[or-cvs] r9121: if we rotate our onion key, publish a new descriptor, and di (in tor/trunk: doc src/or)

arma at seul.org arma at seul.org
Fri Dec 15 07:58:32 UTC 2006


Author: arma
Date: 2006-12-15 02:58:31 -0500 (Fri, 15 Dec 2006)
New Revision: 9121

Modified:
   tor/trunk/doc/dir-spec.txt
   tor/trunk/src/or/router.c
Log:
if we rotate our onion key, publish a new descriptor, and
die soon after, we want to stick with that onion key when
we restart.


Modified: tor/trunk/doc/dir-spec.txt
===================================================================
--- tor/trunk/doc/dir-spec.txt	2006-12-15 07:04:37 UTC (rev 9120)
+++ tor/trunk/doc/dir-spec.txt	2006-12-15 07:58:31 UTC (rev 9121)
@@ -205,7 +205,7 @@
     "onion-key" NL a public key in PEM format
 
        This key is used to encrypt EXTEND cells for this OR.  The key MUST be
-       accepted for at least XXXX hours after any new key is published in a
+       accepted for at least 1 week after any new key is published in a
        subsequent descriptor.
 
     "signing-key" NL a public key in PEM format
@@ -257,7 +257,7 @@
     "eventdns" bool NL
 
         Declare whether this version of Tor is using the newer enhanced
-        dns logic.  Versions of Tor without eventdns SHOULD not be used for
+        dns logic.  Versions of Tor without eventdns SHOULD NOT be used for
         reverse hostname lookups.
 
         [All versions of Tor before 0.1.2.2-alpha should be assumed to have
@@ -431,8 +431,7 @@
    blacklisted, and elect not to include them in their network-status lists.
 
    Thus, the network-status list includes all non-blacklisted,
-   non-expired, non-superseded descriptors for ORs that the directory has
-   observed at least once to be running.
+   non-expired, non-superseded descriptors.
 
 4. Directory server operation
 
@@ -506,8 +505,8 @@
    router. Servers must not discard any descriptor listed by any current
    network-status document from any authority.  If there is enough space to
    store additional descriptors, servers SHOULD try to hold those which
-   clients are likely download the most.  (Currently, this is judged based on
-   the interval for which each descriptor seemed newest.)
+   clients are likely to download the most.  (Currently, this is judged
+   based on the interval for which each descriptor seemed newest.)
 
    Authorities SHOULD NOT download descriptors for routers that they would
    immediately reject for reasons listed in 3.1.

Modified: tor/trunk/src/or/router.c
===================================================================
--- tor/trunk/src/or/router.c	2006-12-15 07:04:37 UTC (rev 9120)
+++ tor/trunk/src/or/router.c	2006-12-15 07:58:31 UTC (rev 9121)
@@ -154,7 +154,7 @@
   state->LastRotatedOnionKey = onionkey_set_at = now;
   tor_mutex_release(key_lock);
   mark_my_descriptor_dirty();
-  or_state_mark_dirty(state, now+600);
+  or_state_mark_dirty(state, 0);
   return;
  error:
   log_warn(LD_GENERAL, "Couldn't rotate onion key.");



More information about the tor-commits mailing list