-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is keeping the same onion url on the wish list? #9
Comments
I released support for persistent onion addresses in v0.2.0 -- see releases. You use an In order for addresses to be persistent, oniongrok has to keep track of the services' private keys. For now, they're stored in a mode I have a really strong aversion to any sort of private keys on my filesystem. I'd like to find a way to have onion keys stored in a hardware device. There are many that can do ed25519 now. A YubiKey could do it. Or maybe a Trezor? What if an eth address was also an onion? 🤯 This is an area of research, which might get me into Tor's internals. Should be fun! oniongrok only uses v3 onion services. v2 are insecure and Tor doesn't even support them anymore, they're past sunset. I'm going to mark this closed as I think it addresses your question & concern. |
Even a simple recommendation to store it in a “ram disk” is some degree reasonable. However if the box is owned and you’re storing this key on the machine anywhere memory or otherwise you’re somewhat likely to assume that everything is done and dusted anyways. |
Also is an onion version 2 coming? Version one isn’t really safe anymore.
The text was updated successfully, but these errors were encountered: