TOR-GENCERT(1) | Tor Manual | TOR-GENCERT(1) |
tor-gencert - Generate certs and keys for Tor directory authorities
tor-gencert [-h|--help] [-v] [-r|--reuse] [--create-identity-key] [-i id_file] [-c cert_file] [-m num] [-a address:port]
tor-gencert generates certificates and private keys for use by Tor directory authorities running the v3 Tor directory protocol, as used by Tor 0.2.0 and later. If you are not running a directory authority, you don’t need to use tor-gencert.
Every directory authority has a long term authority identity key (which is distinct from the identity key it uses as a Tor server); this key should be kept offline in a secure location. It is used to certify shorter-lived signing keys, which are kept online and used by the directory authority to sign votes and consensus documents.
After you use this program to generate a signing key and a certificate, copy those files to the keys subdirectory of your Tor process, and send Tor a SIGHUP signal. DO NOT COPY THE IDENTITY KEY.
-v
-h or --help
-r or --reuse
--create-identity-key
-i FILENAME
-s FILENAME
-c FILENAME
-m NUM
--passphrase-fd FILEDES
-a address:port
This probably doesn’t run on Windows. That’s not a big issue, since we don’t really want authorities to be running on Windows anyway.
See also the "dir-spec.txt" file, distributed with Tor.
Roger Dingledine <arma@mit.edu>, Nick Mathewson <nickm@alum.mit.edu>.
Nick Mathewson
08/23/2021 | Tor |