[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #11448 [Tor]: Dirauths must support multiple relay identity keys at once
#11448: Dirauths must support multiple relay identity keys at once
----------------------+------------------------------------
Reporter: rransom | Owner:
Type: defect | Status: new
Priority: critical | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version:
Keywords: tor-auth | Actual Points:
Parent ID: | Points:
----------------------+------------------------------------
As discussed on [https://blog.torproject.org/blog/openssl-bug-
cve-2014-0160], directory authorities must rotate their relay identity
keys in order to recover from possible exposure due to the âHeartbleedâ
bug. (A dirauth's relay identity key could be used by a MITM attacker to
feed clients an outdated consensus, for example.)
There are two requirements in order to do this without causing a network
meltdown:
* A dirauth must be able to sign relay descriptors using multiple relay
identity keys at once.
* A dirauth must be able to operate multiple ORPorts at once, with
(possibly) different relay identity keys.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11448>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs