[tor-talk] x.509 for hidden services

Gregory Maxwell gmaxwell at gmail.com
Sat Oct 26 08:53:23 UTC 2013


On Sat, Oct 26, 2013 at 12:57 AM, grarpamp <grarpamp at gmail.com> wrote:
>> I believe torchat does this
>
> IIRC, torchat is just doing a bidirectional secret passing
> pingpong between clients behind the HS addresses, no
> actual x509 stuff. There's a good paper on it.

Link please. :)

At least in one (early) version it needed to access the HS keys so it
could sign with them and identify itself on outgoing connections. I
didn't mean to imply it used x.509, but rather just that something
else had used a HS identity key for some application level auth.


More information about the tor-talk mailing list