(cc'd to freenet-tech)

"Scott G. Miller" wrote:

> The fingerprint would be attached to the address, and there would be a
> field in HandshakeRequest that would request the public key if Alice
> didn't have Bobs key.  Bob would return the HandshakeReply including the
> public-key field.  Alice verifies the fingerprint, and they go about their
> merry way.

If you're going that far, how about using fingerprints (minus the
transport-specific address) as the primary addresses for datastore
references and routing?  

If Alice doesn't know Bob's IP address she queries some other node and
verifies that the response (which would include Bob's complete public
key and current IP address) has been signed by Bob.

This would allow a node to switch IP address, port number or transport
without breaking datastore references.

It might also help with onion routing.

-- 
zem at zip.com.au   F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93
zem.squidly.org  "..I'm invisible, I'm invisible, I'm invisible.."

_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to