v3-authority-howto.txt 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384
  1. How to add a v3 directory authority.
  2. What we'll be doing:
  3. We'll be configuring your Tor server as a v3 directory authority,
  4. generating a v3 identity key plus certificates, and adding your v3
  5. identity fingerprint to the list of default directory authorities.
  6. The steps:
  7. 0) Make sure you're running ntp, and that your time is correct.
  8. Make sure you have Tor version at least r11953. In the short term,
  9. running a working authority may mean running the latest version of
  10. Tor from SVN trunk. Later on, we hope that it will become easier
  11. and you can just run a recent development release (and later still,
  12. a recent stable release).
  13. 1) First, you'll need a certificate. Run ./src/tools/tor-gencert to
  14. generate one.
  15. Run tor-gencert in a separate, very secure directory. The first time
  16. you run it, you will need to run it with the --create-identity-key
  17. option to make a v3 authority identity key. Subsequent times, you
  18. can just run it as-is.
  19. tor-gencert will make 3 files:
  20. authority_identity_key -- THIS IS VERY SECRET AND VERY SENSITIVE.
  21. DO NOT LEAK IT. DO NOT LOSE IT.
  22. authority_signing_key -- A key for signing votes and v3 conensuses.
  23. authority_certificate -- A document authenticating your signing key
  24. with your identity-key.
  25. You will need to rotate your signing key periodically. The current
  26. default lifetime is 1 year. We'll probably take this down to a month or
  27. two some time soon. To rotate your key, run tor-gencert as before,
  28. but without the --create-identity-key option.
  29. 2) Copy authority_signing_key and authority_certificate to your Tor keys
  30. directory.
  31. For example if your data directory is /var/lib/tor/, you should run
  32. cp authority_signing_key authority_certificate /var/lib/tor/keys/
  33. You will need to repeat this every time you rotate your certificate.
  34. 3) Tell your Tor to be a v3 authority by adding these lines to your torrc:
  35. AuthoritativeDirectory 1
  36. V3AuthoritativeDirectory 1
  37. 4) Now your authority is generating a networkstatus opinion (called a
  38. "vote") every period, but none of the other authorities care yet. The
  39. next step is to get a Tor developer (likely Roger or Nick) to add
  40. your v3 identity fingerprint to the default list of dirservers.
  41. First, you need to learn your authority's v3 identity fingerprint.
  42. It should be in your authority_certificate file in a line like:
  43. fingerprint 3041632465FA8847A98B2C5742108C72325532D9
  44. One of the Tor developers then needs to add this fingerprint to
  45. the add_default_trusted_dirservers() function in config.c, using
  46. the syntax "v3ident=<fingerprint>". For example, if moria1's new v3
  47. identity fingerprint is FOO, the moria1 dirserver line should now be:
  48. DirServer moria1 v1 orport=9001 v3ident=FOO 128.31.0.34:9031 FFCB 46DB 1339 DA84 674C 70D7 CB58 6434 C437 0441
  49. The v3ident item must appear after the nickname and before the IP.
  50. 5) Once your fingerprint has been added to config.c, we will try to
  51. get a majority of v3 authorities to upgrade, so they know about you
  52. too. At that point your vote will automatically be included in the
  53. networkstatus consensus, and you'll be a fully-functioning contributing
  54. v3 authority.
  55. Note also that a majority of the configured v3 authorities need to
  56. agree in order to generate a consensus: so this is also the point
  57. where extended downtime on your server means missing votes.