So it turns out that this menagerie of keys in prop224 was missing yet one more key in it :D.
To extend to an introduction point, we need its onion key meaning we have to add it to the descriptor. Keep in mind that the client does NOT lookup the node in its consensus in order not to reveal which consensus it's using and avoid reachability issues with different consensus between service and client.
This goes in two fold. First add an onion key field in the spec and then implement it in an extra commit in legacy/trac#20657 (moved) code (which is being reviewed). I would like us to avoid making a branch depending on 8k lines of code from another unmerged ticket.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
It's not that big so let me know if an Oniongit would be needed.
LGTM, but two quick questions:
a) I assume that ip->onion_key will be initialized by the service code that is not yet included in the branch. So it's OK that it's not really filled with anything on the service-side, right?
b) Do we really want to goto err if we don't recognize the key type when decoding descriptor? Doesn't that influence our forward-compatibility that the key type field was supposed to be helping?
It's not that big so let me know if an Oniongit would be needed.
LGTM, but two quick questions:
a) I assume that ip->onion_key will be initialized by the service code that is not yet included in the branch. So it's OK that it's not really filled with anything on the service-side, right?
Yes exactly. This is really just the "descriptor subsystem" support for decoding and encoding.
b) Do we really want to goto err if we don't recognize the key type when decoding descriptor? Doesn't that influence our forward-compatibility that the key type field was supposed to be helping?
Hmmm yes I think you are right. Then we have the same issue with enc-key... :S
Basically, if we don't have "ntor" following it, we should just ignore it and move on. See fixup commit 76533e10a.
I don't think that's what I meant: I meant that an intro point should be able to have an ntor onion key, and also (say) have some other kind of onion key for some day in the future, too, in case we add a successor to ntor.
So I think the code in decode_introduction_point needs to handle looking for the first onion-key ntor line. Otherwise it will ignore it if the ntor one isn't in the first position.
Also the spec should say something like "At least once per intro point; each key type must be unique per intro point"