[tor-bugs] #33428 [Core Tor/Chutney]: Make chutney check for relay microdescriptors before verifying
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Mar 9 02:03:11 UTC 2020
#33428: Make chutney check for relay microdescriptors before verifying
-------------------------------------------+-------------------------------
Reporter: teor | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Chutney | Version:
Severity: Normal | Resolution:
Keywords: ipv6, prop311, outreachy-ipv6 | Actual Points:
Parent ID: #33232 | Points: 1
Reviewer: | Sponsor: Sponsor55-can
-------------------------------------------+-------------------------------
Comment (by teor):
Hi anuradha1904, this ticket is one of the stretch goals for the Tor IPv6
Outreachy project. You're welcome to start working on it, but we're not
sure how difficult it will be. Please stay in touch, so we can help you
out if you get stuck.
A lot of the work on the IPv6 project is in the `tor` binary, which is
written in C. Do you know how to program in C ?
If you don't know how to program in C, that's ok. There is plenty of
Python work to do in Chutney. I have added some more chutney tasks to the
Outreachy project description, and the
[https://trac.torproject.org/projects/tor/query?status=!closed&keywords
=~outreachy-ipv6 outreachy-ipv6 keyword].
I'm working on the branch for #33379 right now. Once it passes the tests,
I'll post a link to the pull request here.
Nick, is reading a file containing the ed25519 key is a good design for
this feature?
For the RSA key, we use `tor --list-fingerprint`. We could add a feature
to tor so it accepts a key type argument:
* `tor --list-fingerprint rsa`
* `tor --list-fingerprint ed25519`
If we want to read a file, we could just read
`keys/ed25519_master_id_public_key`, so we don't have to depend on #30642.
What do you think?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33428#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list