Commit Graph

3498 Commits

Author SHA1 Message Date
David Goulet
0bacc73d6b Merge branch 'tor-gitlab/mr/83' 2023-01-10 16:17:25 -05:00
David Goulet
773fc92000 Merge branch 'tor-gitlab/mr/75' 2023-01-10 16:17:06 -05:00
Mike Perry
c2e057a7c3 Prop 324: RTT should only be reset after slow start. 2023-01-10 20:53:57 +00:00
David Goulet
e9598b1163 Merge branch 'tor-gitlab/mr/92' 2023-01-10 13:54:30 -05:00
David Goulet
d3904cbe4b Merge branch 'tor-gitlab/mr/93' 2023-01-10 13:53:47 -05:00
David Goulet
93e2f2f574 Merge branch 'tor-gitlab/mr/94' 2023-01-10 13:53:15 -05:00
David Goulet
529cb00617 Merge branch 'tor-gitlab/mr/98' 2023-01-10 13:52:28 -05:00
David Goulet
ad7091d641 Merge branch 'tor-gitlab/mr/99' 2023-01-10 13:49:31 -05:00
Nick Mathewson
578145bf1c New proposal 342: Decoupling hs_interval and SRV lifetime 2023-01-10 08:20:42 -05:00
Nick Mathewson
97f1ffb6b0 Clarify parameters related to hsv3 protocol.
In param-spec, not all of the parameters for onion services had
their ranges and defaults listed; I've added those from the code.

Also I clarified the units for hsdir_interval, which were not
intuitively obvious.
2023-01-09 12:46:17 -05:00
Emil Engler
31c325434e
tor-spec: fix ambitious formulation in VERSIONS
This commit fixes an ambitious formulation within the definition of the
VERSIONS cells. It says, that a VERSIONS cell with an odd number of
bytes is invalid. This statement is not true, because the CircID (2
bytes for VERSIONS cells), Command (1 byte) and Length (2 byte) make up
5 bytes, which is an odd number. Adding an odd number to an even number
of bytes (the payload in this case) always results in an odd number.
2022-12-22 19:31:01 +01:00
Mike Perry
4d950a261f Prop#324: Do not increase cwnd if the window is not full.
- Allow a gap between inflight and cwnd before declaring the cwnd not full.
 - Parameterize how often a cwnd must be full
 - Clean up vegas algorithm for variable scoping and clarity
2022-12-21 21:51:15 +00:00
Nick Mathewson
7116c9cdab rend-spec-v3: mark some sections as obsolete
All supported versions for relays on the Tor network support v3
onion services. As such, we can mark the sections about "how do I
use an 0.2.9.x relay as my intro/rend point?" as obsolete.
2022-12-20 12:52:15 -05:00
Nick Mathewson
c99151cc07 Clarify that revision counter needs to support 64-bit values. 2022-12-20 12:50:28 -05:00
Nick Mathewson
e66dd71fac Clarify that SRV is 256 bits. 2022-12-20 12:49:25 -05:00
David Goulet
372730940f prop329: Remove unused section and use relay command 19..22
As per review from nickm in
https://gitlab.torproject.org/tpo/core/torspec/-/merge_requests/95

Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-15 11:17:03 -05:00
Mike Perry
343f1d7419 prop329: Clarifications to SWITCH and other notes 2022-12-14 12:11:33 -05:00
David Goulet
fcfeec2351 prop329: Changes after research and discussions
Series of change after discussin with mikeperry the proposal in depth.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-09 15:45:38 -05:00
David Goulet
1db24dddbf prop329: Remove a whole lot of white spaces
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-28 09:19:46 -05:00
Nick Mathewson
28d1f6379e Document the extra NL that sometimes comes with a descriptor
This NL isn't so easy to remove in Tor, since some older
control-port code depends on it IIRC.  But not having documented it
caused arti#637: let's explain that, so that the next unfortunate
implementor doesn't hit it.
2022-11-15 17:16:56 -05:00
Ian Jackson
bf877ec998 dir-spec: Expect authority.z to always be available
And discuss the places where it is used.
2022-10-31 14:24:23 +00:00
Emil Engler
a2c7812e60
tor-spec: Fix line exceeding 80 characters
This commit inserts a line break in order to fix the only line exceeding
80 characters in this document.
2022-10-24 11:36:21 +02:00
Roger Dingledine
5642732fc0 Authorities shouldn't get Measured= keyword
Corresponds to the bugfixes for bugs 40698 and 40700.

Also, document our MeasuredButAuthority= keyword that we include instead
(but that nothing uses).
2022-10-24 04:46:09 -04:00
Roger Dingledine
78a1722164 fix typo in proposal 291 2022-10-24 04:38:36 -04:00
Alexander Færøy
e5cd03e38e Merge remote-tracking branch 'nickm/xon_xoff_edgecases' 2022-10-13 13:54:55 +00:00
juga0
4b783222a5 bandwidth-file: Remove trailing = defining Keys
since some of them didn't have it, other Tor specs don't have them and
a KeyValue is already defined with an `=` as the separator between the
Key and the Value.
2022-10-13 13:46:17 +00:00
juga0
f4411d3fb4 bandwidth-file: Add XOFF KeyValues to RelayLines
to show the number of times a relay receives these events while being
measured and diagnose bottlenecks at bwauths.

Closes #169.
2022-10-13 13:46:17 +00:00
David Goulet
854cf535ca tor-spec: TRUNCATED cell are not sent anymore
In addition, this commit also changes the spec so no destroy reasons
(error code) are propagated down or up the circuit in order to mitigate
potential side channel risks.

See https://gitlab.torproject.org/tpo/core/tor/-/issues/40649 for more
details on why.

Related to tor/#40623

Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-18 09:13:14 -04:00
Nick Mathewson
05b9bacc4c xon/xoff: specify behavior on weird values. 2022-08-15 11:22:36 -04:00
Nick Mathewson
79da008392 Specify the actual relay cmd values for XON and XOFF.
As far as I can tell, we had not previously said that 43 was "XON"
and 44 was "XOFF".
2022-08-11 10:40:53 -04:00
Mike Perry
cb4ae84a20 Prop 324: Reduce the number of vegas parameters
Also update their defaults.
2022-08-11 09:19:17 -04:00
Mike Perry
d339bb9fab Prop 324: Describe how to reset RTT if cc_cwnd_min is hit. 2022-08-11 09:19:17 -04:00
Mike Perry
07c731e836 Prop 324: Document new cc_ewma_ss consensus parameter. 2022-08-11 09:19:17 -04:00
Mike Perry
7c186cf1e5 Prop 324: Describe RFC3742 Limited Slow Start 2022-08-11 09:19:17 -04:00
eta
aab9efe13b prop#324: mention rearranged form for N_EWMA smoothing
The formula used for N_EWMA is actually rearranged in the C tor
implementation, in a way that caused the arti reimplementation to be off
by a small rounding error until it was corrected.

In order to ensure other implementations don't have this issue, mention
the rearranged form and add a requirement that it be used.

(background:
https://gitlab.torproject.org/tpo/core/arti/-/merge_requests/525#note_2807244)
2022-08-08 13:16:36 +01:00
Roger Dingledine
b5e2002983 fix some easy typos in proposals 2022-07-27 01:25:09 -04:00
Nick Mathewson
6f9ec72e27 Add proposal 341-better-oos.md 2022-07-25 15:04:42 -04:00
Nick Mathewson
833d6b27a4 Merge remote-tracking branch 'tor-gitlab/mr/78' 2022-07-12 12:55:31 -04:00
Nick Mathewson
d4876062cc Merge remote-tracking branch 'tor-gitlab/mr/77' 2022-07-12 12:54:59 -04:00
Georg Koppen
09d74eec67
Fix typos
Closes: #164
2022-07-12 10:01:09 +00:00
Nick Mathewson
1db6116650 Fix typo 2022-07-08 17:08:40 +00:00
Nick Mathewson
831639e080 Describe behavior on authority certs from the past or future. 2022-07-08 11:11:55 -04:00
Ian Jackson
e2f59b2e26 specify how to reenable padding
Arti has a "dormant mode" which means that it might need to reenable
channel padding after hving disabled it.

How to do this, paarticularly in the face of possibly changing
consensus parameters, is an edge case.
2022-07-08 12:52:47 +01:00
David Goulet
bb7eba9b76 prop327: Change cell extension type value
Congestion control is 0x01 at this moment.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-29 12:04:21 -04:00
David Goulet
d943f8a338 prop327: Missing field due to typo
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-29 10:22:06 -04:00
Mike Perry
dabadcc9d6 Update Prop#324 clock heuristic spec for bug 40626. 2022-06-21 20:26:37 +00:00
Nick Mathewson
a5a8899898 Merge remote-tracking branch 'tor-gitlab/mr/72' 2022-06-10 10:21:27 -04:00
David Goulet
e787831689 prop339: Unify the address format into one object
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-07 09:47:07 -04:00
Roger Dingledine
b29e64e561 proof-reading on prop 266 2022-06-06 23:47:18 -04:00
Roger Dingledine
f9e386e426 fix a trivial typo 2022-06-06 23:46:53 -04:00