mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 12:23:32 +01:00
proposal 114: changed descriptor format, key length discussion, typos
svn:r10413
This commit is contained in:
parent
1cb1ebbfe0
commit
07ed34aadb
@ -10,6 +10,7 @@ Change history:
|
|||||||
|
|
||||||
13-May-2007 Initial proposal
|
13-May-2007 Initial proposal
|
||||||
14-May-2007 Added changes suggested by Lasse Overlier
|
14-May-2007 Added changes suggested by Lasse Overlier
|
||||||
|
30-May-2007 Changed descriptor format, key length discussion, typos
|
||||||
|
|
||||||
Overview:
|
Overview:
|
||||||
|
|
||||||
@ -216,15 +217,16 @@ Design:
|
|||||||
date, and "cookie" is a shared secret between the hidden service provider
|
date, and "cookie" is a shared secret between the hidden service provider
|
||||||
and its clients. (The "time-period" should be constructed in a way that
|
and its clients. (The "time-period" should be constructed in a way that
|
||||||
periods do not change at the same moment for all descriptors by including
|
periods do not change at the same moment for all descriptors by including
|
||||||
the "permanent-id" in the construction.) Amonst other things, the
|
the "permanent-id" in the construction.) Amongst other things, the
|
||||||
descriptor contains the public key of the hidden service provider, the
|
descriptor contains the public key of the hidden service provider, the
|
||||||
value of h(time-period + cookie), and the signature of the descriptor
|
value of h(time-period + cookie), and the signature of the descriptor
|
||||||
content with the private key of the hidden service provider.
|
content with the private key of the hidden service provider.
|
||||||
|
|
||||||
The introduction points that are included in the descriptor are encrypted
|
The introduction points that are included in the descriptor are encrypted
|
||||||
using a key that is derived from the same shared key that is used to
|
using a key that is derived from the same shared key that is used to
|
||||||
generate the descriptor ID. [usage of a derived key as encryption key
|
generate the descriptor ID. [correction to use another key than
|
||||||
instead of the shared key itself suggested by LO]
|
h(time-period + cookie) as encryption key for introduction points made by
|
||||||
|
LO]
|
||||||
|
|
||||||
A new text-based format is proposed for descriptors instead of an
|
A new text-based format is proposed for descriptors instead of an
|
||||||
extension of the existing binary format for reasons of future
|
extension of the existing binary format for reasons of future
|
||||||
@ -238,8 +240,8 @@ Design:
|
|||||||
h(time-period + cookie)
|
h(time-period + cookie)
|
||||||
timestamp
|
timestamp
|
||||||
{
|
{
|
||||||
list of (introduction point IP, port, public service key)
|
list of intro points (ID, IP, onion port, onion key, service key)
|
||||||
} encrypted with h(time-period + cookie + 'introduction')
|
} encrypted with cookie
|
||||||
} signed with permanent-private-key
|
} signed with permanent-private-key
|
||||||
|
|
||||||
A hidden service directory can verify that a descriptor was created by the
|
A hidden service directory can verify that a descriptor was created by the
|
||||||
@ -331,7 +333,7 @@ Specification:
|
|||||||
|
|
||||||
The proposed changes affect multiple sections in several specification
|
The proposed changes affect multiple sections in several specification
|
||||||
documents that are only mentioned in the following. The detailed
|
documents that are only mentioned in the following. The detailed
|
||||||
specification will follow as soon as the design decision above are final.
|
specification will follow as soon as the design decisions above are final.
|
||||||
|
|
||||||
dir-spec-v2.txt
|
dir-spec-v2.txt
|
||||||
|
|
||||||
@ -392,24 +394,25 @@ Implementation:
|
|||||||
|
|
||||||
There are three key lengths that might need some discussion:
|
There are three key lengths that might need some discussion:
|
||||||
|
|
||||||
1) desciptor-id, formerly known as onion address: It is generated by OPs
|
1) descriptor-id, formerly known as onion address: It is generated by OPs
|
||||||
internally and used for storing and looking up descriptors. There is no
|
internally and used for storing and looking up descriptors. There is no
|
||||||
need to remember a descriptor-id for a human. In order to reduce
|
need to remember a descriptor-id for a human. In order to reduce
|
||||||
the success rate of collisions it could be extended to 256 bits instead
|
the success rate of collisions it could be extended to the full output
|
||||||
of 80 bits. This requires a secure hash function with an output of 256
|
of SHA-1 of 160 bits instead of 80 bits. [extending the descriptor-id
|
||||||
instead of 160 bits, e.g. SHA-256. [extending the descriptor-id length
|
length suggested by LO]
|
||||||
from 80 to 256 bits suggested by LO]
|
|
||||||
|
|
||||||
2) permanent-id: This is the first half of the onion address that a client
|
2) permanent-id: This is the first part of the onion address that a client
|
||||||
passes to his OP. The onion address should be easy to memorize.
|
passes to his OP. The overall onion address should be easy to memorize.
|
||||||
Therefore, the overall length of an onion address should not be
|
Therefore, its overall length should only be extended from the existing
|
||||||
extended over the existing 80 bits, so that 40 bits is the maximum
|
80 bits to as few bits as necessary. The length of the permanent-id has
|
||||||
length of the permanent-id. However, the question remains open, if an
|
an influence on the probability that an adversary creates an own key
|
||||||
onion address of 40+40=80 bits can generate a descriptor-id with enough
|
pair that leads to the same descriptor-id in a given time-period as an
|
||||||
entropy to justify 256 instead of 80 bits. Otherwise, the onion address
|
honest service's key. 32 bits should provide sufficient protection to
|
||||||
would need to be extended to 128, 160, 224, or 256 bits, making it
|
avoid collisions, given the fact that key generation is expensive and
|
||||||
harder to memorize for human-beings.
|
the attack needed to be performed for every time-period.
|
||||||
|
|
||||||
3) cookie: This is the second half of the onion address that is passed to
|
3) cookie: This is the second part of the onion address that is passed to
|
||||||
an OP. It should have the same size as permanent-id.
|
an OP. In order to provide confidentiality of introduction points, this
|
||||||
|
secret key should have 128 bits. In total, this leads to an onion
|
||||||
|
address of 160 bits instead of the current 80 bits.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user