On 9/15/12, Robert Ransom wrote: > On 9/15/12, grarpamp <grarp...@gmail.com> wrote: > > > u...p.onion > > > > -----BEGIN RSA PRIVATE KEY----- > > ... > > -----END RSA PRIVATE KEY----- > > > > openssl rsa -in private_key -pubout -outform DER | sha1 | cut -c 1-10 > > python -c "import base64, sys; print > > base64.b32encode(sys.stdin.readline().rstrip('\n')).lower()" > > gu4dsm3cmi3dkyzw > > > > What am I doing wrong besides being sleepy? > > You're using the first quarter of the base16 encoding of the SHA-1 > hash, instead of the first half of the SHA-1 hash itself.
Also, don't use a service whose private key you've exposed over email. I'd make a new hidden service for that. _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk