Hi, On 28 Apr 2018, at 06:59, meejah <meejah@xxxxxxxxx> wrote: After reading the spec diff and your mail, I'm still not sure I If the service does not encrypt the descriptor with an x25519 key, then the client does not need a key to read it. The spec says that the client must have both keys and use both to Please use different words from v2 to avoid confusion. Please use words that describe what a thing *is*, not how secure it is, or what it should be used for, or what level of the design it is on. (We made that mistake when naming "hidden services".) I would recommend: * "descriptor" for descriptor auth * "intro" for into auth We need your opinions about this. Yes, they have different security properties. For example, a Ricochet-like peer to peer messaging protocol would like to be able to revoke one contact (intro auth), without disconnecting all the rest (descriptor auth). Or should we require the service to enable both for all clients? If someone doesn't understand client auth in detail, and just wants to be more secure, we should give them a single option that enables both kinds of client auth. (Security by default.) OnionServiceClientAuthentication 1 (Default: 0) If someone knows they only want a particular client auth method, we should give them another option that contains a list of active client auth methods. (Describe what you have, not what you don't have, because negatives confuse humans.) OnionServiceClientAuthenticationMethods intro (Default: descriptor, intro) T |
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev