But I have no easy solution, Tor needs it somewhere in the file system. But you are right with your concerns about this file lying around unencrypted. It is NOT used for content encryption, this is a completely separate mechanism. If it is stolen then the thief can impersonate you and receive incoming connections under your address. It is used only for establishing the hidden service itself, to prove to the tor network that you really own this. onion address work, to authenticate the owner of the hidden service address. the only purpose of the private_key file is to make the. After connecting the tunnels at the rendezvous points it will do a Diffie Hellman key exchange with the other buddy with a random symmetrical key, so once the connection is established there will be 4 layers of encryption at each end (at your ISP connection) and still one layer at the rendezvous point and none of them is derived from private_key. When Tor builds a tunnel to the rendezvous point then it will first encrypt to the first node, then to the second and then to the third node. This private_key file can not be used to decrypt traffic. Original issue reported on by on at 3:28 Does it make any sense, is there a way around it and is that an issue at all? (the reason I thought it was, was that the Private Key is on a disk out in the open the whole time - given enough time, it's somewhat easy to spread it (inadvertently perhaps). onion number + key is created, then each time TorChat starts and then it would need either ask for a password each time it closes or keep in RAM and use the same password for decryption/encryption throughout the TorChat session. no passwords, registration, convincing logic etc.) and I'm afraid that such additional encryption scheme would require providing a password when TorChat starts the first time and the account. A possible problem is supplying the password: I love the simplicity of TorChat (i.e. Can the recorded conversations be read then? S: How hard/useful would it be if the Private Key file was encrypted at all times except when TorChat starts and needs to load the key for authentication? I was even thinking of writing a batch file that would: decrypt the Private Key -> start TorChat and load the Private Key to RAM -> encrypt it back immediately afterwards. Later on, C, by coercion, acquires the Private Keys of A and/or B. C, the adversary, records all conversations, but can't read them at the time because of the intrinsic end-to-end encryption. I just discovered TorChat, read about its logic, and, almost understand how it works, I'm convinced that it works as advertised! Awesome, simple and unique! I have a question and a suggestion of sorts: Q: A converses with B using TorChat. What is the expected output? What do you see instead? What version of the product are you using? On what operating system? 0.9.9.550 WinXP Please provide any additional information below. What steps will reproduce the problem? 1.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |