[tor-bugs] #24851 [Core Tor/Fallback Scripts]: create a script that generates the authority format from the authorities in the current consensus
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jan 29 22:12:55 UTC 2018
#24851: create a script that generates the authority format from the authorities in
the current consensus
---------------------------------------+-----------------------------------
Reporter: teor | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor:
| 0.3.4.x-final
Component: Core Tor/Fallback Scripts | Version:
Severity: Normal | Resolution:
Keywords: tor-dirauth | Actual Points:
Parent ID: #24818 | Points: 0.5
Reviewer: | Sponsor:
---------------------------------------+-----------------------------------
Comment (by teor):
Replying to [comment:4 atagar]:
> Hi Tim. Is this to generate tor's hardcoded list of authorities? If so
then seems a little odd to check for the 'Authority' flag since this means
that your script will omit authorities when they're down.
>
> For what it's worth Stem has a get_authorities() which references its
own copy of the authority list...
>
>
https://stem.torproject.org/api/descriptor/remote.html#stem.descriptor.remote.get_authorities
>
https://gitweb.torproject.org/stem.git/tree/stem/descriptor/remote.py#n823
>
> However, probably unhelpful due to the clear chicken-and-egg since part
of the goal is to sync this listing with the document you generate.
>
> Maybe the best bet would be for your script to include a hardcoded
listing of the authority fingerprints, then...
>
> * Fetch their descriptors to generate the rest of the doc (address,
or/dirport, nickname, etc).
> * If any of the hardcoded relays isn't present in the consensus then
error.
>
> This way adding/removing authorities is as simple as changing the list
of fingerprints and rerunning your script.
I want to use the consensus to make sure that we only include valid IPv6
addresses for authorities.
When we start hard-coding ed25519 key fingerprints, we can use it to warn
about incorrectly pinned ed25519 keys.
(Key pinning is much less of a concern, but IPv6 addresses can be quite
dynamic.)
I don't think it matters whether the other fields are retrieved from the
consensus or the descriptor.
So your strategy sounds good.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24851#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list