Closed laanwj closed 8 years ago
Thanks, I updated the code to check the validity of the key too.
Your solution is awesome. I had thought about finding associated hostname
files but this is much better.
With this level of specificity it could, at some point, make sense to scan other files for keys as well. In an extremely rare case someone may have left the key around in some other text file, or even posted one in a site or forum post. Not sure people are actually that careless.
Checks retrieved files whose names end in
/private_key
and check whether they are hidden service private keys (well, base64 encoded RSA keys).Example:
Implements #52.