> On 20 May 2016, at 11:59, Yawning Angel <[email protected]> wrote:
> 
> What's strange about it.  The client does the path selection.  To build
> a circuit, the client must know the public keys/ip/port for the entire
> path and the exit policy.

Clients could get away with only knowing the key fingerprints for relays in 
their paths, except for their Guards, which are the only relays they connect to 
directly. (This might mean a protocol redesign, because I think we send IP and 
port as well as fingerprint at the moment.)

There are probably other fields we could drop in the common case, if we really 
needed to.

But do we really need to?

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n



Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
tor-dev mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to