Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ed25519 URI proof #16

Open
Saklad5 opened this issue Oct 11, 2022 · 10 comments
Open

Add ed25519 URI proof #16

Saklad5 opened this issue Oct 11, 2022 · 10 comments

Comments

@Saklad5
Copy link

Saklad5 commented Oct 11, 2022

Tor relays currently use both a vestigial RSA1024 key and an ed25519 key. It would make more sense to rely on the latter, especially since there is already a designated location for them.


I propose a new proof value, uri-ed25519, which may be validated using the /.well-known/tor-relay/ed25519-master-pubkey.txt path as described in the current tor-relay spec.

@Saklad5
Copy link
Author

Saklad5 commented Oct 11, 2022

A corresponding dns-ed25519 proof could also be added, of course.

@nusenu
Copy link
Owner

nusenu commented Oct 29, 2022 via email

@Saklad5
Copy link
Author

Saklad5 commented Nov 9, 2022

  1. file a issue on gitlab.torproject.org to add ed25519 keys to onionoo

Do you know which repository that is? I can't seem to find it there.

@nusenu
Copy link
Owner

nusenu commented Nov 10, 2022 via email

@Saklad5
Copy link
Author

Saklad5 commented Nov 12, 2022

Done.

By the way, about the DNS proof: couldn't you just use TXT records? It'd be way easier.

@nusenu
Copy link
Owner

nusenu commented Nov 12, 2022 via email

@Saklad5
Copy link
Author

Saklad5 commented Nov 12, 2022

We use TXT records for dns-rsa and will use TXT records for dns-ed25519 as well, would you mind elaborating?

Why not just have a single TXT record with the same contents as the URI proof? Then you don't need to encode anything in a DNS label.

Also, do you have a particular use-case for this issue?

Nothing too specific: I just want to remove obstacles to no longer having to manage both RSA and ed25519 keys.

@nusenu
Copy link
Owner

nusenu commented Nov 12, 2022 via email

@Saklad5
Copy link
Author

Saklad5 commented Nov 12, 2022

Ah, that is a problem. In that case, borrow from Sender Policy Framework’s solution: add the ability for a TXT record to include another.

That makes parsing more complex, of course, but not by much. And it wouldn’t be necessary for most people.

@nusenu
Copy link
Owner

nusenu commented Nov 19, 2022

I don't think SPF is a good example to follow in that regard.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants