[tor-bugs] #20969 [Core Tor/DocTor]: Detect relays that don't update their onion keys every 7 days.
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Wed Dec 14 16:06:48 UTC 2016
    
    
  
#20969: Detect relays that don't update their onion keys every 7 days.
---------------------------------+--------------------
     Reporter:  dgoulet          |      Owner:  atagar
         Type:  enhancement      |     Status:  new
     Priority:  Medium           |  Milestone:
    Component:  Core Tor/DocTor  |    Version:
     Severity:  Normal           |   Keywords:
Actual Points:                   |  Parent ID:
       Points:                   |   Reviewer:
      Sponsor:                   |
---------------------------------+--------------------
 This is related to #20055 which would be an important thing to monitor for
 the health and security of the network.
 There are multiple things here that can be or should be checked.
 The `onion-key` field is an RSA key so DocTor will need to keep a
 persistent database of those over time (only used for TAP handshake).
 The `ntor-onion-key` field also can be monitored the same as the RSA key.
 If the `ntor-onion-key-crosscert` field is present, you'll get a timestamp
 for free in the certificate which should have the `exp_field` set to the
 last published time + 7 days.
 In any case, a router SHOULD NOT have either a TAP or ntor onion key
 _more_ than 7 days as this is hardcoded in Tor. If they do, it could be
 another implementation but finding them would be good so we can warn/ask
 them to fix. Or better, detect bugs as well on tor implementation that
 could keep those for a longer time.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20969>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list