[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

seven bloxortsipt* relays ought *not* to be Valid



     In the directory, I found seven relays whose names all begin with
"bloxortsipt":

	bloxortsipt3
	bloxortsipt11
	bloxortsipt30
	bloxortsipt38
	bloxortsipt58
	bloxortsipt71
	bloxortsipt81

These relays

	a) are running an obsolete version of tor (0.1.2.19) under LINUX,
	   which is far enough back to be a security problem due to the SSL
	   key generation bug in LINUX, 

	b) publish identical ContactInfo "1024D/E5712ECF IPT Support
	   <support@xxxxxxxxxxx>", and

	c) are *NOT* listed as a family, so your client might well build a
	   circuit using two or more of these unsecured relays.  Note that
	   the rule of only one relay in a circuit per /16 will not prevent
	   such a thing from happening in this case because of the offending
	   relays' diversity of IP addresses.

That much, IMO, ought to justify removal of their Valid flags by the
authorities.  In the meantime, I have them all in my ExcludeNodes list, and
I recommend that all relay operators concerned about security in tor do
likewise.


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************