[tor-bugs] #23412 [Core Tor/Torflow]: Do bandwidth authorities reset history when the relay fingerprint changes? (was: I deleted all the private keys from my relay and created a new one)

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Sep 6 01:35:38 UTC 2017


#23412: Do bandwidth authorities reset history when the relay fingerprint changes?
----------------------------------+------------------------
 Reporter:  Dbryrtfbcbhgf         |          Owner:  aagbsn
     Type:  defect                |         Status:  new
 Priority:  Medium                |      Milestone:
Component:  Core Tor/Torflow      |        Version:
 Severity:  Normal                |     Resolution:
 Keywords:  bwauth, security-low  |  Actual Points:
Parent ID:                        |         Points:  2
 Reviewer:                        |        Sponsor:
----------------------------------+------------------------
Changes (by teor):

 * owner:  (none) => aagbsn
 * keywords:   => bwauth, security-low
 * points:   => 2
 * component:  Core Tor/Tor => Core Tor/Torflow


Comment:

 Replying to [comment:2 Dbryrtfbcbhgf]:
 > It is using the same ip. If a attacker would compromise the relay and
 the keys are revoked, would the attacker be able to create a new relay and
 get in the same position as the old relay?

 The new relay doesn't have the Stable or HSDir flags yet. So it won't be
 used much for a week or so.

 The bandwidth authorities measure fingerprints, not IP addresses. So they
 should reset the usage when the fingerprint changes. (I'm not sure if they
 reset it when the IP changes.)

 We will test this to make sure.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23412#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list