Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2017-01-22 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  implemented
  deferred-20160905, review-group-15 |  Actual Points:
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by teor):

 Just a reminder for when we deploy this code:

 Has anyone checked that each directory authority's current key pairs are
 pinned consistently by every other directory authority?

 When we ran into this issue in the test network, I had to delete the RSA
 and ed keys for the broken authority, and regenerate them (and then we had
 to update all the torrc authority lines). If this happened in the public
 network, we would have to update the tor source code.

 When the first authority deploys this code, we'll find some
 inconsistencies, but it will take a majority of authorities (ideally with
 consistent pairings) to affect the consensus.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2017-01-21 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  implemented
  deferred-20160905, review-group-15 |  Actual Points:
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => implemented


Comment:

 merged

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2017-01-16 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  defect   | Status:
 |  merge_ready
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905, review-group-15 |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-
Changes (by dgoulet):

 * status:  needs_review => merge_ready


Comment:

 With teor's comment about the testnet, this patch is straight forward.
 Let's get it merged and we'll deploy it asap in the testnet.

 lgtm;

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-12-13 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  defect   | Status:
 |  accepted
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-
Changes (by nickm):

 * owner:  andrea => nickm
 * status:  assigned => accepted


Comment:

 ticket18319 is the clear-cut change here.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-12-13 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  defect   | Status:
 |  needs_review
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-
Changes (by nickm):

 * status:  accepted => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-11-01 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by teor):

 This seems to be working fine (and consistently) on the test network:
 {{{
 Nov 02 01:58:09.000 [warn] http status 400 ("Looks like your keypair does
 not match its older value.") response from dirserver 'REDACTED1'. Please
 correct.
 Nov 02 01:58:09.000 [warn] http status 400 ("Looks like your keypair does
 not match its older value.") response from dirserver 'REDACTED2'. Please
 correct.
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-11-01 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by teor):

 Replying to [comment:24 nickm]:
 > Replying to [comment:23 teor]:
 > > '''Requiring Ed25519'''
 > >
 > > Also, what are we going to do about `DISABLE_DISABLING_ED25519`?
 > > It's currently `#undef`, which means that a relay can drop its ed25519
 key whenever it wants.
 > > When are we going to turn it on? When 0.2.5 is no longer recommended?
 >
 >
 > That sounds plausible to me.  Or another option would be to look at
 historical metrics data to see how often relays run a recent version for a
 while, then drop back to an older one.  If the answer is "almost never"
 then we can just turn it on now.

 Split off #20522. I'm in favour of doing it soon, because it makes key
 pinning consistent.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-11-01 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by nickm):

 Replying to [comment:23 teor]:
 > Replying to [comment:19 nickm]:
 > > ...
 > >
 > > When we turn on pinning, the most recent journal entry will rule.  So
 a relay will only be excluded from the consensus if its most recently
 pinned Ed25519 key is not the one it uses.  So if somebody switched Ed
 keys once a few months ago, they won't get penalized here.  This only
 affects them if they are switching frequently, or if they switch keys
 again.
 > >
 > > The rule for relays becomes:
 > > {{{
 > > Always use the same Ed25519 identity with the same RSA identity.
 > > }}}
 > > So, don't switch one unless you also switch the other.  If you lose
 one, don't try to retain the other.
 > >
 > > Sebastian says:
 > > > ...
 > > > How will this all work, by the way? My key pinning journal goes back
 one year and has more entries than what is written above, including more
 than just the dirauth above.
 > >
 > > Once key pinning is turned on, an authority will believe the latest
 entry for any given RSA key.  They will not accept a descriptor signed
 with that RSA identity key unless it also has the provided Ed25519
 identity.  So it only affects the voting, not the consensus.
 > > ...
 >
 > I see from the manual that AuthDirPinKeys is set on a per-authority
 basis, so it only affects that authority's votes (and so it's not like a
 consensus method, where every authority uses it at the same time).
 >
 > '''Activation Timing'''
 >
 > What if I run a relay that changes ed keys during the changeover?
 >
 > If authorities A, B, C, D set key pinning at hour 1,
 >  & authorities E, F, G, H set key pinning at hour 2,
 > then I have a different ed key pinned on some authorities compared to
 others.
 >
 > I guess I need to regenerate both RSA & ed keys in this instance.

 Yes.  If you are a relay, you should never keep one key and change the
 other.  The consequences for doing it during the changeover are weirder
 than usual.

 > '''Keeping State'''
 >
 > Will authorities need to back up their key pinning file?
 >
 > If an authority is restored with an empty pinning file, it will
 regenerate its key pinning file based on the descriptors it sees at that
 time, and those descriptors could be different after the restore. (But the
 other authorities will anchor the pinning, if a majority keep their
 files.)

 IMO authorities should probably back these up, but it isn't crucial.

 > '''Requiring Ed25519'''
 >
 > Also, what are we going to do about `DISABLE_DISABLING_ED25519`?
 > It's currently `#undef`, which means that a relay can drop its ed25519
 key whenever it wants.
 > When are we going to turn it on? When 0.2.5 is no longer recommended?


