[tor-bugs] #13045 [BridgeDB]: Leekspin descriptor signatures cannot be verified by Stem

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Sep 2 23:59:30 UTC 2014


#13045: Leekspin descriptor signatures cannot be verified by Stem
--------------------------+----------------------------------------
     Reporter:  isis      |      Owner:  isis
         Type:  defect    |     Status:  accepted
     Priority:  major     |  Milestone:
    Component:  BridgeDB  |    Version:
   Resolution:            |   Keywords:  leekspin, bridgedb-parsers
Actual Points:            |  Parent ID:
       Points:            |
--------------------------+----------------------------------------
Description changed by isis:

Old description:

> The signatures on descriptor documents generated by Leekspin (currently
> on version 0.2.1) cannot currently be verified by Stem.
>
> Stem uses
> [https://gitweb.torproject.org/stem.git/commitdiff/e0095fbe54759c45cbf6d1b120d2b17b47a0ec21
> this code to successfully verify signatures created by Tor]. There is
> currently some confusion in the spec (#13042) over the ordering and
> versions of encodings applied to the `signing-key` and the `router-
> signature`. Until #13042 is made clearer, the best way we have to fix
> this is to do what Stem does in reverse.
>
> There may be some problems here with Python dependencies (the available,
> packaged, implementations of RSA, PKCS!#1, and ASN.1 aren't all that
> great, as noted in #5810). I don't care what dependencies we add to get
> this to work; it's causing BridgeDB's new Stem-based parsers (#9380) to
> choke during test runs on Leekspin's fake bridge descriptors.

New description:

 The
 [https://gitweb.torproject.org/user/isis/leekspin.git/blob/HEAD:/leekspin/crypto.py#l135
 signatures on descriptor documents generated by Leekspin] (currently on
 version 0.2.1), in `leekspin.crypto.signDescriptorDocument()`, cannot
 currently be verified by Stem.

 Stem uses
 [https://gitweb.torproject.org/stem.git/commitdiff/e0095fbe54759c45cbf6d1b120d2b17b47a0ec21
 this code to successfully verify signatures created by Tor]. There is
 currently some confusion in the spec (#13042) over the ordering and
 versions of encodings applied to the `signing-key` and the `router-
 signature`. Until #13042 is made clearer, the best way we have to fix this
 is to do what Stem does in reverse.

 There may be some problems here with Python dependencies (the available,
 packaged, implementations of RSA, PKCS!#1, and ASN.1 aren't all that
 great, as noted in #5810). I don't care what dependencies we add to get
 this to work; it's causing BridgeDB's new Stem-based parsers (#9380) to
 choke during test runs on Leekspin's fake bridge descriptors.

--

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13045#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list