On #7164 (moved), a cypherpunks notes that ~40 relays fail to rotate their onion keys. This should be addressed by identifying these relays, and adding them to the DirAuths' AuthDirInvalid or AuthDirReject lists.
First, we need to update torspec/dir-spec.txt to say that relays SHOULD rotate their onion keys every 7 days, and MUST rotate them every N days. (I suggest 14 or 28.)
Then we can modify DocTor to check for relays in the consensus that have had the same onion key for N days. (I think DocTor is the right place for this check.)
This won't catch cases where relays repeat onion keys, but it will suffice to catch the most obvious misconfiguration - a read-only onion key file.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Actually, I think the correct fix is to say that onion keys MUST be rotated every 7 days in the spec. And then ban keys that haven't been rotated for 7*N days, where N is in (2,3,4).
Actually, I think the correct fix is to say that onion keys MUST be rotated every 7 days in the spec. And then ban keys that haven't been rotated for 7*N days, where N is in (2,3,4).
Golly. Can you point to some relays that have this behavior? Then we can try to investigate why it's happening.
This task needs someone who is good at writing stem scripts.
We need to compare the onion keys (TAP & ntor) for each relay in full consensuses spaced 7 days + 1 hour apart, and make sure they are different.
We might want to raise the permissible interval for onion key rotation, actually. It appears to be the leading cause of microdescriptor replacement, and the security benefit for rotating onion keys frequently is not all that high.