Re: [tor-dev] HS v3 client authorization types

2018-07-12 Thread Suphanat Chunhapanya
> > Actually, we should have a simple format like "ed25519:" instead > so then in 5 years, if we end up with 10 different authorization method, we > can just pass "key:value" argument at will to the torrc option. > To be better, I prefer "ed25519:private:" >> >> Some more things to do: >> - Re

Re: [tor-dev] HS v3 client authorization types

2018-07-12 Thread David Goulet
On 12 Jul (20:24:54), George Kadianakis wrote: > David Goulet writes: > > > On 18 May (19:03:09), George Kadianakis wrote: > >> Ian Goldberg writes: > >> > >> > On Thu, May 10, 2018 at 12:20:05AM +0700, Suphanat Chunhapanya wrote: > >> >> On 05/09/2018 03:50 PM, George Kadianakis wrote: > >> >>

Re: [tor-dev] HS v3 client authorization types

2018-07-12 Thread George Kadianakis
David Goulet writes: > On 18 May (19:03:09), George Kadianakis wrote: >> Ian Goldberg writes: >> >> > On Thu, May 10, 2018 at 12:20:05AM +0700, Suphanat Chunhapanya wrote: >> >> On 05/09/2018 03:50 PM, George Kadianakis wrote: >> >> > b) We might also want to look into XEdDSA and see if we can

Re: [tor-dev] HS v3 client authorization types

2018-07-12 Thread David Goulet
On 18 May (19:03:09), George Kadianakis wrote: > Ian Goldberg writes: > > > On Thu, May 10, 2018 at 12:20:05AM +0700, Suphanat Chunhapanya wrote: > >> On 05/09/2018 03:50 PM, George Kadianakis wrote: > >> > b) We might also want to look into XEdDSA and see if we can potentially > >> >use the

Re: [tor-dev] HS v3 client authorization types

2018-05-18 Thread George Kadianakis
Ian Goldberg writes: > On Thu, May 10, 2018 at 12:20:05AM +0700, Suphanat Chunhapanya wrote: >> On 05/09/2018 03:50 PM, George Kadianakis wrote: >> > b) We might also want to look into XEdDSA and see if we can potentially >> >use the same keypair for both intro auth (ed25519) and desc auth >>

Re: [tor-dev] HS v3 client authorization types

2018-05-16 Thread Suphanat Chunhapanya
On 05/14/2018 05:26 PM, George Kadianakis wrote: > Suphanat Chunhapanya writes: > >> On 05/09/2018 03:50 PM, George Kadianakis wrote: >>> I thought about this some more and discussed it with haxxpop on IRC. In >>> the end, I think that perhaps starting with just desc auth and then in >>> the fu

Re: [tor-dev] HS v3 client authorization types

2018-05-14 Thread Ian Goldberg
On Thu, May 10, 2018 at 12:20:05AM +0700, Suphanat Chunhapanya wrote: > On 05/09/2018 03:50 PM, George Kadianakis wrote: > > b) We might also want to look into XEdDSA and see if we can potentially > >use the same keypair for both intro auth (ed25519) and desc auth > (x25519). > > This will be

Re: [tor-dev] HS v3 client authorization types

2018-05-14 Thread George Kadianakis
Suphanat Chunhapanya writes: > On 05/09/2018 03:50 PM, George Kadianakis wrote: >> I thought about this some more and discussed it with haxxpop on IRC. In >> the end, I think that perhaps starting with just desc auth and then in >> the future implementing intro auth is also an acceptable plan for

Re: [tor-dev] HS v3 client authorization types

2018-05-09 Thread Suphanat Chunhapanya
On 05/09/2018 03:50 PM, George Kadianakis wrote: > I thought about this some more and discussed it with haxxpop on IRC. In > the end, I think that perhaps starting with just desc auth and then in > the future implementing intro auth is also an acceptable plan forward. I think we have two more th

Re: [tor-dev] HS v3 client authorization types

2018-05-09 Thread George Kadianakis
George Kadianakis writes: > Suphanat Chunhapanya writes: > >> Hi, >> >> On 04/28/2018 06:19 AM, teor wrote: Or should we require the service to enable both for all clients? If you want to let the service be able to enable one while disable the other, do you have any opinion o

Re: [tor-dev] HS v3 client authorization types

2018-05-02 Thread teor
> On 3 May 2018, at 02:09, George Kadianakis wrote: > > I think my approach here would be to try to support both auth types by > the time we launch this feature (under the "standard" auth type), and > then in the future as we get more insight on how people use them, we > should start allowing to

Re: [tor-dev] HS v3 client authorization types

2018-05-02 Thread George Kadianakis
Suphanat Chunhapanya writes: > Hi, > > On 04/28/2018 06:19 AM, teor wrote: >>> Or should we require the service to enable both for all clients? >>> >>> If you want to let the service be able to enable one while disable the >>> other, do you have any opinion on how to configure the torrc? >> >> I

Re: [tor-dev] HS v3 client authorization types

2018-04-30 Thread Suphanat Chunhapanya
Hi, On 04/28/2018 03:59 AM, meejah wrote: > Then, if the service client has a problem later they have > to remember NOT copy-paste the whole config when asking for > help... sounds like lots to go wrong :) and I don't think this can be > solved by tinkering with the names/layout of torrc options,

Re: [tor-dev] HS v3 client authorization types

2018-04-30 Thread Suphanat Chunhapanya
Hi, On 04/28/2018 06:19 AM, teor wrote: >> Or should we require the service to enable both for all clients? >> >> If you want to let the service be able to enable one while disable the >> other, do you have any opinion on how to configure the torrc? > > If someone doesn't understand client auth i

Re: [tor-dev] HS v3 client authorization types

2018-04-27 Thread teor
Hi, > On 28 Apr 2018, at 06:59, meejah wrote: > > After reading the spec diff and your mail, I'm still not sure I > understand the distinction -- if the x25519 is used to decrypt the > descriptor then: > >> The spec says that the client must have both keys and use both to >> authenticate, but,

Re: [tor-dev] HS v3 client authorization types

2018-04-27 Thread meejah
Suphanat Chunhapanya writes: After reading the spec diff and your mail, I'm still not sure I understand the distinction -- if the x25519 is used to decrypt the descriptor then: > The spec says that the client must have both keys and use both to > authenticate, but, for me, these two things are q