[messaging] Generating memorable hidden service names

George Kadianakis desnacked at riseup.net
Fri Oct 31 07:01:20 PDT 2014

David Leon Gil <coruus at gmail.com> writes:

> See https://lists.torproject.org/pipermail/tor-talk/2014-October/035412.html

Fun times!

I bet most of you know this but brute-forced vanity addresses are not
the best way to generate human memorable names:

Quick test, which one is the correct address for facebook?
a) facebookcorewwwl.onion
b) facebookcorewwwi.onion
c) facebookcorewwwe.onion

Also note that when the upcoming HS changes [0] get implemented, the
length of onion addresses will increase to 52 characters. Say hello
to: facebookcorewwwi0ta0tsw6uovyhwlezkcrmczeuzdvfauuemle.onion

That said, I also don't know what's the best way to generate human
memorable HS names.

As part of upcoming funded work, Tor might implement an opt-in
indexing service for HSes: a server where HSes can send their
descriptors if they want to be public. That's for HSes that have the
facebook/twitter threat model; not the "activist XMPP server" or the
"personal SSH server" threat model.

Such an indexing server might allow FIFO petname systems (ugh
typosquatting!) or a GNS integration (ugh complicated system!) to
happen [1]. Who knows, maybe that's better solution than plain vanity

[0]: https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt

[2]: https://lists.torproject.org/pipermail/tor-dev/2014-October/007655.html

More information about the Messaging mailing list