[tor-dev] OfflineMasterKey / ansible-relayor

nusenu nusenu at openmailbox.org
Thu Nov 19 16:02:11 UTC 2015

>> I copy/expose the following files to the relay:
>> > 
>> > [ 'ed25519_master_id_public_key', 'ed25519_signing_cert', 
>> > 'ed25519_signing_secret_key', 'secret_id_key', 'secret_onion_key', 
>> > 'secret_onion_key_ntor']
>> > 
>> > 
> When first setting up (new relay) or restoring the relay, yes. But
> when only renewing the ed25519 medium term signing key (if
> ansible-relayor will support this) you only need to copy/expose the
> following files to the relay:
> ed25519_signing_cert, ed25519_signing_secret_key
> If you also move secret_onion_key and secret_onion_key_ntor, it could
> mess Tor's internal automated key rotation, and the descriptors
> available to clients might become invalid, making it impossible for
> clients to extend circuits through this relay. That's why Tor keeps a
> .old version of these keys when rotating, so clients with older
> descriptors won't experience circuit failures when using this relay.
> To detect this, either the user will let ansible-relayor know if he is
> setting up a new relay / restoring a relay or just renewing the
> ed25519 keys for a running relay, either read Tor's
> $datadirectory/keys folder and if secret_id_key exists, assume the latter.

thanks for the feedback!

Are secret_onion_* files required at all when restoring a relay?
(it doesn't look like it)

If you confirm that I would simply remove them from the list and never
copy them over.

remaining with these files:


(tor's manual page FILES section is not very verbose in that regard -

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20151119/c82bc526/attachment.sig>

More information about the tor-dev mailing list