[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] bleeding relays rejected, what about bleeding bridge-relays?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi,

Reading the dev list yesterday I saw that a scan was performed on all
the relays in the Tor network and the ones vulnerable to OpenSSL
heartbleed had their fingerprints listed with a !reject argument by
the directory authorities.

So far so good, but what about the bleeding bridges and obfs bridges?
Was that database scanned for bleeding bridges too? Since these act as
entry guards this is important.

It wasn't clear from what I've read yesterday if the scan was only
over the normal relays (not bridges which are not advertised in the
Tor network) or on everything, including the bridges. If we are
talking about second scenario, I apologize in advance for asking again
but just wanted to make sure and get a confirmation.

s7r
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBCAAGBQJTUm5jAAoJEIN/pSyBJlsRYgAH/iGsiZG3HaLwlM8JaMqSpude
Oktk5MlMUR0o8SbfMORg0g00fWWDP18uh3ujxSqzr1kz5a7GFvf58lOSduEnVWqT
oMPzyBYvyxFpFzFnKGGTYZfT4c+RneWPD9ZWardyULL4vnFjHS9SW4LWeNHGT286
90laPDl2wpkXtbPHR3nAGc3qyUIt5NIhFu6D2Alv2TTzlguapW0WZmpFr/jI63Xu
R6dND1l59NLv/t0H57nBi8hhrcsc6/iFLvIUb+WV4MC6v0xTpig8AYMgDwzCtklg
BlEDn3Yy+3dd6P1Ry5VeUSdZUoO+Bg3lCbpcCxbUuNG4Kp3u3kOOrNa7CrZ0f1A=
=tjKk
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk