[tor-commits] [torspec/master] prop224: Clarify when we need fresh salt for descriptors.
asn at torproject.org
asn at torproject.org
Sun May 8 21:36:25 UTC 2016
commit 0567494b3f1cd51cc6f5404fc8d84ec5f4434bc8
Author: George Kadianakis <desnacked at riseup.net>
Date: Tue Apr 12 15:18:25 2016 +0300
prop224: Clarify when we need fresh salt for descriptors.
---
proposals/224-rend-spec-ng.txt | 12 +++---------
1 file changed, 3 insertions(+), 9 deletions(-)
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index 237ffdd..a3fb40b 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -851,15 +851,9 @@ Status: Draft
The encrypted part of the hidden service descriptor is encrypted and
authenticated with symmetric keys generated as follows:
- SALT = 16 bytes from H(random), different for each post to each replica,
- even if the content of the descriptor hasn't changed.
- (This avoids leaking service stability, and linking replicas
- via encrypted data comparison.)
-
- (We hash salt so that we don't leak the raw bytes returned by a PRNG
- to the network. See [RANDOM-REFS].)
-
- [ XX/teor - is the extra load on the HSDirs worth it? ]
+ SALT = 16 bytes from H(random), changes each time we rebuld the
+ descriptor even if the content of the descriptor hasn't changed.
+ (So that we don't leak whether the intro point list etc. changed)
secret_input = blinded_public_key | subcredential | INT_4(revision_counter)
keys = KDF(secret_input, salt, "hsdir-encrypted-data",
More information about the tor-commits
mailing list