We added curve25519 back in 0.2.4. It's proven pretty safe and reliable since then, and I think we'd agree that it's much more cryptographically secure than RSA-1024/DH-1024 TAP.
Is there any reason to keep the ability to disable curve25519 support?
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
That said, there were people who are scared of ECC and still want to use TAP. Does dropping the ability to disable curve25519 support imply dropping the ability to ask Tor to use TAP?
I guess we could add an option to make Tor clients not use ntor circuit-extension handshakes? I wouldn't expect it to get much more testing than --disable-curve25519, though.
Fundamentally, I don't think these people are asking for a reasonable thing. TAP-1024 (if I may coin a usage) is just not a cryptographicly good option IMO. OTOH, a "TAP-4096" would be really slow, and probably not a great usage of our time to implement.
So the answer is "right now, the only way to use tap rather than ntor is to compile your Tor yourself, using this funky configure option"?
And removing the --disable-curve25519 option would let us rip out the TAP client-side?
Sounds good to me.
If we were extra-conscientious, we would send a short note somewhere telling people that it's happening, so we can be more transparent about these decisions. But I'm not sure there is a good venue for such short notes anymore -- tor-talk used to be it but now it's too full.
And removing the --disable-curve25519 option would let us rip out the TAP client-side?
Well, we can only rip out TAP client-side once every server supports ntor. Right now, servers that were built with --disable-curve25519 don't provide ntor; and servers running 0.2.3 don't provide ntor.