- bullseye 0.4.5.10-1~deb11u1
- bullseye-backports 0.4.7.11-1~bpo11+1
- testing 0.4.7.12-1
- unstable 0.4.7.13-1
tor-gencert - Generate certs and keys for Tor directory authorities
tor-gencert [-h|--help] [-v] [-r|--reuse] [--create-identity-key] [-i id_file] [-c cert_file] [-m num] [-a address:port]
tor-gencert generates certificates and private keys for use by Tor directory authorities running the v3 Tor directory protocol, as used by Tor 0.2.0 and later. If you are not running a directory authority, you don’t need to use tor-gencert.
Every directory authority has a long term authority identity key (which is distinct from the identity key it uses as a Tor server); this key should be kept offline in a secure location. It is used to certify shorter-lived signing keys, which are kept online and used by the directory authority to sign votes and consensus documents.
After you use this program to generate a signing key and a certificate, copy those files to the keys subdirectory of your Tor process, and send Tor a SIGHUP signal. DO NOT COPY THE IDENTITY KEY.
-h or --help
-r or --reuse
This probably doesn’t run on Windows. That’s not a big issue, since we don’t really want authorities to be running on Windows anyway.
See also the "dir-spec.txt" file, distributed with Tor.