#39: Certificate rotation sometimes does not happen. ------------------------------+------------------------- Reporter: weasel | Owner: nickm Type: defect | Status: closed Priority: Low | Milestone: Component: Mixminion-Server | Version: 0.0.7 Severity: Normal | Resolution: wontfix Keywords: | Actual Points: Parent ID: | Points: Reviewer: | Sponsor: ------------------------------+------------------------- Changes (by arma):
* status: assigned => closed * resolution: None => wontfix Old description: > [Moved from bugzilla] > Reporter: ni...@alum.mit.edu (Nick Mathewson) > > Description: > Opened: 2004-06-06 21:54 > > > Sometimes, Mixminion servers become inoperable because they do not rotate > their TLS certificates when they expire. > > The cause for this bug is unknown. The bug has existed since at least > 0.0.6. > > You can tell that *another* server has come down with this bug because > your log says something like: > > Jun 06 00:55:08.643 -0400 [WARN] Certificate error: Invalid certificate > from 'lakshmi' at mixminion.pseudonymity.net:48099 (fd 9): > Certificate has expired [at Jun 6 00:05:00 2004 GMT]. Shutting down > connection. > > There are no such obvious signs on the failing server side, AFAIK. > > As a band-aid, I could make TLS certificates get roatated daily, no > matter what. (Right now, their rotation interval is tied to > packet key rotation.) This is probably the right thing to do, but before > I do it, I want to understand why on earth it is happening. > > ------- Additional Comments From Nick Mathewson 2004-06-23 21:51 ------- > > Actually, the diagnosis may be completely wrong. Looking at > ServerKeys.py, it seems like (by default) > certificates only have 5 minutes of sloppiness on either side of their > lifetime. Thus, if anybody is > skewed by more than 5 minutes, their certificate will be invalid for the > amount of their clock skew. > > Hm... I'll up the interval for now, but I really need a way to detect > relative skew. > > ------- Additional Comments From Nick Mathewson 2004-08-26 05:12 ------- > > I think I might have it nailed now -- I changed the code to warn about > clock skew when it downloads a directory, bumped up the > skew tolerance, and rewrote the event scheduling code to be less clever > and more obviously reliable. I also improved the warning > messages so we can find out how badly expired certs are expired. > > If anybody sees this problem when running CVS code, please let me know. > > [Automatically added by flyspray2trac: Operating System: All] New description: [Moved from bugzilla] Reporter: ni...@alum.mit.edu (Nick Mathewson) Description: Opened: 2004-06-06 21:54 Sometimes, Mixminion servers become inoperable because they do not rotate their TLS certificates when they expire. The cause for this bug is unknown. The bug has existed since at least 0.0.6. You can tell that *another* server has come down with this bug because your log says something like: Jun 06 00:55:08.643 -0400 [WARN] Certificate error: Invalid certificate from 'lakshmi' at mixminion.pseudonymity.net:48099 (fd 9): Certificate has expired [at Jun 6 00:05:00 2004 GMT]. Shutting down connection. There are no such obvious signs on the failing server side, AFAIK. As a band-aid, I could make TLS certificates get roatated daily, no matter what. (Right now, their rotation interval is tied to packet key rotation.) This is probably the right thing to do, but before I do it, I want to understand why on earth it is happening. ------- Additional Comments From Nick Mathewson 2004-06-23 21:51 ------- Actually, the diagnosis may be completely wrong. Looking at ServerKeys.py, it seems like (by default) certificates only have 5 minutes of sloppiness on either side of their lifetime. Thus, if anybody is skewed by more than 5 minutes, their certificate will be invalid for the amount of their clock skew. Hm... I'll up the interval for now, but I really need a way to detect relative skew. ------- Additional Comments From Nick Mathewson 2004-08-26 05:12 ------- I think I might have it nailed now -- I changed the code to warn about clock skew when it downloads a directory, bumped up the skew tolerance, and rewrote the event scheduling code to be less clever and more obviously reliable. I also improved the warning messages so we can find out how badly expired certs are expired. If anybody sees this problem when running CVS code, please let me know. [Automatically added by flyspray2trac: Operating System: All] -- Comment: mixminion is dead; long live mixminion -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/39#comment:2> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs