[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
nit-picky spec questions about connection protocol please....
- To: or-dev@xxxxxxxx
- Subject: nit-picky spec questions about connection protocol please....
- From: chris@xxxxxxxxxxxx
- Date: Wed, 3 Jan 2007 14:32:56 -0500
- Delivered-to: archiver@seul.org
- Delivered-to: or-dev-outgoing@seul.org
- Delivered-to: or-dev@seul.org
- Delivery-date: Wed, 03 Jan 2007 14:33:10 -0500
- Reply-to: or-dev@xxxxxxxxxxxxx
- Sender: owner-or-dev@xxxxxxxxxxxxx
- User-agent: Mutt/1.5.13 (2006-08-11)
I'm studying section 2 of the spec on connections
and just wanted to confirm some items with the good people of Tor....
* The 'short-term connection key' mentioned in third paragraph is an AES key
right?
* The 'identity key' is the RSA public key associated with a router right?
* Spec says this identity key is self-signed but did not say the 'short-term
connection key' is signed. The 'short-term connection key' is signed by
encrypting its hash with router's RSA private key right?
* Spec introduced the terms digital signature and certs in section 2 without
mentioning all the boring details like what standard is used for these two
things...e.g. X509?
* Are all the aforementioned certs and keys mentioned above sent in 'cells'?
Which cell types? This was not specified.
* It appears each onion router has a RSA public key that can be acquired from a
directory server or EXTEND cells. The begs the question how do the Onion
Routers safely get the public keys of directory servers? I assume routers
talk to them over HTTS / SSL right?
Cheers,
Chris
--
_______________________________________
Christian Seberino, Ph.D.
5707 SANTA FE ST
SAN DIEGO, CA 92109-1622
Phone: (619) 573-4233
Email: chris@xxxxxxxxxxxx
_______________________________________