 That sounds plausible to me.  Or another option would be to look at
 historical metrics data to see how often relays run a recent version for a
 while, then drop back to an older one.  If the answer is "almost never"
 then we can just turn it on now.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-11-01 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by teor):

 Replying to [comment:19 nickm]:
 > ...
 >
 > When we turn on pinning, the most recent journal entry will rule.  So a
 relay will only be excluded from the consensus if its most recently pinned
 Ed25519 key is not the one it uses.  So if somebody switched Ed keys once
 a few months ago, they won't get penalized here.  This only affects them
 if they are switching frequently, or if they switch keys again.
 >
 > The rule for relays becomes:
 > {{{
 > Always use the same Ed25519 identity with the same RSA identity.
 > }}}
 > So, don't switch one unless you also switch the other.  If you lose one,
 don't try to retain the other.
 >
 > Sebastian says:
 > > ...
 > > How will this all work, by the way? My key pinning journal goes back
 one year and has more entries than what is written above, including more
 than just the dirauth above.
 >
 > Once key pinning is turned on, an authority will believe the latest
 entry for any given RSA key.  They will not accept a descriptor signed
 with that RSA identity key unless it also has the provided Ed25519
 identity.  So it only affects the voting, not the consensus.
 > ...

 I see from the manual that AuthDirPinKeys is set on a per-authority basis,
 so it only affects that authority's votes (and so it's not like a
 consensus method, where every authority uses it at the same time).

 '''Activation Timing'''

 What if I run a relay that changes ed keys during the changeover?

 If authorities A, B, C, D set key pinning at hour 1,
  & authorities E, F, G, H set key pinning at hour 2,
 then I have a different ed key pinned on some authorities compared to
 others.

 I guess I need to regenerate both RSA & ed keys in this instance.

 '''Keeping State'''

 Will authorities need to back up their key pinning file?

 If an authority is restored with an empty pinning file, it will regenerate
 its key pinning file based on the descriptors it sees at that time, and
 those descriptors could be different after the restore. (But the other
 authorities will anchor the pinning, if a majority keep their files.)

 '''Test Network / Testing'''

 I've just set AuthDirPinKeys on some of the authorities in the test
 network, and asked the other operators to do the same. It seems to work
 fine. But we don't have any current mismatching or RSA-only relays, so
 this is not as good a test as it could be.

 (It also works fine in chutney, but I'd like to try to match the public
 dirauth options in chutney going forward, see #20513.)

 '''Requiring Ed25519'''

 Also, what are we going to do about `DISABLE_DISABLING_ED25519`?
 It's currently `#undef`, which means that a relay can drop its ed25519 key
 whenever it wants.
 When are we going to turn it on? When 0.2.5 is no longer recommended?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-31 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by Sebastian):

 Ok, that's great. Then my worry was unfounded. The dirauths changed
 fingerprints because they too hastily upgraded without generating a key
 offline first, which should be rectified for all of them now.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-31 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by Sebastian):

 Ah, so if someone with a relay that has key pinning data stored uploads a
 descriptor with a previously unknown ed key, the dirauths will refuse to
 vote for that descriptor. But if at a later point in time the relay
 uploads another descriptor again with the previously recorded ed key, then
 the dirauth will vote for the relay again, yes?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-31 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by nickm):

 Teor says:
 >I suggest that we email these operators (or these operators filtered by
 some characteristic, like "bandwidth over 1MByte/second"), and let them
 know their relay is misconfigured, and they will soon be excluded from the
 consensus.

 IMO this is fine to do, but we need to explain it right.

 When we turn on pinning, the most recent journal entry will rule.  So a
 relay will only be excluded from the consensus if its most recently pinned
 Ed25519 key is not the one it uses.  So if somebody switched Ed keys once
 a few months ago, they won't get penalized here.  This only affects them
 if they are switching frequently, or if they switch keys again.

 The rule for relays becomes:
 {{{
 Always use the same Ed25519 identity with the same RSA identity.
 }}}
 So, don't switch one unless you also switch the other.  If you lose one,
 don't try to retain the other.

 Sebastian says:
 > One of these is a dirauth (dizum).

 We should probably make sure that whatever made Dizum change its ed25519
 key won't happen again.

 > How will this all work, by the way? My key pinning journal goes back one
 year and has more entries than what is written above, including more than
 just the dirauth above.

 Once key pinning is turned on, an authority will believe the latest entry
 for any given RSA key.  They will not accept a descriptor signed with that
 RSA identity key unless it also has the provided Ed25519 identity.  So it
 only affects the voting, not the consensus.

 > Should we maybe throw away all the journals and email those above
 anyway, informing them that they would be excluded in the future if they
 kept doing this?

 IMO we should not throw away the journals; they're all correct
 information.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-29 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by Sebastian):

 Should we maybe throw away all the journals and email those above anyway,
 informing them that they would be excluded in the future if they kept
 doing this?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-29 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by Sebastian):

 One of these is a dirauth (dizum). How will this all work, by the way? My
 key pinning journal goes back one year and has more entries than what is
 written above, including more than just the dirauth above.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-29 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by teor):

 I suggest that we email these operators (or these operators filtered by
 some characteristic, like "bandwidth over 1MByte/second"), and let them
 know their relay is misconfigured, and they will soon be excluded from the
 consensus.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-10-28 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
-+-
 Reporter:  teor |  Owner:  andrea
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:  Tor:
 |  0.3.0.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-ed25519-proto, nickm-|  Actual Points:
  deferred-20160905  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
 |  SponsorU-can
-+-

Comment (by nickm):

 So, is it safe to turn this on?  I say yes.

 Based on the key pinning journal from tor26 (thanks, weasel!) it appears
 that since June, tor26 has seen 11254 RSA key IDs that never ever had a
 problem with key pinning, and 38 that did have a problem with key pinning.
 Here is a list: The first column has the RSA ID digest; the second column
 has the number of times that the RSA ID has changed, and the third column
 is the total number of distinct RSA IDs that we saw:
 {{{
 0xTX/OPySoQeQhcfYbmg7XKvPig 3   2
 1fLGX0ExoUaNW2eog4qbftjASeI 3   3
 1flPABP5uAKi10ISLSYoFE77lKE 2   2
 2w28qPYF1huAZXHIG6ceFGBit0E 2   2
 5NaImMhATrKKj2exPASMgk+Wlzg 5   2
 5VWwnHcDZzPgCn1hzVNLqa9KojI 2   2
 8B2NZEjIuIPYrNCNOqd4nV7ji3s 308 2
 AwpuskclwF2OD84hkjy6UiPnXg4 2   2
 c8lCVGJIf8a9PS37ADkWGGBPPSQ 2   2
 CSNlpBRhGAUJKkKTa5iqJZmjS/o 2   2
 Eam7Qvu+2koLC25/LgjTdhKEAeA 3   3
 EIDZv2CSjzjtExqrPmMMGPfIY6k 971 3
 eT78t3vCLFFyNpHD9Anold98rLI 3   2
 fHPpbeWNhM2G4CAO6MDiMlbYwY4 2   2
 FmNLMUUcPNs1DKcuv5VKmHfwzjQ 5   5
 fqbq1v2DCDxTj0QDi7+gd1h911U 2   2
 h4QTqd5axJeipfIA2hY/EtUD/Y0 361 2
 hADNOhd+RqInQb+NI8r9/f9kPc4 4   4
 hBmxi6hnwmv4EzD1Lw3lSzmqeng 5   5
 IlhNU47BggOuIYwkmKnEy2VNWQ8 2   2
 /kAz11CDHDKpVxdK3RHkD1WKFKk 2   2
 k+wgCkGxwIa5SCA/kKyYEkehbRs 2   2
 L3qCbMW35tg07KJeI2oTUdOJ0ZU 2   2
 LmZJ2hypiJcX/6R7ne72F/lrAy0 6   3
 LQSvfJ3GjHXJC1fPd0rcS0Uo6vM 2   2
 n7VU4rU8XoC6sozAbXBUDiKuyPU 2   2
 nzE2uXX/gPDcRirEaOdoL/6T9As 2   2
 OENTblrXo3+jW1AeV0kI7FsuC4k 2   2
 Oy4g/k61Ml3mKg91MEh93RqNYGc 2   2
 pTxG9bFX3YM2bUWo6ZokSTShTEY 2   2
 qj2bTEI7M31nALgV890iRN0CC+4 2   2
 ur6aJJ2MxQsdUMIBBjPhlYjbQ5E 2   2
 WXuzSmUToNRG7oewrDC3FuTBWG4 2   2
 XcvYDQDicgqjLkAxf1FoG/UrWmM 3   2
 y5iRq/UMnKjxRFqyHSfMXDGCCSI 3   2
 YtLQNjkCJcHvZWIV3QZtAwSGH8M 2   2
 yylv56Bq+HhTRJW/OIF/4Ip3msA 2   2
 }}}

 I also tried looking at the time distribution of when the different
 Ed25519 keys appeared, to see if adding a grace period to the code would
 help.  That doesn't seem to be the case: no more than a third of the
 problems occurred within a week.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #18319 [Core Tor/Tor]: Exclude relays that don't match pinned RSA/Ed key pairs

2016-06-06 Thread Tor Bug Tracker & Wiki
#18319: Exclude relays that don't match pinned RSA/Ed key pairs
---+
 Reporter:  teor   |  Owner:  andrea
 Type:  defect | Status:  assigned
 Priority:  High   |  Milestone:  Tor: 0.2.9.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-ed25519-proto  |  Actual Points:
Parent ID: | Points:  1
 Reviewer: |Sponsor:  SponsorU-can
---+
Changes (by andrea):

 * status:  new => assigned
 * owner:   => andrea


Comment:

 Taking ownership for 0.2.9 triage

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs