SHA1/DH/RSA1024 with SHA3/ed25519/curve25519)
+        b) Improved directory protocol leaking less to directory servers.
+        c) Improved directory protocol with smaller surface for targeted attacks.
+        d) Better onion address security against impersonation.
+        e) More extensible introduction/rendezvous protocol.
+        f) A cleaner and more modular codebase.
+
+      Furthermore, as part of this update, onion addresses increase in length
+      and are now 56 characters long:
+         4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion
+
+      In the future, we will be releasing more options and features but we
+      first need a testing period, so that the current codebase matures and
+      becomes more robust. Here are some of the features we have planned:
+        1) Offline keys for onion services
+        2) Advanced client authorization for onion services
+        3) Improved guard algorithm for onion services
+        4) Next-gen onion service statistics
+
+      Please see our proposal for more details:
+        https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
+
+      The default version for onion services remains v2 (the legacy system)
+      until this new codebase gets tested and hardened.
+
+      Service operators who want to experiment with the new system can use the
+      'HiddenServiceVersion 3' torrc directive along with the regular onion
+      service configuration options.
+
+      We will publish a blog post about this new feature soon! Enjoy!





More information about the tor-commits mailing list