[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Wed Apr 16 05:40:09 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/15 ===
===========================================================================
version 43
Author: arma
Date: 2014-04-16T04:56:57+00:00
--
--- version 42
+++ version 43
@@ -96,7 +96,7 @@
Nick Mathewson in proposal 231 [18].
Finally, hidden service operators are also generating new keys [19].
-Unfortunately, this forces every users of the service to update the
+Unfortunately, this forces every user of the service to update the
address in their bookmarks or configuration.
As Roger summarized it: “fun times”.
version 42
Author: arma
Date: 2014-04-16T04:53:44+00:00
send the relay reject mail
--- version 41
+++ version 42
@@ -76,7 +76,7 @@
them. What is known though are relays that are unfortunately still
vulnerable. Sina Rabbani has set up a visible list for guards and
exits [14]. To protect Tor users, directory authority operators have
-started to remove the Valid flag for vulnerable relays [15].
+started to reject descriptors for vulnerable relays [15].
The identity key for directory authorities are kept offline. But they
are used to certify medium-term signing keys. Roger Dingledine's
@@ -111,7 +111,7 @@
[12]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004259.html
[13]: http://charon.persephoneslair.org/~andrea/private/tor-heartbleed-survey/
[14]: https://encrypted.redteam.net/bleeding_edges/
- [15]: (XXX -- Roger owes a mail about this ; plan B is to link to consusus-health).
+ [15]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004336.html
[16]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006663.html
[17]: https://bugs.torproject.org/11464
[18]: https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/231-migrate-authority-rsa1024-ids.txt
version 41
Author: arma
Date: 2014-04-16T04:21:21+00:00
--
--- version 40
+++ version 41
@@ -63,7 +63,7 @@
Directory authorities can currently tie relay's nickname to its identity
key with the Named flag. That feature proved to be less helpful than it
seemed and can subject its users to impersonation attacks. As relays
-switch to new identity key, those who keep the same name will loose
+switch to new identity keys, those who keep the same name will lose
their Named flag for the next six months. So now seems a good time to
“throw out the Named and Unnamed flags entirely” [10]. Sebastian Hahn
acted on the idea and started a draft proposal [11].
version 40
Author: arma
Date: 2014-04-16T04:16:57+00:00
--
--- version 39
+++ version 40
@@ -50,7 +50,7 @@
“especially from the big relays, and we'll be happier tolerating a
couple of bumpy days while the network recovers.” [6]. Switching to a
new relay identity key means that the relay is seen as new [7] to the
-authorities again: they will loose their Guard status and bandwidth
+authorities again: they will lose their Guard status and bandwidth
measurement. It seems that a number of operators followed the advice, as
the network lost around 1 Gbit/s of advertised capacity between April
7th and April 10th [8].
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list