Delivery-Date: Fri, 25 Sep 2015 03:38:24 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BD0E91E14DD;
	Fri, 25 Sep 2015 03:38:22 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 15FFD37297;
	Fri, 25 Sep 2015 07:38:16 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id CCC313726E
 for <tor-talk@lists.torproject.org>; Fri, 25 Sep 2015 07:38:11 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id yS4mCyDhZgcj for <tor-talk@lists.torproject.org>;
 Fri, 25 Sep 2015 07:38:11 +0000 (UTC)
Received: from mail-yk0-x22d.google.com (mail-yk0-x22d.google.com
 [IPv6:2607:f8b0:4002:c07::22d])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 9BD193725F
 for <tor-talk@lists.torproject.org>; Fri, 25 Sep 2015 07:38:11 +0000 (UTC)
Received: by ykdt18 with SMTP id t18so107763487ykd.3
 for <tor-talk@lists.torproject.org>; Fri, 25 Sep 2015 00:38:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=XYLkoJZ4BypPfl0GiU54/eIHrNmgI2RJZlhToKtbUyc=;
 b=Ju1N1gsDZBHYv+JQTbP0tyNa02n8wKrtG0+/vqwN2snGmoQ47IMUOYAsRgJGtB7Twj
 TPfH5wYYYhvvelziZSwqhWhicnRRSal/JNSy0BXcRB/WA97VwXvxAEFTCnDcKZ2JApm9
 GxPGi/BBXNGwk5aP3q5UtEktaYQ9al64d+zVT3nxpkhnc+MKpe3Yg4bLMaJcDKruytmV
 Y0YQAwlHqEMlA5JL/Kav2eGKJyhS72SidbvAXXwWIeF9IqTOtWyzlUbrrsUtaSzPvQXT
 zMQ4ABKDBPlUh3kP1knfW9jPkQXbBJuYKiL1l+M7D5cWagCbddvbG03Juyul0aoZF0I6
 0iiQ==
MIME-Version: 1.0
X-Received: by 10.170.126.68 with SMTP id s65mr3456449ykb.50.1443166688320;
 Fri, 25 Sep 2015 00:38:08 -0700 (PDT)
Received: by 10.13.246.70 with HTTP; Fri, 25 Sep 2015 00:38:08 -0700 (PDT)
In-Reply-To: <D206A389-B35A-4711-900E-E8C3E4A801F7@frii.com>
References: <CA+QqAMM2WtEAHY_-+wOLba6=yithdTrB9+kRCJZVcJ5j9V9Fsg@mail.gmail.com>
 <D206A389-B35A-4711-900E-E8C3E4A801F7@frii.com>
Date: Fri, 25 Sep 2015 08:38:08 +0100
Message-ID: <CA+QqAMOAqgesy2nQq+c-RozpyPNuYTXDGJhqRQAf3t0UP2OYng@mail.gmail.com>
From: Darren Allen <darreneallen@gmail.com>
To: tor-talk@lists.torproject.org
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Server / Browser html PGP Encryption
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Apologies, it was a thought based solely on usage of the Tor browser and
Onion websites, I should have read the documentation before suggesting.

Regards,

Darren

On Fri, Sep 25, 2015 at 5:18 AM, Ken Cline <cline@frii.com> wrote:

> What are you trying to accomplish?
>
> First note that hidden servers already use RSA, the public key algorithm
> at the heart of OpenPGP.  The jumble of characters in the hidden service
> name is actually the fingerprint (or equivalent) of the service's public
> key.  The service sends you its full public key and your Tor client
> verifies its fingerprint, allowing you to authenticate the server's
> identity and send it messages that imposters are unable to intercept.  The
> extra features of OpenPGP (the protocol behind PGP, GPG, etc) don't add
> value here, at least not that I can see.
>
> All of this is on top of the strong encryption of the Tor circuit which
> connects you to the server.
>
> Going in the other direction, why do you want to provide an OpenPGP key to
> the server?  If it is for authentication,
>
> Conversely, providing an OpenPGP across multiple session serves to
> identify you to the server(s) involved.  If this is what you want and you
> are using TLS (e.g. https), then a client certificate might be the right
> approach since it is already built into TLS.  I say might, because I
> haven't used client certs myself and don't know whether TorBrowser can be
> easily configured to use them.
>
>
> > On 24 Sep 2015, at 2:58 PM, Darren Allen <darreneallen@gmail.com> wrote:
> >
> > Once a user has joined an Onion web server, they download the servers PGP
> > Public Key, and upload their own PGP Public Key.
> > All HTML commication, .jpg images, etc are then encoded by the server
> using
> > the user's Public Key.
> >
> > The user has their private key attached the to Tor Browser, (The browser
> > could generate a random PGP key set for each Onion site), which then
> > decrypts the incoming communication back into HTML etc to be displayed in
> > the browser.
> >
> > All new page requests, sent by the user, are likewise encrypted using the
> > Onion sites Public Key, and decrypted by the server.
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

