On Sat, Oct 26, 2013 at 12:57 AM, grarpamp <[email protected]> wrote:
>> I believe torchat does this
>
> IIRC, torchat is just doing a bidirectional secret passing
> pingpong between clients behind the HS addresses, no
> actual x509 stuff. There's a good paper on it.

Link please. :)

At least in one (early) version it needed to access the HS keys so it
could sign with them and identify itself on outgoing connections. I
didn't mean to imply it used x.509, but rather just that something
else had used a HS identity key for some application level auth.
-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to