Basically right now when a dirauth doesn't get the consensus it generated signed, we don't know what kind of consensus that dirauth wanted because it isn't valid (not enough signatures). We could save a copy so we can investigate
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
#4539 (moved) makes authorities write mismatching signatures to disk, it isn't as useful as the consensus, but we might want to fix it in the same release.
Also, I wonder if we want to backport this patch?
(All public non-bridge authorities are on 033 or later.)
Trac: Keywords: tor-dirauth auditability save dump deleted, tor-dirauth auditability save dump 033-backport-maybe 034-backport-maybe added
Note that my hack placement writes out the consensus with one signature on it (our own). I could imagine a different placement of this code that writes out the consensus with as many sigs as we were able to place on it -- wherever it is that we check to see whether there are enough sigs.
I'm also not clear that I've picked the best possible file names. And maybe dir auths want to do this behavior by default, or maybe it should be gated by a torrc option.
write out the consensus with no signatures, as early as possible (in case we crash parsing or signing it)
write out our own signature
write out any signatures we get (good or bad) to a file like the existing v3-status-votes, but for signatures
We should think about how to handle the disk DoS risk for the final file, because anyone can attempt to sign a consensus, and we would put the signature in that file. Maybe we should limit the size of the file?
Is the only patch here armadev's comment? If so, this ticket is not ready for review.
Besides following our github+travis flow, in terms of the code, I think we should try to save more than just one failure. And definitely make the filename clear that it is a failed consensus.