When configuring a stealth onion service, there's an option for authorized clients. I presume this should be the X25519 Public Key, but it doesn't seem to work this way. After adding a new key here, clicking save, and then clicking the reload service button I can still access the onion service.
I thought I might have to add the hostname and key to the Onion Service Authentication tab, but the "new" v3 onion hostname and public key fail to validate when saving this form.
Instead I have found that I can add the key containing descriptor:x25519:KEYDATA in the file /var/db/tor/ONIONNAME/authorized_clients/username.auth and reload the service. This works as I expect, visiting the onion service in Tor Browser (for example) requires me to provide my private key.
Is this a known limitation of the Tor plugin? I'm using os-tor version 1.10 on 24.7.11_2.
Thanks in advance for your help. :)
I thought I might have to add the hostname and key to the Onion Service Authentication tab, but the "new" v3 onion hostname and public key fail to validate when saving this form.
Instead I have found that I can add the key containing descriptor:x25519:KEYDATA in the file /var/db/tor/ONIONNAME/authorized_clients/username.auth and reload the service. This works as I expect, visiting the onion service in Tor Browser (for example) requires me to provide my private key.
Is this a known limitation of the Tor plugin? I'm using os-tor version 1.10 on 24.7.11_2.
Thanks in advance for your help. :)