[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #988 [Tor Relay]: Different TLS certs for incoming vs outgoing



#988: Different TLS certs for incoming vs outgoing
--------------------------+-------------------------------------------------
 Reporter:  arma          |         Type:  enhancement
   Status:  needs_review  |     Priority:  minor      
Milestone:  post 0.2.1.x  |    Component:  Tor Relay  
  Version:  0.2.0.34      |   Resolution:  None       
 Keywords:                |       Parent:             
--------------------------+-------------------------------------------------

Comment(by rransom):

 Replying to [comment:10 nickm]:
 > This looks pretty good, modulo a couple of places I'd like to add more
 documentation.  How have you tested this?  What more tests are needed?

 I've been using it as my regular Tor client. I toggled !BridgeRelay on
 without stopping Tor, then off, then on again several days later, and had
 no unexpected issues. I have since restarted Tor with !BridgeRelay on, and
 it has been running (and receiving and handling bridge users' connections
 properly) without trouble since then.

 I have not yet tested:

  1. running this Tor in public server mode
  2. toggling to and from public server mode without stopping Tor
  3. whether the certs Tor sends on incoming and outgoing connections do,
 in fact, have different public keys in bridge mode

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/988#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs