[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21693 [Core Tor/Tor]: prop224: HS descriptors do wasteful double-base64 encoding
#21693: prop224: HS descriptors do wasteful double-base64 encoding
-----------------------------+------------------------------------
Reporter: asn | Owner: asn
Type: task | Status: assigned
Priority: Medium | Milestone: Tor: 0.3.1.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-hs, prop224 | Actual Points:
Parent ID: | Points: 4
Reviewer: | Sponsor: SponsorR-can
-----------------------------+------------------------------------
Comment (by nickm):
It's even easier than that -- you can use tor_gzip_compress and
tor_gzip_uncompress. No need to involve bufs.
And what about doing it like this --
{{{
outer-layer = header + middle_layer
middle-layer = b64(encrypt(compressed-part + nul-padding))
compressed-part = gzip(client_auth_data +
b64(encrypt(gzip(inner_layer))))
}}}
This keeps the length-hiding property of the nul padding, but allows more
client_auth_data.
Thoughts?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21693#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs