prop224 1.9 KB

123456789101112131415161718192021222324252627282930313233343536
  1. o Major features (next-generation onion services):
  2. - Tor now supports the next-generation onion services protocol for clients
  3. and services! As part of this release, the core of proposal 224 has been
  4. implemented and is available for experimentation and testing by our
  5. users. This newer version of onion services (v3) features various
  6. improvements over the legacy system:
  7. a) Better crypto (replaced SHA1/DH/RSA1024 with SHA3/ed25519/curve25519)
  8. b) Improved directory protocol leaking less to directory servers.
  9. c) Improved directory protocol with smaller surface for targeted attacks.
  10. d) Better onion address security against impersonation.
  11. e) More extensible introduction/rendezvous protocol.
  12. f) A cleaner and more modular codebase.
  13. Furthermore, as part of this update, onion addresses increase in length
  14. and are now 56 characters long:
  15. 4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion
  16. In the future, we will be releasing more options and features but we
  17. first need a testing period, so that the current codebase matures and
  18. becomes more robust. Here are some of the features we have planned:
  19. 1) Offline keys for onion services
  20. 2) Advanced client authorization for onion services
  21. 3) Improved guard algorithm for onion services
  22. 4) Next-gen onion service statistics
  23. Please see our proposal for more details:
  24. https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
  25. The default version for onion services remains v2 (the legacy system)
  26. until this new codebase gets tested and hardened.
  27. Service operators who want to experiment with the new system can use the
  28. 'HiddenServiceVersion 3' torrc directive along with the regular onion
  29. service configuration options.
  30. We will publish a blog post about this new feature soon! Enjoy!