Skip to content

Commit 94531b5

Browse files
committed
torcontrol: Explicitly request RSA1024 private key
When generating a new service key, explicitly request a RSA1024 one. The bitcoin P2P protocol has no support for the longer hidden service names that will come with ed25519 keys, until it does, we depend on the old hidden service type so make this explicit. See #9214. Rebased-From: 7d3b627395582ae7c9d54ebdbc68096d7042162b Github-Pull: #9234
1 parent 9460771 commit 94531b5

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/torcontrol.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -469,7 +469,7 @@ void TorController::auth_cb(TorControlConnection& conn, const TorControlReply& r
469469

470470
// Finally - now create the service
471471
if (private_key.empty()) // No private key, generate one
472-
private_key = "NEW:BEST";
472+
private_key = "NEW:RSA1024"; // Explicitly request RSA1024 - see issue #9214
473473
// Request hidden service, redirect port.
474474
// Note that the 'virtual' port doesn't have to be the same as our internal port, but this is just a convenient
475475
// choice. TODO; refactor the shutdown sequence some day.

0 commit comments

Comments
 (0)