On Tue, Dec 23, 2014 at 11:20:32PM +0000, Thomas White wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Directory Authorities,
Can you please remove the following fingerprints/IP's from the blacklist as per my previous updates in tor-talk.
D78AB0013D95AFA60757333645BAA03A169DF722 6F545A39D4849C9FE5B08A6D68C8B3478E4B608B 5E87B10B430BA4D9ADF1E1F01E69D3A137FB63C9 0824CE7D452B892D12E081D36E7415F85EA9988F 35961469646A623F9EE03B7B45296527A624AAFD 1EA968C956FBC00617655A35DA872D319E87C597 E5A21C42B0FDB88E1A744D9A0388EFB2A7A598CF 5D1CB4B3025F4D2810CF12AB7A8DDDD6FC10F139 1324EC51FBFA5FD1A11B94563E8D2A7999CD8F57 93CD9231C260558D77331162A5DC5A4C692F5344
Hi Thomas,
I cannot speak for the directory authority operators, but removing these fingerprints from each of their blacklist seems like a bad idea. Whether or not your relays were compromised, it sounds like something happened. Directory authorities accepting these keys again seems risky (even assuming the hardware is secure). Generating new keys is probably a better choice, unfortunately this will add additional overhead and you'll obviously lose a few months reputation and stability-state, but it shouldn't take long before the relays regain their flags and status in the network.
Thanks for running these relays, Matt