[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #988 [Tor Relay]: Different TLS certs for incoming vs outgoing
#988: Different TLS certs for incoming vs outgoing
--------------------------+-------------------------------------------------
Reporter: arma | Type: enhancement
Status: needs_review | Priority: minor
Milestone: post 0.2.1.x | Component: Tor Relay
Version: 0.2.0.34 | Resolution: None
Keywords: | Parent:
--------------------------+-------------------------------------------------
Comment(by rransom):
Replying to [comment:10 nickm]:
> This looks pretty good, modulo a couple of places I'd like to add more
documentation. How have you tested this? What more tests are needed?
I've been using it as my regular Tor client. I toggled !BridgeRelay on
without stopping Tor, then off, then on again several days later, and had
no unexpected issues. I have since restarted Tor with !BridgeRelay on, and
it has been running (and receiving and handling bridge users' connections
properly) without trouble since then.
I have not yet tested:
1. running this Tor in public server mode
2. toggling to and from public server mode without stopping Tor
3. whether the certs Tor sends on incoming and outgoing connections do,
in fact, have different public keys in bridge mode
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/988#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs