[tor-dev] Using fingerprint of cached relay bypasses bridge?

teor teor2345 at gmail.com
Wed Nov 2 03:52:50 UTC 2016

> On 2 Nov. 2016, at 14:50, Roger Dingledine <arma at mit.edu> wrote:
> There are still some missing pieces to my theory though. The biggest one
> is: how would your Tor client proceed past the fingerprint complaint?
> That is, Tor will never get to actually fetching a bridge descriptor,
> because the fingerprint of the bridge will be wrong so it will stop.
> Maybe there is some edge case you can arrange where you had the right
> fingerprint on the last run, so you have the descriptor already at boot?
> Or maybe you do a setconf of the bridge line while your Tor is running?

You could also run Tor 0.2.7 or earlier, where the fingerprint is never
checked, as long as you use the DirPort.


Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
xmpp: teor at torproject dot org

More information about the tor-dev mailing list