Right now we say that a microdesc starts with an onion-key field, and the onion-key contains a 1024-bit RSA key. This is true of any microdesc that we can currently use, but for caching purposes, we should probably be more tolerant so that we can have caches tolerate other key types in the distant happy future.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items
...
Show closed items
Linked items
0
Link issues together to show that they're related.
Learn more.
On consideration, giving this one back to 0.2.3.x-final. It's okay to make caches and clients more tolerant once they start fetching anything other than the basic microdesc flavor... and changing the content of the onion-key will want a new flavor anyway.
Trac: Milestone: Tor: 0.2.3.1-alpha to Tor: 0.2.3.x-final
prop245 needs some revision, but it explains one way to do this.
Trac: Sponsor: N/AtoN/A Reviewer: N/AtoN/A Summary: Make the microdesc format a little more flexible to Make the microdesc format a little more flexible, with optional TAP key Keywords: needs-proposal, tor-client deleted, tor-client prop245 tap-out format migration added Severity: N/Ato Normal