[tor-bugs] #26627 [Core Tor/Tor]: HSv3 throws many "Tried connecting to router at [IP:port], but RSA identity key was not as expected"

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jul 4 23:03:04 UTC 2018


#26627: HSv3 throws many "Tried connecting to router at [IP:port], but RSA identity
key was not as expected"
-------------------------------------------------+-------------------------
 Reporter:  asn                                  |          Owner:  (none)
     Type:  defect                               |         Status:
                                                 |  needs_information
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.3.5.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  security tor-relay certs handshake   |  Actual Points:
  ed25519 035-roadmap-proposed                   |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by teor):

 Replying to [comment:2 mahrud]:
 > First, here's some general stats:
 > * 1956 occurrences in about a month.
 > * 653 different keys and 667 different (RSA public key, IP)
 combinations.
 > * 318 of these were seen only once and one was seen 34 times.
 > * Full breakdown: [318, 138, 66, 34, 24, 22, 16, 8, 7, 2, 7, 3, 4, 5, 1,
 1, 2, 1, 0, 0, 1, 0, 3, 2, 0, 0, 1, 0, 0, 0, 0, 0, 0, 1]
 >
 > What would you suggest is the best way of testing those possibilities?
 >
 > To answer your questions:
 > * Partially v0.3.2.10, partially v0.3.3.7.
 > * Assuming you mean single-hop, yes.

 Single onion services don't use guards, so they eventually connect to most
 relays.
 This means that they see more errors than most other onion services, which
 only connect to a few guards.

 > * No load balancing.
 >
 > I'm not sure how to answer the last question, can you point me to how
 can I query or view the consensus?

 We are particularly interested in the failing relay versions, because that
 helps us isolate the bug.

 If you want to look up a few relays, you can use Relay Search:
 https://metrics.torproject.org/rs.html

 You could also use Stem to look up the RSA fingerprints and dump the relay
 information:
 https://stem.torproject.org

 If you'd like us to do the analysis, it should be safe to post the
 RSA/ed25519 pairs as an attachment to this ticket.
 But you must remove the timestamps from the log file, then destroy order
 by sorting the list.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26627#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list