"That said multiple layers of crypto cannot hurt, Facebook for example
uses this approach."

The first part is not strictly true. For the second part, FB uses an
identity-verified EV cert from a known CA to let their users confirm
their identity, not for increased encryption. Creating an onion
service is essentially creating a self-signed cert, so no, I'd say not
worth the effort to do it again at the HTTP level.

Chad

On Fri, Dec 28, 2018 at 11:17 AM Nathaniel Suchy <m...@lunorian.is> wrote:
>
> Hi everyone,
>
> So I have an idea which may or may not be a possibility. Currently Tor Onion 
> Services do not need HTTPS since they are already end to end encrypted. That 
> said multiple layers of crypto cannot hurt, Facebook for example uses this 
> approach. So I have the idea of some sort of mechanism that lets you sign a 
> self-signed tls certificate with your Onion Service's hs_ed25519_secret_key 
> and Tor Browser trusting the tls certificate based on this signature. Would 
> this approach work? Would it be worth the effort? Look forward to hearing 
> your thoughts :)
>
> Cordially,
> Nathaniel Suchy
> _______________________________________________
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to