[or-cvs] r21499: {website} replace directory server with DHT for now. (website/trunk/en)
Andrew Lewman
andrew at torproject.org
Tue Jan 26 15:12:31 UTC 2010
Author: phobos
Date: 2010-01-26 15:12:31 +0000 (Tue, 26 Jan 2010)
New Revision: 21499
Modified:
website/trunk/en/hidden-services.wml
Log:
replace directory server with DHT for now.
Modified: website/trunk/en/hidden-services.wml
===================================================================
--- website/trunk/en/hidden-services.wml 2010-01-26 14:14:04 UTC (rev 21498)
+++ website/trunk/en/hidden-services.wml 2010-01-26 15:12:31 UTC (rev 21499)
@@ -41,9 +41,7 @@
Step two: the hidden service assembles a <em>hidden service
descriptor</em>, containing its public key and a summary of each
introduction point, and signs this descriptor with its private key.
-It uploads that descriptor to a set of directory servers, again using a
-full Tor circuit to hide the link between the directory server storing
-the descriptor and the hidden server's IP address. The descriptor will be
+It uploads that descriptor to a distributed hash table. The descriptor will be
found by clients requesting XYZ.onion where XYZ is a 16 character
name that can be uniquely derived from the service's public key. After
this step, the hidden service is set up.
@@ -52,7 +50,7 @@
<p>
Although it might seem impractical to use an automatically-generated
service name, it serves an important goal: Everyone – including
-the introduction points, the directory servers, and of course the
+the introduction points, the distributed hash table directory, and of course the
clients – can verify that they are talking to the right hidden
service. See also <a href="https://zooko.com/distnames.html">Zooko's
conjecture</a> that out of Decentralized, Secure, and Human-Meaningful,
@@ -62,7 +60,7 @@
</p>
<img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png" />
-# maybe replace "database" with "directory servers"; further: how incorrect
+# maybe replace "database" with "DHT"; further: how incorrect
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
# use?
@@ -70,7 +68,8 @@
Step three: A client that wants to contact a hidden service needs to
learn about its
onion address first. After that, the client can initiate connection
-establishment by downloading the descriptor from the directory servers. If
+establishment by downloading the descriptor from the distributed hash
+table. If
there is a descriptor for XYZ.onion (the hidden service could also be
offline or have left long ago, or there could be a typo in the onion
address), the client now knows the set of introduction points and the
More information about the tor-commits
mailing list