Browse Source

List another place router identity keys are used.

Robert Ransom 13 years ago
parent
commit
9776ba7fa4
1 changed files with 2 additions and 0 deletions
  1. 2 0
      doc/spec/proposals/ideas/xxx-crypto-migration.txt

+ 2 - 0
doc/spec/proposals/ideas/xxx-crypto-migration.txt

@@ -283,6 +283,8 @@ Created: 12 December 2010
   algorithm.  The identity key itself is used:
     - To sign the router descriptors
     - To sign link-key certificates
+    - To determine the least significant bits of circuit IDs used on a
+      Tor instance's links (see tor-spec §5.1)
 
   The fingerprint is used:
     - To identify a router identity key in EXTEND cells