[tor-dev] Proposal 284: Hidden Service v3 Control Port
teor
teor2345 at gmail.com
Thu Nov 9 09:10:01 UTC 2017
On 8 Nov 2017, at 04:20, David Goulet <dgoulet at ev0ke.net> wrote:
>>> 3.1.3. ADD_ONION
>>>
>>> For this command to support version 3, new values are added but the syntax
>>> is unchanged:
>>>
>>> "ADD_ONION" SP KeyType ":" KeyBlob
>>> [SP "Flags=" Flag *("," Flag)]
>>> 1*(SP "Port=" VirtPort ["," Target])
>>> *(SP "ClientAuth=" ClientName [":" ClientBlob]) CRLF
>>>
>>> New "KeyType" value to "ED25519-V3" which identifies the key type to be a
>>> v3 ed25519 key.
>>>
>>> New "KeyBlob" value to support the new "ED25519-V3", if specified, will
>>> generate a new ed25519 private key.
>>
>> This might need a couple more details; as-is ADD_ONION can take
>> "NEW:BEST" (which should now return a v3 service?)
When we change the default HiddenServiceVersion to 3, then let's make
BEST return a v3 service. Until then, let's make it v2.
I think it would be a good idea to be consistent like this.
T
>> or "NEW:ED25519-V3"
>> for explicitly asking for a V3 key, or "ED25519-V3:<56 base32 chars>"
>> for adding an already-existing v3 service.
>
> Oh good point! I failed to notice that "RSA1024:<key>" was even possible.
> Actually, it is not specified in the spec but the code expects this:
>
> "RSA1024:<Base64 Blob>" - Loading a pre-existing RSA1024 key.
>
> Ok fun! I'll add this. Good catch! And control-spec.txt should be updated.
>
> To be consistent then we could ask for a <Base64 Blob> as well:
>
> "ED25519-V3:<Base64 Blob>"
>
> ... which contains the ed25519 private key.
More information about the tor-dev
mailing list