[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] x.509 for hidden services
On Sat, Oct 26, 2013 at 12:57 AM, grarpamp <grarpamp@xxxxxxxxx> wrote:
>> I believe torchat does this
>
> IIRC, torchat is just doing a bidirectional secret passing
> pingpong between clients behind the HS addresses, no
> actual x509 stuff. There's a good paper on it.
Link please. :)
At least in one (early) version it needed to access the HS keys so it
could sign with them and identify itself on outgoing connections. I
didn't mean to imply it used x.509, but rather just that something
else had used a HS identity key for some application level auth.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk