[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] bleeding relays rejected, what about bleeding bridge-relays?
-----BEGIN PGP SIGNED MESSAGE-----
Reading the dev list yesterday I saw that a scan was performed on all
the relays in the Tor network and the ones vulnerable to OpenSSL
heartbleed had their fingerprints listed with a !reject argument by
the directory authorities.
So far so good, but what about the bleeding bridges and obfs bridges?
Was that database scanned for bleeding bridges too? Since these act as
entry guards this is important.
It wasn't clear from what I've read yesterday if the scan was only
over the normal relays (not bridges which are not advertised in the
Tor network) or on everything, including the bridges. If we are
talking about second scenario, I apologize in advance for asking again
but just wanted to make sure and get a confirmation.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
-----END PGP SIGNATURE-----
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to