Hi,

Thanks for the mail, even though I wasn't notified personally (yes, my
bridge has a contact email). I can say that after the issue with
OpenSSL occurred,  I immediately installed the update provided by my
distro, stopped Tor and removed all key and let it generate new ones.
My bridge is an obfuscated one. Do I have to do anything else? I mean,
since obfsproxy isn't linking to OpenSSL as it's written in Python, it
should be safe, no? Or maybe Python itself links to OpenSSL but since
I updated OpenSSL and restarted everything that was using its libs, I
should be safe?

Thanks

On Wed, Apr 23, 2014 at 8:32 AM, Matthew Finkel
<matthew.fin...@gmail.com> wrote:
> Hi All,
>
> Below is an email we sent last week to almost all of the bridge
> operators who provided contact information for their bridge(s). For
> those operators we missed and for those we couldn't contact, this
> hopefully provides some useful information.
>
> All the best,
> Matt
>
> -----------------------------------------------------------------------
>
> Hi Tor Bridge Relay Operator!
>
> Unfortunately this email must begin with bad news, but it gets better.
>
> Due to the recent Heartbleed OpenSSL vulnerability that was disclosed
> earlier this week, we are reaching out to you to ask that you install
> an updated version of OpenSSL. The vulnerability has the potential to
> decrease the security of your bridge as well as the anonymity of any
> user connecting to your bridge. As a result of this, we also ask that
> you generate a new identity key due to the possibility that your
> current one was leaked.
>
> The process to upgrade your version of OpenSSL depends greatly on
> your operating system. Please ensure you are using a version that was
> released within the past four days, see the Heartbleed website[0] for
> more details on the vulnerability and for which versions are affected.
> Please do this before you regenerate your identity key.
>
> When this is done, you will need to restart Tor. At this point you can
> ask us to retest your bridge to confirm that it is not vulnerable
> anymore.
>
> Next, to regenerate your identity key simply stop Tor and delete the
> current key. This is done by opening Tor's Data directory and removing
> the contents in the keys/ directory. Tor's Data directory is located at
> /var/lib/tor, by default. Let us know if you have trouble locating it.
> When this is complete, start Tor and it will automatically create a new
> identity for you.
>
> See the recent blog post for many more details:
> https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
>
> Now that the bad news was said, we want to take this opportunity to
> thank you, from the bottom of our hearts, for volunteering to run
> a bridge relay. We know we do not say it often, but it is really
> appreciated! Please let us know if you have any question, concerns, or
> suggestions, especially related to how we communicate with you and how
> bridge relay operators can be more involved.
>
> Lastly, if you are not already running the obfsproxy pluggable
> transport[1] (i.e.  obfs3) on your bridge, please follow the Debian
> instructions[2] (for a Debian-based system) on the website and install
> it. Your bridge is a great contribution to the Tor network, however as
> censorship on the internet increases around the world users are forced
> to use a pluggable transport. Tor does not understand how to
> communicate with them by default, though. Therefore we are asking that
> all bridge operators install obfsproxy and help as many users as
> possible.
>
> In addition, also consider subscribing to the tor-relays mailing
> list[3], if you are not already; we will be posting instructions on how
> to maximize the contribution of your bridge on that list every now and
> then.
>
> [0] http://heartbleed.com
> [1] https://www.torproject.org/docs/pluggable-transports.html.en
> [2] 
> https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#instructions
> [3] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> Again, thank you for running a bridge relay and sorry for the bad news.
>
> Let us know if you have any questions or if you have any suggestions.
>
> All the best,
> Matt
> The Tor Project
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



-- 
Yours truly
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to