Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I am also sending the steps I imagine Tor should take when started as a relay. Apologies if I am missing something obvious. They are expressed as simple as possible, Tor's interpretation is way more complex than this, but I think/hope this might hel

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >> Thanks; this is incredibly helpful! > >> I've started a branch to do a test case to demonstrate all these >> bugs ; it's called "ed25519_keygen" in my public repository. It >> also adds a couple more features to '--keygen'. It does cases >>

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 That is great. One thing which could help identifying the bugs faster: Tor gives too much importance to ed25519_master_id_public_key (if it doesn't see this file, it will generate a new unrequested identity regardless if it has a valid signing_cert