[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #6419 [Tor Relay]: is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid?



#6419: is it really a protocolwarn when connection_or_client_learned_peer_id()
finds a different keyid?
-----------------------+----------------------------------------------------
 Reporter:  arma       |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  normal     |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Relay  |        Version:                    
 Keywords:             |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------
 moria1 running with protocolwarnings 1 gets a whole lot of
 {{{
 Jul 19 12:13:06.000 [warn] Tried connecting to router at 95.78.156.17:444,
 but identity key was not as expected: wanted
 995B562DA3CB2A5BC26A2AF6FB1B1D4FC26DA1C9 but got
 E0B348D09A5AF111AB7A4E1831AED23B1D40239F.
 }}}

 This happens because somebody runs a relay at that address, blows it away,
 and runs another one. moria1 does reachability testing of both.

 (A while ago we had code for moria1 to throw away a descriptor when it
 found that there was another descriptor on the same address and that
 descriptor's keyid was the one it sees. We threw out that code when ln5
 was refactoring though.)

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6419>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs