On Tue, Dec 23, 2014 at 11:20:32PM +0000, Thomas White wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Directory Authorities, > > Can you please remove the following fingerprints/IP's from the > blacklist as per my previous updates in tor-talk. > > D78AB0013D95AFA60757333645BAA03A169DF722 > 6F545A39D4849C9FE5B08A6D68C8B3478E4B608B > 5E87B10B430BA4D9ADF1E1F01E69D3A137FB63C9 > 0824CE7D452B892D12E081D36E7415F85EA9988F > 35961469646A623F9EE03B7B45296527A624AAFD > 1EA968C956FBC00617655A35DA872D319E87C597 > E5A21C42B0FDB88E1A744D9A0388EFB2A7A598CF > 5D1CB4B3025F4D2810CF12AB7A8DDDD6FC10F139 > 1324EC51FBFA5FD1A11B94563E8D2A7999CD8F57 > 93CD9231C260558D77331162A5DC5A4C692F5344 >
Hi Thomas, I cannot speak for the directory authority operators, but removing these fingerprints from each of their blacklist seems like a bad idea. Whether or not your relays were compromised, it sounds like something happened. Directory authorities accepting these keys again seems risky (even assuming the hardware is secure). Generating new keys is probably a better choice, unfortunately this will add additional overhead and you'll obviously lose a few months reputation and stability-state, but it shouldn't take long before the relays regain their flags and status in the network. Thanks for running these relays, Matt _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
