In Tor, when multiple relays have the same operator(s), they should declare that they are members of a "family".
In Tor's current design, to set up relays as members of a family, every relay needs to list every other member of the family in its configuration, and publish that list to clients as well.
Estas listas pueden ser desagradables de mantener y caras de descargar.
The Happy Families design is a new feature in Tor 0.4.9.2-alpha that will (eventually) provide a simpler way to configure relay families, and will also save a lot of traffic when clients are fetching network directory information.
(Unfortunately, moving to happy families will create additional work while the transition is going on. We think that it will be worth it in the long run.)
Debería leer esto si es un operador de repetidores que necesita configurar una familia en la red Tor.
La idea básica
In the Happy Families design, every relay family is identified by a secret family signing key shared by all family members.
Los miembros de la familia utilizan esta clave para firmar los certificados que acreditan su pertenencia a la familia.
So what you'll need to do is:
- Generate a single key for your family.
- Copy that key to every relay.
- Configure your relays to use that key.
En más detalle
Generación de la clave familiar
First, you will need to wait until all of your relays are running 0.4.9.2-alpha or later.
Then, to generate a family key, run:
tor --keygen-family MyKey
Esto creará un archivo llamado MyKey.secret_family_key
; también escribirá algo como este resultado en la salida estándar:
# Generated MyKey.secret_family_key
FamilyId wweKJrJxUDs1EdtFFHCDtvVgTKftOC/crUl1mYJv830
Save that FamilyID
line; you're going to need it!
(Don't use the one from this example—that isn't your family ID.)
Configuring your relay
Copy the MyKey.secret_family_key
file (or whatever you called it) into the KeyDir
of every one of your relay.
(By default, this is the keys
subdirectory of your DataDir
.)
El nombre del archivo debe terminar con .secret_family_key
.
Then, add the FamilyId
line to your torrc
.
If your relay is running, you'll have to tell it to reload its configuration (typically with a SIGHUP
.)
¿Funcionó?
If you did this right, you should see a family-cert
entry in your relay's descriptor, looking something like this:
family-cert
-----BEGIN FAMILY CERT-----
AQwAB2K5AXJrxBpgTXDIvHKFShmCCD2yLnDaBf2lWaInBhR2R56HAQAgBAAjv69J
jy+7BSRh1GnGF7Zxm+AMXvJYWkUCWY+5KU8Bymkz5N4D/QNs4K6bOjLokAwD4raT
J34t8b7uxHXuFS2F2VN5Ygr3//vGsB00jideQ5Cj9aX+BLSZ2FjC6GK2XAo=
-----END FAMILY CERT-----
Once enough of the directory authorities are running 0.4.9.2-alpha or later, they'll include a corresponding entry in your relays' microdescriptors, which will look something like:
family-ids ed25519:wweKJrJxUDs1EdtFFHCDtvVgTKftOC/crUl1mYJv830
NOTE: You still need to configure MyFamily!
Unfortunately, you will still need to configure the MyFamily
option as you did before: until clients all support Happy Families, they will need to look at the legacy family lists.
Vamos a intentar que este periodo transitorio sea lo más breve posible.
We'll announce once it is no longer necessary to include MyFamily
.
Additional info: How to transition family keys
If one of your relays is compromised, or if you accidentally leak a family key, you'll need to change the key.
(If you don't, an adversary's relay could falsely claim to be a member of your family.)
Para ello, recomendamos un proceso gradual.
- Generate a new family key as above.
Dale un nombre de archivo diferente al de la clave antigua.
- Copy the new family key to every one of your relays, without replacing the old family key.
- Add the new
FamilyID
line to all of your relays' configurations, without removing the old one.
At this point, your relays will all be members of two families.
- Wait for a few days, to give the new family information time to propagate.
- Remove the old
FamilyID
lines from your relays' configurations.
Optionally, remove the old family keys as well.
Additional info: Expected savings from this transition
We plan to remove MyFamily
and legacy TAP onion keys at the same time.
Cuando lo hagamos, estimamos que los microdescriptores de la red resultante serán algo así como el 10% de su tamaño actual.
(Desgraciadamente, puede que no sea un ahorro permanente: cuando pasemos a la criptografía poscuántica, puede que tengamos que volver a agrandar los microdescriptores. Pero al menos este cambio liberará espacio para hacerlo).