-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi,
Reading the dev list yesterday I saw that a scan was performed on all the relays in the Tor network and the ones vulnerable to OpenSSL heartbleed had their fingerprints listed with a !reject argument by the directory authorities. So far so good, but what about the bleeding bridges and obfs bridges? Was that database scanned for bleeding bridges too? Since these act as entry guards this is important. It wasn't clear from what I've read yesterday if the scan was only over the normal relays (not bridges which are not advertised in the Tor network) or on everything, including the bridges. If we are talking about second scenario, I apologize in advance for asking again but just wanted to make sure and get a confirmation. s7r -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.17 (MingW32) iQEcBAEBCAAGBQJTUm5jAAoJEIN/pSyBJlsRYgAH/iGsiZG3HaLwlM8JaMqSpude Oktk5MlMUR0o8SbfMORg0g00fWWDP18uh3ujxSqzr1kz5a7GFvf58lOSduEnVWqT oMPzyBYvyxFpFzFnKGGTYZfT4c+RneWPD9ZWardyULL4vnFjHS9SW4LWeNHGT286 90laPDl2wpkXtbPHR3nAGc3qyUIt5NIhFu6D2Alv2TTzlguapW0WZmpFr/jI63Xu R6dND1l59NLv/t0H57nBi8hhrcsc6/iFLvIUb+WV4MC6v0xTpig8AYMgDwzCtklg BlEDn3Yy+3dd6P1Ry5VeUSdZUoO+Bg3lCbpcCxbUuNG4Kp3u3kOOrNa7CrZ0f1A= =tjKk -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk