tls context not re-initialized when changing relay/bridge state
This means that a Vidalia-controlled Tor will assert when changing from relay to bridge. Unfortunately, restarting Tor does not help this situation at all, the same assert will happen again (I guess Vidalia realizes that Tor hasn't written its configuration and that it should have a different config, so it applies the change again, and Tor crashes again).
The assert is:
[err] assert_identity_keys_ok(): Bug: router.c:154: assert_identity_keys_ok: Assertion 0!=crypto_pk_cmp_keys(client_identitykey, server_identitykey) failed; aborting.
I think what we need to do here is to make sure we re-initialize our tls context whenever we change our public_server_mode().