]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
stop checking for clock skew, even for servers.
authorRoger Dingledine <arma@torproject.org>
Mon, 3 Jan 2005 17:10:32 +0000 (17:10 +0000)
committerRoger Dingledine <arma@torproject.org>
Mon, 3 Jan 2005 17:10:32 +0000 (17:10 +0000)
this means we are vulnerable to an attack where somebody recovers
and uses a really old certificate. however, if they do that, they
probably can get our identity key just as easily.

svn:r3241

src/or/connection_or.c

index 3a68fb7873d59183bb4b40009a4959fec619a2d0..3520bd2ffcf6ddc18f77bd55e249fa4186988131 100644 (file)
@@ -391,6 +391,7 @@ connection_tls_finish_handshake(connection_t *conn) {
     log_fn(LOG_WARN, "Identity key not as expected for router claiming to be '%s' (%s:%d) ", nickname, conn->address, conn->port);
     return -1;
   }
+#if 0
   if (router_get_by_digest(digest_rcvd)) {
     /* This is a known router; don't cut it slack with its clock skew. */
     if (tor_tls_check_lifetime(conn->tls, TIGHT_CERT_ALLOW_SKEW)<0) {
@@ -399,6 +400,7 @@ connection_tls_finish_handshake(connection_t *conn) {
       return -1;
     }
   }
+#endif
 
   if (connection_or_nonopen_was_started_here(conn)) {
     /* I initiated this connection. */