Re: [tor-dev] getting reliable time-period without a clock

2016-06-20 Thread Tom Ritter
Well, the consensus is the ultimate root of trust for the Tor network. Sample: http://171.25.193.9:443/tor/status-vote/current/consensus It's a very large ASCII document, and you'd need to hardcode one or more DirAuth keys. But it has a timestamp in it. You could provide older consensuses to the s

Re: [tor-dev] getting reliable time-period without a clock

2016-06-20 Thread Razvan Dragomirescu
Thank you Ivan, I don't want to trust the host, that's why I'm looking for something that the _network_ agrees upon, not something the host can provide or generate itself. If the host fetches the Facebook hidden service descriptor and provides it to the card, the card can check the signature on it

Re: [tor-dev] getting reliable time-period without a clock

2016-06-20 Thread Ivan Markin
Hello Razan, Razvan Dragomirescu: > I am working on a smartcard-based hidden service publishing solution and > since I'm tying the hidden service descriptor to the physical smartcard, I > want to make sure that the host is not asking the smartcard to generate > hidden service descriptors in advanc

[tor-dev] getting reliable time-period without a clock

2016-06-20 Thread Razvan Dragomirescu
Hello everyone, I am working on a smartcard-based hidden service publishing solution and since I'm tying the hidden service descriptor to the physical smartcard, I want to make sure that the host is not asking the smartcard to generate hidden service descriptors in advance, to be used when the car