Dear fellow relay operators,
currently, I'm operating a Tor relay (Middle/Guard) and a Tor Bridge.
Offline keys [1],[2] are a good way to secure a Tor relay, but I'm
wondering if there is a standard way or something like a hacking guide
how to store your ed25519_master_id_secret_key[_encrypted] on a
smartcard or hardware token like a Nitrokey or Yubikey? This would even
be more secure than storing it on a "normal" USB device.
Unfortunately I have not found much about this on the internet.
Kind regards
telekobold
[1] How do offline ed25519 identity keys work? What do I need to know? | Tor Project | Support
[2]
OfflineKeys · Wiki · Legacy / Trac · GitLab
···
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
After being encouraged in today's relay operators meetup to follow up on
this: Anyone who has experiences with that?
···
On 21.02.23 13:18, telekobold wrote:
Dear fellow relay operators,
currently, I'm operating a Tor relay (Middle/Guard) and a Tor Bridge.
Offline keys [1],[2] are a good way to secure a Tor relay, but I'm
wondering if there is a standard way or something like a hacking guide
how to store your ed25519_master_id_secret_key[_encrypted] on a
smartcard or hardware token like a Nitrokey or Yubikey? This would even
be more secure than storing it on a "normal" USB device.
Unfortunately I have not found much about this on the internet.
Kind regards
telekobold
[1] How do offline ed25519 identity keys work? What do I need to know? | Tor Project | Support
[2]
OfflineKeys · Wiki · Legacy / Trac · GitLab
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
tor-relays Info Page
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays