[tor-bugs] #16943 [Tor]: Implement prop250 (Random Number Generation During Tor Voting)

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Nov 24 22:44:07 UTC 2015


#16943: Implement prop250 (Random Number Generation During Tor Voting)
----------------------+------------------------------------
 Reporter:  asn       |          Owner:
     Type:  defect    |         Status:  new
 Priority:  Medium    |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor       |        Version:
 Severity:  Blocker   |     Resolution:
 Keywords:  tor-hs    |  Actual Points:
Parent ID:  #8244     |         Points:  large
  Sponsor:  SponsorR  |
----------------------+------------------------------------

Comment (by dgoulet):

 Latest branch with code rebased on master and improvement: `prop250_v4`.

 This branch has few new things.

 * A random number is now always hashed `H(RN)` so we avoid leaking bytes
 from our PRNG to the network.
 * Add SR flag to the vote indicating if the vote participates in the
 protocol
 * Parse votes and populate an object in the `networkstatus_t` object. Once
 done, we only handle those commits once we are sure a vote is valid and
 from known authority (we weren't doing that before).
 * Refactor some functions to be able to support the last bullet above and
 improve naming on some functions.

 Few things are missing that I'll get to it:

 * Consensus params for the number of participants.
 * Torrc option to disable SR support (basically making the dirauth not
 adding the SR flag to the vote).
 * Some issues with the disk state also because we know rely on the RSA
 fingerprint of a dirauth.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16943#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list