[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] v2 to v3 onion service transition



David Goulet:
> The thing that worries me about the approach of:
>     "Publishes somewhere their v3 address and cross-cert*."
> 
> ... is the amount of more traffic and complexity we had to the network for
> such a thing. I for sure don't want Tor to maintain some sorts of registry
> here just for a transition period that ultimately will die. Anyway, Tor
> shouldn't have to provide infrastructure for the actual network to work well.

No-no-no! By saying "somewhere" I meant "manually and out-of-band" (e.g.
on the site itself, via OTR chat, wall paintings etc). There is no
mechanism to notify Tor user (hopefully!) about such change. Tor just
provides a transport and nothing else.

> What if the operator has a torrc option that says "Please use this v2 HS and
> cross certify it with the v3.". Out of my head (just an example):
> 
>     HiddenServiceDir /my/service/one
>     HiddenServicePort ...
>     HiddenServiceLinkedWithV3 1
> 
>     HiddenServiceDir /my/service/two
>     HiddenServicePort ...
>     HiddenServiceLinkedWithV3 0 /* Would be off by default to avoid linkability. */

Personally I'm absolutely against any new torrc options. It's hard to
find this file, edit it, restart tor after (okay-okay I'm biased towards
Control and stateless tor here).
It also introduces
LengthyStingsThatAreTooHardToReadAndWhatIsToSayAboutRemember.

> We should also consider if it's really Tor's job to do this. Maybe it's OK to
> leave this job to the operators to deal with the v2 <-> v3 advertisement by
> themselves?
> 
> My guts tell me that I would like to have v3 tied to v2 as little as possible
> really but I also want current .onion operator to be able to provide maximum
> security for their users _especially_ when a .onion is very difficult to give
> around in some harsh political context.

Agreed. To make clearer what I mean:

I meant a userspace tool (maybe embedded into little-t-tor, TBB for
verification) that takes v2 private key and v3 address and creates
cross-ceritification v2->v3 (a signature):

$ onionxcert /path/to/v2-private-key v3-address.onion
base32-encoded-rsa-signature

Also it takes v3 private key and signs this cross-certification:

$ onionxcert /path/to/v3-private-key base32-encoded-rsa-signature
base32-encoded-cross-cert

Afterwards operator publishes (as described above) this document
1024+64=1536 (~308chars) along with v3 onion address. It could be even
"human-readable" (copypastable) :

llamanymityx4fi3l6x2gyzmtmgxjyqyorj9qsb5r543izcwymle.onion
base32-encoded-cross-cert-2gyzmtmgxjyqyorj9qsb5r543izcwy
mh2gyzmtmgxjyqyorj9qsb5r543izcwyml2gyzmtmgxjyqyorj9qsb5r
543izcwyml2gyzmtmgxjyqyorj9qsb5r543izcwyml2gyzmtmgxjyqyo
rj9qsb5r543izcwyml2gyzmtmgxjyqyorj9qsb5r543izcwyml2gyzmt
mgxjyqyorj9qsb5r543izcwymlml2gyzmtmgxjyqyorj9qsb5r543izc
wymlml2gyzmtmgxjyqyorj9qsb

End user verifies it like this:

$ onionxcert -v2 grapelookcorewwwi -v3
llamanymityx4fi3l6x2gyzmtmgxjyqyorj9qsb5r543izcwymle
base32-encoded-cross-cert
OK.

[Yes, it requires an HSDir fetch to get full RSA key].

Then it can also be included into v2 descriptor if the operator wishes
so. (torrc option? :/ modified private key file?)

After all this stuff happened, we can make a transparent connection over
verified v3 onion service that seems like it's still a v2 address for
the end user. At some point users update their address book and get happy.
We can also perform funny trick of v2 - publish "alias" v2 descriptors
without any intropoints and thus making no v2 service.


Thoughts, comments?

> ... that only informed power user will be able to understand what the
> hell is going on (but that we can maybe fix with good documentation,
> blog post and good practices guide).

It's better not to break. :)

--
Ivan Markin
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev