On Mon, Jan 31, 2011 at 03:03:57PM -0500, Ian Goldberg wrote: > On Mon, Jan 31, 2011 at 08:37:00PM +0100, Karsten Loesing wrote: > > Here's a sample bridge pool assignment from September 2010 that is > > sanitized as described above (all IP addresses set to 127.0.0.1, contained > > fingerprints are SHA-1 hashes of the original fingerprints): > > > > http://freehaven.net/~karsten/volatile/bridge-pool-assignment-sample > > > > This sample is there, so that everyone gets a better idea of what is meant > > by a bridge pool assignment. Does anyone object to publishing tarballs of > > these sanitized bridge pool assignments on the metrics website, so that we > > (and anyone else) can analyze them? > > Is there enough entropy in the things you're hashing to prevent > reversing the hash?
Well, I guess so. We're hashing the bridge identity fingerprints. From dir-spec.txt: "fingerprint" fingerprint NL [At most once] A fingerprint (a HASH_LEN-byte of asn1 encoded public key, encoded in hex, with a single space after every 4 characters) for this router's identity key. Does this mean we're safe here? Thanks, Karsten