(cc'd to freenet-tech) "Scott G. Miller" wrote:
> The fingerprint would be attached to the address, and there would be a > field in HandshakeRequest that would request the public key if Alice > didn't have Bobs key. Bob would return the HandshakeReply including the > public-key field. Alice verifies the fingerprint, and they go about their > merry way. If you're going that far, how about using fingerprints (minus the transport-specific address) as the primary addresses for datastore references and routing? If Alice doesn't know Bob's IP address she queries some other node and verifies that the response (which would include Bob's complete public key and current IP address) has been signed by Bob. This would allow a node to switch IP address, port number or transport without breaking datastore references. It might also help with onion routing. -- zem at zip.com.au F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 zem.squidly.org "..I'm invisible, I'm invisible, I'm invisible.." _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
