[tor-bugs] #16790 [Tor]: Tor should reload keys from disk when receiving a SIGHUP

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Aug 19 22:43:10 UTC 2015


#16790: Tor should reload keys from disk when receiving a SIGHUP
-------------------------+-------------------------------------------------
     Reporter:  s7r      |      Owner:  nickm
         Type:  defect   |     Status:  needs_review
     Priority:  normal   |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor      |    Version:  Tor: 0.2.7.2-alpha
   Resolution:           |   Keywords:  TorCoreTeam201508, ed25519,
Actual Points:           |  identity keys
       Points:           |  Parent ID:
-------------------------+-------------------------------------------------

Comment (by nickm):

 Replying to [comment:3 s7r]:
 > Just to make sure: the option is enforced only when Tor '''wants''' or
 '''needs''' to generate new signing key and certificate (like when the
 signing key and certificate it has loaded in memory are going to expire
 soon), and is ignored otherwise?
 >
 > I have deleted ed25519_master_id_public_key and only left a valid
 certificate and signing key, and sent a HUP signal to Tor, it reloaded
 just fine but did not generate and write to disk
 ed25519_master_id_public_key from the certificate, as we normally do when
 we start.
 >
 > This has no importance - the behavior is correct either way just want to
 make sure I am describing it correctly in the documentation.

 Hmm. I'm not 100% sure I understand the question here.  :/

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16790#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list