[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #16227 [Tor]: Invalid extrainfo descriptor from Tor 0.2.7.1-alpha-dev
#16227: Invalid extrainfo descriptor from Tor 0.2.7.1-alpha-dev
--------------------+---------------------
Reporter: atagar | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version:
Keywords: | Actual Points:
Parent ID: | Points:
--------------------+---------------------
Hi, DocTor checks just notified me of an invalid extrainfo descriptor from
a tor relay running Tor 0.2.7.1-alpha-dev...
{{{
router Truie 198.50.156.78 9001 0 9030
identity-ed25519
-----BEGIN ED25519 CERT-----
AQQABhWIAZTz0r0KRagr6X9SHfm4oiIuMLVhJQQmNchtkBuR5SuFAQAgBAAVkw7m
0YJgO/A8VMioco097sIOutDiM7UqqPvoIyKErk1akOm3f6VAO/juOzxEeAgzgfA7
DiRsSjeVjp0xUdE43bXhK/8Uh+SPMwYKj47drjgTHGgzjTmlY9B/jFJ1Wgs=
-----END ED25519 CERT-----
platform Tor 0.2.7.1-alpha-dev on Linux
protocols Link 1 2 Circuit 1
published 2015-05-28 15:44:47
fingerprint A692 21A7 EC74 98D2 F88A 0FB7 9526 1013 FA36 CAAE
uptime 61
bandwidth 1073741824 1073741824 9506816
extra-info-digest 0879DB7B765218D7B3AE7557669D20307BB21CAA
V609l+N6ActBveebfNbH5lQ6wHDNstDkFgyqEhBHwtA
onion-key
-----BEGIN RSA PUBLIC KEY-----
MIGJAoGBALbTpnPvhaGET+2ACtLdG6jhQXN8uVJ0iF9RwMh2hwu351yp3eVPt7os
ditUF6w7KV+6emkvLu9EBpNN7vWrpDAhRNOGTOZhZKLnGFaxp+eGNX6+5AhmiWYt
/+w+f6dvVKEjsaX3XZsMqcTBjw2hzVpHxh/AjgDx/b9mJKC85vENAgMBAAE=
-----END RSA PUBLIC KEY-----
signing-key
-----BEGIN RSA PUBLIC KEY-----
MIGJAoGBALDSt2G+Zjl20a59HZsuag913ONdnnNa/uVMRbsZZkbnNRONf2aXBGgu
wrW7XtPLeAKl+d0d5g9XnePVvefcEdKvoKNCFv6s8s3S2KB/CEkeyE7Lxx1Pc6Qx
f/jgS3T3TFHUlvtZvHLZ/3WaXMyuTTRlGadpzDkQx5oWR6aNn065AgMBAAE=
-----END RSA PUBLIC KEY-----
onion-key-crosscert
-----BEGIN CROSSCERT-----
TCcCIv38fGcSzUO+DKxudFme2XBRuDkf5FjEr+6UbtDyuDjvjJDFYagN+zMJf/4K
RyBScjyKYK6MVMxAmf25QjAGx3KHV00ozVSzlN3WDAS2iicuKYvBsehG9g/tr6mI
luS5EoSKJIlmM2jOhN1QyR+Rpi37z/E6VTksk/bd69A=
-----END CROSSCERT-----
ntor-onion-key-crosscert 0
-----BEGIN ED25519 CERT-----
AQoABhNgARWTDubRgmA78DxUyKhyjT3uwg660OIztSqo++gjIoSuAEW8gwMcFUSD
mfkijKN6KyZxHloENGcgJMeJsR9kvfYp/u7O+VoPQ1kTxaw1lajTrnGQF+PV1MlK
niid4Nq5ZgM=
-----END ED25519 CERT-----
hidden-service-dir
contact 0x11F48D36 David Goulet <dgoulet AT ev0ke dot net>
ntor-onion-key qDcuoDpDD36bIapIbXBVhkIoiuMIXD9jNfjF1+7Vaks=
reject *:*
router-sig-ed25519
AxqrLz7QL/e+xGhhihs/rNzWsBW0Qla7Cwru1q88A5i+pcQBgfzfECiecptqYbDAsUPXMtwFsLp7Ls2BMOzvCQ
router-signature
-----BEGIN SIGNATURE-----
mSkveaqx79vzXLc6yC2+x8yZMQPe74ihw9tZJDdSOK5VqhzZOKHFM+JoD12noxQd
wgxa+IX0RG65KlguYE7NEZ7M6JOwr6r0zK/pWSZE8ZeHyt7FDx9ygc3k2ybQ6RWE
Hd7QXPiyVgs9cIgnvGFVt/5vzjMV+BELpOtehBrUJbs=
-----END SIGNATURE-----
}}}
I'm not sure if Truie is just doing something funky. identity-ed25519?
router-sig-ed25519? None of these are things in the dir-spec, and its
extra-info-digest line is invalid too.
Regardless of how this is being generated, seems like the DirAuths should
be balking at such invalid content. Stem certainly doesn't like it when
validation is enabled.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16227>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs