> On 20 May 2016, at 11:59, Yawning Angel <yawning@xxxxxxxxxxxxxxx> wrote: > > What's strange about it. The client does the path selection. To build > a circuit, the client must know the public keys/ip/port for the entire > path and the exit policy. Clients could get away with only knowing the key fingerprints for relays in their paths, except for their Guards, which are the only relays they connect to directly. (This might mean a protocol redesign, because I think we send IP and port as well as fingerprint at the moment.) There are probably other fields we could drop in the common case, if we really needed to. But do we really need to? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev