[tor-dev] Proposal 284: Hidden Service v3 Control Port

teor teor2345 at gmail.com
Thu Nov 9 09:10:01 UTC 2017


On 8 Nov 2017, at 04:20, David Goulet <dgoulet at ev0ke.net> wrote:

>>> 3.1.3. ADD_ONION
>>> 
>>>   For this command to support version 3, new values are added but the syntax
>>>   is unchanged:
>>> 
>>>     "ADD_ONION" SP KeyType ":" KeyBlob
>>>                 [SP "Flags=" Flag *("," Flag)]
>>>                 1*(SP "Port=" VirtPort ["," Target])
>>>                 *(SP "ClientAuth=" ClientName [":" ClientBlob]) CRLF
>>> 
>>>   New "KeyType" value to "ED25519-V3" which identifies the key type to be a
>>>   v3 ed25519 key.
>>> 
>>>   New "KeyBlob" value to support the new "ED25519-V3", if specified, will
>>>   generate a new ed25519 private key.
>> 
>> This might need a couple more details; as-is ADD_ONION can take
>> "NEW:BEST" (which should now return a v3 service?)

When we change the default HiddenServiceVersion to 3, then let's make
BEST return a v3 service. Until then, let's make it v2.

I think it would be a good idea to be consistent like this.

T

>> or "NEW:ED25519-V3"
>> for explicitly asking for a V3 key, or "ED25519-V3:<56 base32 chars>"
>> for adding an already-existing v3 service.
> 
> Oh good point! I failed to notice that "RSA1024:<key>" was even possible.
> Actually, it is not specified in the spec but the code expects this:
> 
>    "RSA1024:<Base64 Blob>" - Loading a pre-existing RSA1024 key.
> 
> Ok fun! I'll add this. Good catch! And control-spec.txt should be updated.
> 
> To be consistent then we could ask for a <Base64 Blob> as well:
> 
>    "ED25519-V3:<Base64 Blob>"
> 
> ... which contains the ed25519 private key.


More information about the tor-dev mailing list