[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26627 [Core Tor/Tor]: HSv3 throws many "Tried connecting to router at [IP:port], but RSA identity key was not as expected"
#26627: HSv3 throws many "Tried connecting to router at [IP:port], but RSA identity
key was not as expected"
-------------------------------------------------+-------------------------
Reporter: asn | Owner: teor
Type: defect | Status:
| assigned
Priority: Medium | Milestone: Tor:
| 0.3.5.x-final
Component: Core Tor/Tor | Version: Tor:
| 0.3.2.4-alpha
Severity: Normal | Resolution:
Keywords: tor-relay certs handshake ed25519 | Actual Points:
035-roadmap-proposed |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Changes (by teor):
* keywords: security tor-relay certs handshake ed25519 035-roadmap-
proposed => tor-relay certs handshake ed25519 035-roadmap-proposed
* owner: (none) => teor
* version: => Tor: 0.3.2.4-alpha
* status: new => assigned
Comment:
Please see my branches bug26627_032 and bug26627 on
https://github.com/teor2345/tor.git
The Windows CI is failing on master due to #26662.
Here's what I fixed:
* backport #20895 and #23577 from 0.3.3 to 0.3.2
* without the backport, clients can't check if the node supports ed25519
link auth
* these backports also make v3 client intro behaviour consistent between
0.3.3+ and 0.3.2
* only send ed25519 link specifiers in client intros if the rend point
supports ed25519 link auth
Here's what I still need to fix:
* check that we only send ed25519 link specifiers in service descriptors
if the intro point supports ed25519 link auth
* make v3 single onion service to rend link authentication into a protocol
warning
* (we don't need to make v3 Tor2web client to intro link authentication
into a protocol warning, because there is no v3 Tor2web)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26627#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs