torcontrol: Explicitly request RSA1024 private key

When generating a new service key, explicitly request a RSA1024 one.

The bitcoin P2P protocol has no support for the longer hidden service names
that will come with ed25519 keys, until it does, we depend on the old
hidden service type so make this explicit.

See #9214.
This commit is contained in:
Wladimir J. van der Laan 2016-11-28 17:13:51 +01:00 committed by Jack Grigg
parent 5aa2365edd
commit 9e5c9d0a04
No known key found for this signature in database
GPG Key ID: 6A6914DAFBEA00DA
1 changed files with 1 additions and 1 deletions

View File

@ -465,7 +465,7 @@ void TorController::auth_cb(TorControlConnection& conn, const TorControlReply& r
// Finally - now create the service
if (private_key.empty()) // No private key, generate one
private_key = "NEW:BEST";
private_key = "NEW:RSA1024"; // Explicitly request RSA1024 - see issue #9214
// Request hidden service, redirect port.
// Note that the 'virtual' port doesn't have to be the same as our internal port, but this is just a convenient
// choice. TODO; refactor the shutdown sequence some day.