[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] Added some more comments on the TAG encryption discussi...
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv14419
Modified Files:
minion-spec.tex
Log Message:
Added some more comments on the TAG encryption discussion, and attempted to close some discussions.
Index: minion-spec.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-spec.tex,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -d -r1.34 -r1.35
--- minion-spec.tex 25 Jun 2002 11:51:23 -0000 1.34
+++ minion-spec.tex 25 Jun 2002 14:40:47 -0000 1.35
@@ -210,6 +210,13 @@
[XXXX And by the way, how exactly do we compute a hash of a public
key? What encoding do we use? Do we just use the modulus, or must
we include 'e' as well? -NM]
+[XXXX We can use the formats in PKCS#1 (ASN.1 format appendix) for
+ RSApublickey. It just appends the binary representations of e and
+ n. We can compute the SHA-1 of this to get a keyID.
+
+ I think if we argree on all of the above (I do), we can close this
+ thread of comments. Is there any outstanding issue from above?
+ -GD]
A SWAP routing type tells the node to exchange headers as described below.
@@ -317,6 +324,14 @@
Am I missing something? -GD]
[XXXX For SMTP delivery, the tag is included in an 'X-Remailer-Tag'
header; see above. -NM]
+[XXXX As I had it in my mind there would be two subheaders at the end
+ of the message: one with SMTP and one with LOCAL. The SMTP
+ tag would make the last machine (other than recipient's) send
+ the mail, while the LOCAL (encrypted under the final
+ recipient) will still do the decryption and
+ decoding. Therefore the X-Remailer-Tag does not contain any
+ secrets. The packet encoded to be sent by SMTP is still a
+ valid mixminion packet (see email encoding) -GD]
\subsection{The header structure}
@@ -652,6 +667,8 @@
openssl doesn't support the mentioned ciphersuite. Nonetheless,
it seems that NSS and GnuTLS both support it (NSS on the client
side only), so we needn't worry. -NM]
+[XXXX I think we should choose a suite that is widely supported and
+ strong at the same time. -GD]
X.509 certificates need not be signed; instead, they must contain
a key matching that used in the KEYIDportion of the header's routing