[tor-dev] Sanitizing bridge descriptors containing ed25519 fields
karsten at torproject.org
Sat Jun 13 08:08:17 UTC 2015
-----BEGIN PGP SIGNED MESSAGE-----
On 01/06/15 20:02, Karsten Loesing wrote:
> On 01/06/15 17:48, Nick Mathewson wrote:
>> On Mon, Jun 1, 2015 at 3:27 AM, Karsten Loesing
>> <karsten at torproject.org> wrote:
>>> Which one, the extended "extra-info" line or the additional
>>> "fingerprint-ed25519" line? :)
>> Not sure. I haven't actually added either yet; does the status
>> quo not work?
> Well, it's the same use case. People would be able to grep
> extra-info descriptors for a given identity string, rather than
> having to use a specialized tool for that. It think it would be
> useful to have.
> (And it would allow me to ignore the identity-ed25519 crypto block
> entirely rather than having to parse the contained data structure
> and pick the bytes I want.)
>> I think the master-key-ed25519 line is the likeliest way; I
>> don't know if adding an extra arg to the first line is clever.
> I'm fine with either solution. If your preference is to add
> another master-key-ed25519 line (and if you agree that it would
> make sense to have the plain-text master key in extra-info
> descriptors at all), sounds good to me.
Please find the following ticket for a first implementation of the new
sanitizing code. It comes with two samples of sanitized descriptors
containing new fields.
All the best,
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
-----END PGP SIGNATURE-----
More information about the tor-dev