[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] RSA identity keys
>> Various other tools can utilize them for sign
>> and encrypt. A number of useful scenarious
>> can be envisioned.
> other stuff as well, and the two uses opened up attack vectors.
I didn't mean to suggest full general purpose use of these keys.
Minimally, users just need to be able to securely sign arbitrary things...
[> What would be much safer here would be to bootstrap trust from]
[> your Tor ID key to some other key]
>> But I can't put a passphrase on them
...which wouldn't be very secure for the general userbase. And
would yield easier unauthorized reassignment of that trust into
the downstream space.
> Much easier and possibly safer IMO is to look into a delegation
> mechanism, where identity keys are never actually loaded by Tor,
> and can be stored offline.
Well, then it's likely looking at some sort of agent/protocol involving
the controller. Managing that type of connection would be a pretty
advanced topic for the general user/operator.
Didn't think of the additional win of the optional passphrase effectively
securing the published descriptor params/config.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk