#21693: prop224: HS descriptors do wasteful double-base64 encoding -----------------------------+------------------------------------ Reporter: asn | Owner: asn Type: task | Status: assigned Priority: Medium | Milestone: Tor: 0.3.1.x-final Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: tor-hs, prop224 | Actual Points: Parent ID: | Points: 4 Reviewer: | Sponsor: SponsorR-can -----------------------------+------------------------------------
Comment (by nickm): It's even easier than that -- you can use tor_gzip_compress and tor_gzip_uncompress. No need to involve bufs. And what about doing it like this -- {{{ outer-layer = header + middle_layer middle-layer = b64(encrypt(compressed-part + nul-padding)) compressed-part = gzip(client_auth_data + b64(encrypt(gzip(inner_layer)))) }}} This keeps the length-hiding property of the nul padding, but allows more client_auth_data. Thoughts? -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21693#comment:9> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online _______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs