On Sat, Oct 26, 2013 at 12:57 AM, grarpamp <[email protected]> wrote: >> I believe torchat does this > > IIRC, torchat is just doing a bidirectional secret passing > pingpong between clients behind the HS addresses, no > actual x509 stuff. There's a good paper on it.
Link please. :) At least in one (early) version it needed to access the HS keys so it could sign with them and identify itself on outgoing connections. I didn't mean to imply it used x.509, but rather just that something else had used a HS identity key for some application level auth. -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
