[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #31964 [Core Tor/Tor]: Dir auths could withhold HSIntro 4 in their votes if the relay would be a buggy v3 intro point
#31964: Dir auths could withhold HSIntro 4 in their votes if the relay would be a
buggy v3 intro point
-----------------------------------------+---------------------------------
Reporter: arma | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution: wontfix
Keywords: tor-dirauth, vote, protover | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------+---------------------------------
Comment (by dgoulet):
Replying to [comment:3 teor]:
> There is another alternative:
> 1. Make tor declare a new protocol version after the fix
> 2. Prefer or require that new protocol version
>
> Each bug will have a different severity, and we'll discover them all at
different times after the release. So we should pick one of these two
strategies on a case by case basis.
Problem with this approach is that it takes a _while_ before these relays
can be picked by clients since they all have to update to latest...
The approach of withholding the bad protover is that client just keeps
selecting relays without changes.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31964#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs