Sounds like a great way to do it. I do want to make validation against the network, specifically with the contact info however I don't think there is any validation in the network as to the values of the email and/or host.
Is there an easy way for me to get a node's public key from itself or the network? That way they can sign the fingerprint of the node + requested domain name using their private key and I can verify it with their public key. Eran On Sun, Oct 25, 2015 at 9:41 PM Tor Relays at brwyatt.net <[email protected]> wrote: > Link requested subdomains to the relay's fingerprint, and require all > change/update requests to be signed by the node's keys, and have some > validation that the node can be found on the network (and is an exit > node). This will ensure only Tor exit nodes can apply, and that nodes > can only change their own subdomain, and even makes it reletively > scriptable, if desired. > > On 2015-10-25 12:26, Geoff Down wrote: > > On Sun, Oct 25, 2015, at 05:49 AM, Eran Sandler wrote: > >> If so, I'll write a small something that will allow adding new > >> subdomains > >> to it. So that you can always add and update subdomains on it. > > As long as you don't let other people do that themselves. That would > > be > > open to abuse. > > GD > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >
_______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
