[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #26932 [Core Tor/Tor]: Soft assert in HS3 with vanguards ([warn] Invalid signature for service descriptor signing key: expired) (was: Soft assert with [warn] Invalid signature for service descriptor signing key: expired)



#26932: Soft assert in HS3 with vanguards ([warn] Invalid signature for service
descriptor signing key: expired)
-------------------------------------------------+-------------------------
 Reporter:  asn                                  |          Owner:  (none)
     Type:  defect                               |         Status:  new
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.3.5.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tor-hs possible-regression bug easy  |  Actual Points:
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------
Changes (by asn):

 * cc: mikeperry (added)
 * keywords:  tor-hs possible-regression bug => tor-hs possible-regression
     bug easy
 * priority:  High => Medium


Comment:

 I further debugged this. It seems to be related to my use of the vanguards
 script, and not related to #25552 fortunately.

 Basically, it seems like `service->state.next_rotation_time` was getting
 reset very often, because the vanguards script was HUPing Tor and hence
 keep calling `move_hs_state()` which does not update `next_rotation_time`.

 I think the fix here is to patch `move_hs_state()` to update
 `next_rotation_time`.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26932#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs