teor
34fb76cd5f
Prop 312: Add s7r as an author
...
Part of 33073.
2020-02-05 22:06:33 +10:00
teor
da1b248e2e
Prop 312: Add State Management
...
Document tor's current address detection state management, and our
new state management for IPv4 and IPv6 address detection.
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:06:30 +10:00
teor
492549864e
Prop 312: Add libevent DNS API
...
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:06:00 +10:00
teor
1f9f3986d1
Prop 312: Add Ignore Addresses on Inbound Conns
...
Add an optional change.
Part of 33073.
2020-02-05 22:05:53 +10:00
teor
13e8c8c231
Prop 312: Define an IPv6 sybil block
...
As suggested by Nick Mathewson and s7r.
Part of 33073.
2020-02-05 22:05:31 +10:00
teor
89e7222f65
Prop 312: Require explicit authority addresses
...
Only use explicit IPv4 and IPv6 address literals, configured in Address
or ORPort lines, for directory authority addresses.
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:05:07 +10:00
teor
55d3beb6c2
Prop 312: Make bridge changes clearer
...
Part of 33073.
2020-02-05 22:05:00 +10:00
teor
e1815226f1
Prop 312: Avoid some address detection state
...
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:04:47 +10:00
teor
043ac7d7aa
Prop 312: Rewrite authenticated address detection
...
All these changes are optional in the proposal:
* Add the NETINFO cell address detection method
(as suggested by Nick Mathewson)
* Defer decisions about ignoring some addresses, or using those
addresses as the lowest priority method
* Simplify the load-balancing design
Part of 33073.
2020-02-05 22:04:10 +10:00
teor
7269d17c6f
Prop 312: Improve AddressDisableIPv6
...
Explain why we might need to turn IPv6 address detection off.
Part of 33073.
2020-02-05 22:04:04 +10:00
teor
6e7d4abd1f
Prop 312: Use Authority IPs for the Socket Method
...
Add an optional section, where we propose using a directory authority
IPv4 and IPv6 address for socket-based local interface address
detection.
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:03:50 +10:00
teor
f090a2233c
Prop 312: Explain address resolution using sockets
...
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:03:33 +10:00
teor
fd4716f1ce
Prop 312: Improve interface address method
...
Explain why some relays may not have any publicly routable interface
addresses.
Part of 33073.
2020-02-05 22:03:26 +10:00
teor
0159850437
Prop 312: Remove the DirPort method
...
It's unlikely to be useful for most configurations.
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:03:12 +10:00
teor
f12ddad6bf
Prop 312: Explain how to choose addresses
...
Explain how we choose between multiple addresses, in a list, and over
time.
Part of 33073.
2020-02-05 22:03:05 +10:00
teor
7a55bf1662
Prop 312: Explain why untrusted addresses are bad
...
And describe a potential attack that gives a relay the wrong address,
then monitors its traffic.
As suggested by Nick Mathewson.
Part of 33073.
2020-02-05 22:02:52 +10:00
teor
8a9ea6f224
Prop 312: Explain public IPv6 addresses
...
Since relays put the discovered IPv6 address in their descriptor,
it needs to be publicly routable. (If the relay is on the public
network.)
As suggested by Nick Mathewson.
Also fix inconsistent use of directory authority, directory server,
and directory mirror.
Part of 33073.
2020-02-05 22:02:33 +10:00
teor
66d08ba358
Prop 312: Add an early extends section
...
Add an optional change to support clients extending as soon as
possible, after a relay restarts.
Part of 33073.
2020-02-05 22:02:26 +10:00
teor
534114e2c3
Prop 312: Improve auto IPv6 ORPort section
...
Add information about binding to IPv4 and IPv6.
Also do a slight reformat.
Part of 33073.
2020-02-05 22:02:22 +10:00
teor
77da452bd6
Prop 312: Fix a heading
...
Part of 33073.
2020-02-05 22:02:18 +10:00
teor
8902ece4fe
Prop 312: Add info on IPv6 address privacy
...
And why it shouldn't affect tor relays, at least with the default
settings.
As suggested by s7r.
Part of 33073.
2020-02-05 22:02:03 +10:00
teor
615ebe5fd4
Prop 312: Explain default outbound address better
...
Part of 33073.
2020-02-05 22:01:57 +10:00
teor
0e20e5a067
Prop 312: Add an alternative IPv6 disable design
...
And explain why we didn't use the existing ORPort IPv4Only flag to
disable IPv6 address resolution.
Part of 33073.
2020-02-05 22:01:54 +10:00
teor
f1af76a78a
Prop 312: Explain private address handling better
...
Part of 33073
2020-02-05 22:01:48 +10:00
teor
0cafa9dfba
Prop 312: Reformat references
...
Part of 33073.
2020-02-05 22:01:45 +10:00
teor
ef7838eab2
Prop 312: Relay Auto IPv6 Addreess - Initial Draft
...
Related tickets: 33073 (proposal), 5940 (implementation).
2020-02-05 22:01:25 +10:00
teor
5e79a7dd21
Prop 311: Allow for auto-configured IPv6 ORPorts
...
Part of 24404.
2020-02-05 21:52:58 +10:00
teor
f7fb789de4
Prop 311: Rewrite and re-order tor-spec changes
...
We want to allow relays to upgrade to trying both addresses in an
EXTEND2 cell, without requiring a new protocol version.
The spec documents the planned "choose at random" behaviour, but
allows relays to try both IPv4 and IPv6 in future.
Part of 24404.
2020-02-05 21:52:55 +10:00
teor
cdc5a152aa
Prop 311: Reformat references
...
Part of 24404.
2020-02-05 21:52:52 +10:00
teor
6eee2ca426
Prop 311: Avoid depending on exact extend details
...
We don't want to depend on extends preferring IPv4 or IPv6,
or the exact extend implementation, if we don't have to.
Part of 24404.
2020-02-05 21:52:49 +10:00
teor
14906a6fd9
Prop 311: Clarify "may not"
...
Part of 24404.
2020-02-05 21:52:46 +10:00
teor
8e85047b65
Prop 311: Improve Subprotocol Version
...
* don't ban useful behaviours, just mention that they might not happen
* don't talk about reachability, other tor instances don't care
* specify random choice between IPv4 and IPv6 (and add a TODO)
As suggested by Nick Mathewson.
Part of 24404.
2020-02-05 21:52:42 +10:00
teor
5c0aa29f81
Prop 311: Improve RelaySendIPv6Extends option name
...
As suggested by Nick Mathewson.
Part of 24404.
2020-02-05 21:52:39 +10:00
teor
a3e2f6cd61
Prop 311: Improve Extra Reachability Checks
...
And add extra logging when tor would have previously found itself
reachable, but the new checks fail.
As suggested by Nick Mathewson.
Part of 24404.
2020-02-05 21:52:36 +10:00
teor
27936d046e
Prop 311: Allow Extends to Prefer IPv4 or IPv6
...
Add an alternate design, suggested by Nick Mathewson.
Part of 24404.
2020-02-05 21:52:33 +10:00
teor
b6a75a8a14
Prop 311: Add IPv6 ORPort to Extend Conditions
...
As suggested by Nick Mathewson.
Part of 24404.
2020-02-05 21:52:30 +10:00
teor
9966ad3f3f
Prop 311: Support seamless upgrades
...
We want to support these two cases:
* upgrade to working IPv6,
* stay on IPv4-only, if a guessed IPv6 address isn't reachable.
Part of 24404.
2020-02-05 21:52:27 +10:00
teor
3c19e051a6
Prop 311: Make capitalisation consistent
...
Part of 24404.
2020-02-05 21:52:15 +10:00
teor
64745746f4
Prop 311: Make bridge mentions consistent
...
Part of 24404.
2020-02-05 21:52:09 +10:00
teor
7f8a655017
Prop 311: Fix a typo in section 5
...
Part of 24404.
2020-02-05 21:52:06 +10:00
teor
e5aa0b3411
Prop 311: Include heartbeat logs in monitoring
...
Some of the statistics may also be available in relay heartbeat logs.
Part of 24404.
2020-02-05 21:52:03 +10:00
teor
f67267bc53
Prop 311: Clarify prop 306 references
...
Improve the explanations of some of the references to proposal 306:
Client Auto IPv6 Connection. And add a section that specifically
mentions modifying that proposal.
Part of 24404.
2020-02-05 21:52:00 +10:00
teor
d175e08706
Prop 311: Add exception for recent tor changes
...
Some IPv6 behaviour has changed in recent tor versions, as noted in the
proposal.
Part of 24404.
2020-02-05 21:51:57 +10:00
teor
0348668dec
Prop 311: Explain Directory Authority behaviour
...
Where it's different from relay behaviour.
Part of ticket 24404.
2020-02-05 21:51:53 +10:00
teor
a65f689482
Prop 311: Use shorter file names for future proposals
...
And use short proposal names in references.
Part of 24404.
2020-02-05 21:51:22 +10:00
teor
d719ac4022
Prop 311: IPv6 ORPort Reachability - Initial Draft
...
Related tickets: 24404 (proposal), 24403 (implementation).
2020-01-24 16:13:01 +10:00
teor
8f094d7485
prop 309: Fix trailing space
2020-01-22 14:13:37 +10:00
teor
ff165e0f44
Merge remote-tracking branch 'tor-github/pr/102'
2020-01-15 22:50:10 +10:00
teor
e27cbca306
Prop 306: Restore some statistics from an earlier draft
...
These statistics are optional, but they may be useful:
* client and relay connections
* statistics in the heartbeat logs
Also improve the explanation of the "extra prop 306 connections"
statistic.
Part of 29801.
2020-01-15 22:44:36 +10:00
teor
21aaad10e6
Prop 306: Add a bootstrap changes section
...
Clients need to change how they select fallback directory mirrors
during bootstrap, or some IPv6-only clients will fail to bootstrap.
Part of 29801.
2020-01-15 22:44:32 +10:00
teor
f5c6f61cc9
Prop 306: Improve load-balancing for NumIPv6Guards
...
The previous design would have doubled the load on IPv6-supporting
relays.
Part of 29801.
2020-01-15 22:44:29 +10:00
teor
6664ed79ed
Prop 306: Add an optional ClientPreferIPv6ORPort consensus parameter
...
Part of 29801.
2020-01-15 22:44:23 +10:00
teor
ed8452b9e8
Prop 306: Improve ConnectionAttemptDelay design
...
Have a single ConnectionAttemptDelay option, with a default value
of 250 msec based on RFC 8305.
Part of 29801.
2020-01-15 22:44:19 +10:00
teor
a78e23a053
Prop 306: Minor fixes and tidying up
...
* modify design to match Tor's typical design patterns
* add some missing info and special cases
* improve formatting and consistency
* fix some typos
Part of 29801.
2020-01-15 22:44:15 +10:00
Neel Chauhan
84c2af5931
Prop306: Add revisions suggested in Torspec PR #87
2020-01-15 22:44:12 +10:00
Roger Dingledine
54346bf40f
fix line endings on prop 307
...
(whoever committed it, committed it with a bonus ^M on each line)
2019-12-13 15:44:44 -05:00
Roger Dingledine
a51495cdd7
add nsf acks to four proposals
2019-12-13 15:44:01 -05:00
David Goulet
2bdcf78835
prop305: Close it
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-26 15:11:53 -05:00
Nick Mathewson
42339301d4
Add proposal 310 from Florentin Rochet, Aaron Johnson et al
2019-11-25 12:00:37 -05:00
Nick Mathewson
666ca5ebf3
fixup! reindex.py: convert to python3
2019-11-25 12:00:27 -05:00
Nick Mathewson
7b8c6efbbe
Prop 121: convert to utf-8
2019-11-25 11:59:50 -05:00
Nick Mathewson
f370c4abc0
reindex.py: convert to python3
2019-11-25 11:59:38 -05:00
David Goulet
7c222131ba
prop304: Close proposal now merged into our main specs
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-20 09:36:42 -05:00
Jean Paul Degabriele
5bd5f82e3d
Fixed typos pointed out in Tomer's email.
2019-10-24 09:21:50 +02:00
Nick Mathewson
581b45d652
proposal 309: Optimistic SOCKS Data
2019-10-02 13:40:35 -04:00
Nick Mathewson
3b41712498
Merge remote-tracking branch 'mikeperry-github/hs-padding-spec'
2019-09-19 15:30:02 -04:00
Nick Mathewson
317d09bf14
Add Counter Galois Onion as proposal 308
2019-09-14 20:19:28 -04:00
Nick Mathewson
09611eaf46
Add proposal 307 (onionbalance for v3 onion services)
2019-09-06 08:02:46 -04:00
Nick Mathewson
013e51649f
Add proposal 306 to the index
2019-09-06 08:00:27 -04:00
Nick Mathewson
2e89f93aee
Merge branch 'prop306_squashed'
2019-09-06 08:00:09 -04:00
Neel Chauhan
a4c0cd1a4f
Add Proposal 306: A Tor Implementation of IPv6 Happy Eyeballs
2019-09-06 08:00:02 -04:00
Mike Perry
a7e52fc35d
Update padding-spec.txt to cover hs circuit padding.
...
Also update padding proposals that are deprecated by padding-spec.txt,
to refer the reader to the new spec.
2019-08-14 19:07:59 -05:00
Nick Mathewson
dc3683f929
update to latest version as of 11 July
2019-08-06 13:58:28 -04:00
David Goulet
4707f3604c
prop305: Fix typo
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-25 10:48:31 -04:00
David Goulet
ca1dea9b8a
prop305: Initial import of proposal 305
...
Hidden service denial of service defenses parameters within the
ESTABLISH_INTRO cell.
Closes #30790
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-19 13:35:39 -04:00
David Goulet
43c8b456af
prop304: Run reindex to really make it Accepted
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-06 11:34:20 -04:00
George Kadianakis
3ecd4eb46d
Change status of proposal 304 to Accepted.
2019-06-06 14:28:21 +03:00
David Goulet
767df0b55a
prop304: Initial import for new SOCKS5 error code
...
Part of #30382
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-06 14:26:34 +03:00
David Goulet
d58b7d180e
prop289: Close it
...
It is not fully implemented and previous commit merges the relevant sections
into tor-spec.txt and dir-spec.txt.
I've also added "David Goulet" as a author since lots of it has changed from
my work since the creation of the proposal.
Part of #30365
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-31 15:11:53 -04:00
David Goulet
4fc32990cf
tor-spec: Add authenticated SENDMEs
...
This merges proposal 289 into tor-spec.txt.
Most of the circuit-level flow control section has been rewritten to be
clearer and better detail version 0 and 1.
Closes #30365
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-31 15:11:37 -04:00
David Goulet
4c63907c92
prop303: Run reindex.py to index it
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-22 14:46:43 -04:00
Nick Mathewson
40065b9894
Merge remote-tracking branch 'dgoulet/ticket30557_01'
2019-05-21 12:14:00 -04:00
David Goulet
33cc0fef51
prop289: Simplify and clarify deployment plan
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-21 11:27:51 -04:00
Nick Mathewson
f171ccb1d7
add prop303 for making protovers required
2019-05-21 11:12:54 -04:00
Nick Mathewson
9503a26102
add 302-padding-machines-for-onion-clients.txt
2019-05-16 09:45:15 -04:00
Roger Dingledine
0b9fbb893c
fix a few typos
2019-05-15 18:40:01 -04:00
Nick Mathewson
ddcc8f9551
Merge remote-tracking branch 'tor-github/pr/78'
2019-05-13 14:35:55 -04:00
George Kadianakis
e1ad77e2a1
Merge remote-tracking branch 'dgoulet/ticket26288_01'
2019-05-02 18:19:33 +03:00
Mike Perry
a1935efba2
Bug 30173+29203: Document reduced+disabled padding consensus params
2019-04-18 19:27:31 +00:00
Nick Mathewson
f55b53713e
Accept proposal 301
2019-03-20 08:06:13 -04:00
Alexander Færøy
300d66200e
Proposal 301: Don't include package fingerprints in consensus documents
2019-03-13 15:53:56 +01:00
David Goulet
b4dbcf0011
fixup! prop289: Spec out the new SENDME cell payload
2019-03-07 11:03:29 -05:00
Neel Chauhan
60405bca0b
Add section "Options To Enable The Failure Counter"
2019-03-06 18:04:38 -05:00
Neel Chauhan
9a4380f2c9
Add updated version of proposal 299
2019-03-06 16:45:04 -05:00
Nick Mathewson
8edd7803d9
New version of Proposal 295 from Tomer Ashur, Orr Dunkelman, and Atul Luykx
2019-03-01 11:58:25 -05:00
David Goulet
81ec28177b
prop289: Rewrite the Deployment Plan section
...
Split it into subsection for clarity. Add a new subsection describing the
addition of a new protover value.
This patch removes a paragraph that states the obvious with "We'll need to
do a bunch of testing". It is nice but also huge part of our development
work flow so no need for it in the proposal.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-03-01 11:23:24 -05:00
David Goulet
5ac8a2bbd1
prop289: Add the new consensus params
...
Spec out the new consensus parameters in the proposal.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-02-25 15:03:31 -05:00
David Goulet
0713f2b4cb
prop289: Spec out the new SENDME cell payload
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-02-25 15:03:31 -05:00
Nick Mathewson
8e71376161
Merge remote-tracking branch 'tor-github/pr/25'
2019-02-25 13:35:41 -05:00
Nick Mathewson
43e34fa4ff
Proposal 300: Walking Onions
2019-02-05 11:46:45 -05:00
Nick Mathewson
87bc2f172d
Convert prop299 to unix line-endings
2019-02-05 07:10:23 -05:00
Nick Mathewson
6f3d59072b
Set prop299 status to open
2019-02-05 07:09:55 -05:00
Nick Mathewson
5c19f4d1ca
Add proposal 299 from Neel Chauhan
2019-01-28 11:31:47 +01:00
Nick Mathewson
e1cb6341f9
Merge remote-tracking branch 'asn-github/bug28142'
2019-01-15 12:24:20 -05:00
Roger Dingledine
fe3930dccd
add nsf ack to prop 249
2018-12-21 02:14:58 -05:00
Nick Mathewson
18fcb9ab42
Mark proposal 297-safer-protocol-shutdowns.txt as implemented ( #27735 )
2018-12-11 09:52:35 -05:00
George Kadianakis
09814d9109
Specify probability distribution mode.
2018-12-10 18:46:33 +02:00
Nick Mathewson
54c3a5f09d
Close and merge prop298
2018-12-05 09:44:12 -05:00
Nick Mathewson
d14164d8b9
Merge prop293 and mark it closed.
2018-12-05 09:28:00 -05:00
Nick Mathewson
9d8c044057
Merge remote-tracking branch 'tor-github/pr/41'
2018-11-06 15:25:52 -05:00
Mike Perry
98e6c66374
Prop #254 : The infinity bin is also special.
2018-11-06 01:25:45 +00:00
Mike Perry
470bde64e6
Prop #254 : Clarify special cases for bin 0 and inf bin-1.
2018-11-06 01:23:10 +00:00
Mike Perry
a66d8a650f
Prop #254 : Use range_usec instead of range_sec.
2018-11-06 01:20:32 +00:00
Mike Perry
acd4a89c1c
Prop 254: Describe token generation more clearly
...
I hope...
2018-11-05 23:17:14 +00:00
Mike Perry
1dd7f1ff78
Proposal 254 updates from asn's review.
2018-11-05 19:45:05 +00:00
Nick Mathewson
a315eed530
Proposal 298: canonicalize family lines
2018-10-31 10:48:59 -04:00
George Kadianakis
ab37543cfb
Clarify prop#254 in some parts.
...
Also kill some trailing whitespace.
2018-10-30 18:05:07 +02:00
Mike Perry
a697137e91
fixup! Update Proposal #254 with latest circuit padding plans.
...
Update padding consensus param limits.
2018-10-29 21:20:16 +00:00
Mike Perry
3fed83a38d
Update Proposal #254 with latest circuit padding plans.
2018-10-29 19:45:58 +00:00
Roger Dingledine
8cf90bb7bf
stick an nsf funder ack on proposal 289
2018-09-26 23:51:22 -04:00
Nick Mathewson
bd6733234b
Add proposal for making protover shutdown logic safer
2018-09-19 12:19:44 -04:00
Roger Dingledine
43c2a65a28
add nsf ack's to prop 291 too
2018-08-22 23:28:31 -04:00
Roger Dingledine
4ff93b8792
add nsf funder acknowledgement to two proposals
2018-08-22 22:39:38 -04:00
Roger Dingledine
8e2035bfcd
simplify confusing sentence
2018-08-22 22:36:26 -04:00
Roger Dingledine
c95c1bb1ed
fix a typo twice
2018-08-06 15:54:27 -04:00
Nick Mathewson
c0b2dc9f17
Call it prop296
2018-07-17 08:46:18 -04:00
Nick Mathewson
b3abfdffee
Merge remote-tracking branch 'teor/ticket21377-squashed'
2018-07-17 08:45:48 -04:00
Roger Dingledine
d31c33c95f
one more typo
2018-07-16 23:42:35 -04:00
Roger Dingledine
6f0112693e
three tiny fixes to prop#293
2018-07-16 13:39:52 -04:00
teor
d29d9ada0b
bandwidth: edit bandwidth URL dir-spec and proposal
...
* dir-spec: don't post bandwidth files to other authorities
* dir-spec: add URL for current bandwidth file
* dir-spec: clean up the consensus and vote "current" publication schedule
Closes ticket #21377 .
2018-07-16 10:26:18 +10:00
juga0
96145da5e2
Edit bandwidth file URL proposal
...
* Correct URL with the one in the dir-spec
* Replace bwauth vote/raw file by bandwidth list file
* Update compatibility, the format has a spec
2018-07-16 10:25:19 +10:00
juga0
58d3cb9cc2
Have Directory Authorities expose bandwidth files
...
Proposal sent to tor-dev maling list by Tom Ritter.
(https://lists.torproject.org/pipermail/tor-dev/2017-December/012677.html )
2018-07-16 10:25:02 +10:00
sergeyfrolov
d05176bb4a
Fix port in USERADDR example
2018-07-13 17:56:03 -04:00
Nick Mathewson
d6b2bcb5b2
Authorship update for prop295
2018-07-13 17:05:41 -04:00
Nick Mathewson
c590145e6d
Correct a point in proposal 288.
...
Previously our design had called for considering a SHAKE output B
bits at a time, but bitwise slicing is a pain. Instead, consider
the output 64 bits at a time, mask off the high bits, and discard
values that lie outside the prime field. Since P is very close to
2^B, nearly all values should be okay.
2018-07-10 19:58:36 -04:00
Nick Mathewson
09220cc5b7
Replace proposal 295 with the right version :/
2018-07-04 16:41:58 -04:00
Nick Mathewson
b0d5698c49
Add proposal 295 from Tomer Ashur.
2018-07-03 17:38:26 -04:00
teor
436bb12554
Rewrite the UTF-8 specification in prop#285 so it is more specific
...
Use terminology from The Unicode Standard.
Ban byte-swapped byte order marks.
Add references to The Unicode Standard.
2018-06-22 10:04:42 +10:00
David Goulet
419ba0c307
porp289: Put it back in Open status. No need for needs-revision
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-06-03 15:31:42 -07:00
Nick Mathewson
d6ce1851e8
Mark more items as accepted/needs-rev
2018-06-03 11:43:16 -07:00
Nick Mathewson
abb0dc909d
One more reindex
2018-06-03 11:34:09 -07:00
Nick Mathewson
3660c6d11a
Mark 255 as reserve: nice idea, worth doing.
2018-06-03 11:33:45 -07:00
Nick Mathewson
95e8d34f0f
Another round of status changes
2018-06-03 11:30:35 -07:00
Nick Mathewson
005a92b40d
Regenerate index once more.
2018-06-03 11:27:52 -07:00
Nick Mathewson
6d601e837d
226 is not happening soon.
2018-06-03 11:27:41 -07:00
Nick Mathewson
7967797a02
PQ status update
2018-06-03 11:27:32 -07:00
Nick Mathewson
c083575ceb
Regenerate index once more.
2018-06-03 11:23:29 -07:00
Nick Mathewson
c280ee707d
Mark 292 as accepted.
2018-06-03 11:23:17 -07:00
Nick Mathewson
89edd9d865
Mark 290 as meta
2018-06-03 11:23:04 -07:00
Nick Mathewson
664dd40a58
Mark 286 as accepted
2018-06-03 11:22:06 -07:00
Nick Mathewson
76b32e7a9f
Add 242 as reserve. It is an okay idea but it is not going on the roadmap soon
2018-06-03 11:21:10 -07:00
Nick Mathewson
88830f4f2f
Mark 234 as rejected.
2018-06-03 11:20:53 -07:00
Nick Mathewson
2a9578d459
Mark 233 as rejected: we are not developing tor2web mode
2018-06-03 11:20:02 -07:00
Nick Mathewson
02f91927b4
Mark prop229 as rejected
...
These extensions are cool, but if anybody needs them it's better for
them to use HTTP CONNECT.
2018-06-03 11:19:13 -07:00
Nick Mathewson
63c11929b8
Mark three proposals as no longer open because of RC status
2018-06-03 11:18:30 -07:00
Nick Mathewson
9284489c34
192 is obsoleted by new guard design
2018-06-03 11:17:00 -07:00
Nick Mathewson
80d84560fe
Mark 189 and 191 as obsoleted by pluggable transports
2018-06-03 11:16:30 -07:00
Nick Mathewson
648d4348ec
Mark prop177 and prop256 as reserve: maybe smart, but not roadmapping these.
2018-06-03 11:15:43 -07:00
Nick Mathewson
efc5e517ed
Mark 182 as obsolete because of different bucket refill logic
2018-06-03 11:15:12 -07:00
Nick Mathewson
e64d1e86b0
Reindex.
2018-06-03 11:13:57 -07:00
Nick Mathewson
3161e90237
Obsolete/reject 164 and 165
2018-06-03 11:13:24 -07:00
Nick Mathewson
4967c958c8
Mark 246 as rejected; we don't want to consolidate these.
2018-06-03 11:11:48 -07:00
Nick Mathewson
3fc694dacf
Mark 190 as obsoleted by PTs
2018-06-03 11:10:16 -07:00
Nick Mathewson
13621de747
Mark 168 as Rejected
...
Roger says that they ran experiments and found that it didn't work
as well as they hoped.
2018-06-03 11:09:12 -07:00
Nick Mathewson
176d7fbb4b
Mark prop288 as accepted
2018-06-03 11:08:53 -07:00
Nick Mathewson
433cfc01e6
Mark 253 as dead per author's comments.
2018-06-03 11:08:01 -07:00
Nick Mathewson
6fd4a50cb1
Mark prop230 and prop231 as obsolted by Ed keys and superseded.
2018-06-03 11:07:01 -07:00
Nick Mathewson
6e64dbcbdd
Proposal 203 is obsoleted by pluggable transports.
2018-06-03 11:05:50 -07:00
Nick Mathewson
3b296bd342
Mark 195 as dead: The unimplemented parts will not happen.
2018-06-03 11:04:50 -07:00
Isis Lovecruft
14cd5da191
Add work-in-progress TLS 1.3 proposal as a draft with number 294.
2018-06-01 22:07:55 +00:00
Isis Lovecruft
bbd9567db9
Merge branch 'tls13'
2018-06-01 22:02:02 +00:00
Nick Mathewson
a323d84e7c
Add a new proposal to help us move forward with 275.
2018-05-30 17:19:54 -07:00
George Kadianakis
f6e93d9751
Minor fixup now that a number has been assigned to vanguard proposal.
2018-05-28 13:03:33 +03:00
Nick Mathewson
e541f2afe5
mesh vanguards is now prop292
2018-05-27 09:59:24 -04:00
George Kadianakis
5bf8980bb8
Supersede proposal 247 by xxx-mesh-vanguards.txt.
...
We need to update the xxx part when we give a number to the new proposal.
2018-05-24 12:40:01 +03:00
Mike Perry
d4aaf28eb3
Write a proposal for the mesh vanguards design.
2018-05-24 12:39:57 +03:00
Mike Perry
d0bbdb3ccb
Prop 247: Some notes from mailinglist discussion
2018-05-24 12:39:37 +03:00
Mike Perry
a19d0bf1f0
Prop 265: Add nodes from mailinglist discussion.
2018-05-24 12:39:29 +03:00
Roger Dingledine
13b598f2e5
reflow to call 251 really done
2018-04-18 15:43:07 -04:00
Roger Dingledine
4b93747f86
normalize lack of period at end of title
2018-04-18 15:41:57 -04:00
Roger Dingledine
3260c2225e
declare prop#251 closed
2018-04-18 15:38:49 -04:00
Roger Dingledine
066c24c46d
fix some sort of weird encoding mistake
2018-04-18 03:19:03 -04:00
David Goulet
f7fa4b925b
prop291: Change MOAR to MORE
...
Some of us understands that "MOAR" is a funny word that means MORE++ but
unfortunately, not everyone can get that reference especially when you don't
speak English as your first language.
Closes #25758
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-04-16 11:12:52 -04:00
David Goulet
5e2e04eb97
prop291: dos2unix the file so we get a Unix format
...
No change, just removes the annoying ^M at the end of each line.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-04-16 11:12:06 -04:00
Nick Mathewson
815a7108eb
291: The move to two guard nodes
2018-04-03 14:30:03 -04:00
Roger Dingledine
e2145ba69c
fix typo
2018-04-02 00:24:46 -04:00
Roger Dingledine
79e61857d5
remove caesura in proposal name
...
we can be poetic in other epochs
2018-03-03 01:49:53 -05:00
Roger Dingledine
ba05c9a935
fix typos in proposal 290
2018-03-03 01:48:33 -05:00
Nick Mathewson
c45e0778ad
Add prop290: Continuously update consensus methods
2018-02-21 12:02:04 -05:00
Nick Mathewson
39fde37cfa
Add proposal 289: Authenticating sendme cells to mitigate bandwidth attacks
2018-02-13 08:39:00 -05:00
Nick Mathewson
6a649ca3f3
Merge branch 'document_prop278'
2018-02-09 08:38:25 -05:00
David Goulet
6bd0a699a0
control: Merge prop284 into control-spec.txt
...
The proposal 284 is now effectively Closed.
Closes #24847
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-01-31 14:55:28 -05:00
Nick Mathewson
1cb56afdc1
Merge prop278 (compression) into dir-spec.
2018-01-24 12:48:12 -05:00
Isis Lovecruft
fc561d2bb5
WIP Migration to TLS 1.3 proposal.
2018-01-23 00:51:09 +00:00
Nick Mathewson
8bc8bf05bb
Clarify 285 further.
2018-01-09 12:33:13 -05:00
Nick Mathewson
414df99cfa
Mark prop249 as accepted
2018-01-09 11:55:11 -05:00
Nick Mathewson
a76eaa606b
reindex
2018-01-02 09:30:01 -05:00
teor
6ac960d451
Update prop#283's Status to Accepted, and add Implemented-In and Ticket
...
The code that implements prop#283 has been merged to master
(0.3.3.0-alpha-dev).
There is a small amount of cleanup code in #23975 and #24573 that still
needs to be merged. It addresses some correctness and efficiency issues.
Closes #24778 .
2018-01-02 13:07:27 +11:00
Isis Lovecruft
5fe5456988
prop#249: Add myself as an author so I get blamed for anything dumb.
2017-12-14 01:24:17 +00:00
Isis Lovecruft
c119bd7800
prop#249: Add section on new consensus parameters.
2017-12-14 01:23:52 +00:00
Isis Lovecruft
3578da4f1f
prop#249: Add section on updates to required/recommended subprotocols.
2017-12-14 01:23:16 +00:00
Isis Lovecruft
5c0962b76f
prop#249: Add detail on padding the number of bytes in each direction.
2017-12-14 01:22:31 +00:00
Isis Lovecruft
7af62db0b0
prop#249: Add link specifiers and a section on new subprotocol numbers.
2017-12-14 01:22:21 +00:00
Isis Lovecruft
bbb7f092a0
prop#249: Add note about interaction with OOM manager.
2017-12-14 00:08:30 +00:00
Isis Lovecruft
d3f18989ce
prop#249: Add example of how to avoid exhausting RELAY_EARLY cells.
2017-12-14 00:03:08 +00:00
Isis Lovecruft
686aaf1105
Typo fixes in prop#249, prop#276, and prop#279.
2017-12-13 23:52:15 +00:00
Isis Lovecruft
21e79aec73
prop#249: Add recommendation on equal number of cells in each direction.
2017-12-13 23:51:21 +00:00
Isis Lovecruft
03a9d4f134
prop#249: Add note on padding being randomness or zeroes.
2017-12-13 23:50:29 +00:00
Isis Lovecruft
ca22bb0f49
Add Ticket: field for prop#140.
2017-12-13 23:49:33 +00:00
Isis Lovecruft
f0e54aab3a
Update the list of current torspec editors.
2017-12-08 01:53:52 +00:00
Isis Lovecruft
8be6722e8d
Require a "Ticket:" field for future proposals in certain states.
...
New proposals in states {OPEN,ACCEPTED,CLOSED,FINISHED} must have a
"Ticket:" field which may either be a ticket number or a publicly
accessible URL. When the ticket is just a number, it should be in
reference to Tor's canonical bug tracker.
This information greatly helps both new contributors and relay
operators who are interested in the implementation status of a working
proposal. This patch permits the "Ticket:" field to be added to older
proposals (<= prop#288), but it does not require it.
2017-12-08 01:53:52 +00:00
Nick Mathewson
c78806e96e
mark 284 as finished.
2017-12-05 19:51:51 -05:00
Nick Mathewson
aac4775ffd
Merge remote-tracking branch 'dgoulet/ticket20699_02'
2017-12-05 19:45:29 -05:00
Nick Mathewson
48e41c559f
Merge remote-tracking branch 'teor/bug23826-23828-v2'
2017-12-04 11:48:43 -05:00
Nick Mathewson
0596c2cbb2
mark prop280 as superseded
2017-12-01 15:25:35 -05:00
Nick Mathewson
8f56a246f8
Add privcount-with-shamir proposal
2017-12-01 15:25:10 -05:00
Nick Mathewson
475662feb6
Add proposal 287, for real this time
2017-11-30 16:53:51 -05:00
Nick Mathewson
bca928a5ac
Add proposal 287
2017-11-30 16:53:35 -05:00
Nick Mathewson
71dc93753b
Add prop286: Controller APIs for hibernation access on mobile
2017-11-30 07:55:06 -05:00
teor
b523c5c488
Revise proposal 283 based on Nick's feedback
2017-11-22 00:21:55 +11:00
David Goulet
7ad96f18a0
prop284: Extend HSPOST to accept an onion address
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-15 14:42:44 -05:00
Nick Mathewson
4e5b61abb3
285: fix up some of the simpler issues
2017-11-14 14:33:12 -05:00
Nick Mathewson
5ba8d5a7d0
proposal 285: utf-8 all the things
2017-11-13 13:50:59 -05:00
David Goulet
3607351acf
prop284: Specify that the REPLICA= argument can't be used
...
For v3, we don't have this concept of replica attached to a descriptor ID.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-10 15:22:01 -05:00
David Goulet
60f572f0f5
prop284: 32 bytes base64 encoded is 43 bytes, not 32
...
Trivial fix.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-10 12:06:57 -05:00
David Goulet
f8122635bc
prop284: Improve the ADD_ONION new key type wording
...
Also define the new ed25519 key blob encoding format which is the same
format as the current v2 key blob is expected to be in.
Closes #24165
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-07 15:07:12 -05:00
David Goulet
9a53e606a0
prop284: dos2unix the proposal
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-07 14:48:35 -05:00
Nick Mathewson
bbb6d34cca
add proposal 284: Hidden Service v3 Control Port
2017-11-06 10:02:15 -05:00
teor
c0fbf52667
Fix a minor size miscalculation in prop283
2017-10-26 16:13:40 +11:00
Nick Mathewson
70911f81ea
Add 283: Move IPv6 ORPorts from microdescriptors to the microdesc consensus
2017-10-25 12:18:14 -04:00
Nick Mathewson
ae287fa97e
Mark proposals 220 and 244 as closed.
2017-09-20 13:44:04 -04:00
Nick Mathewson
6f9b3e058f
Close proposal 162 as "as implemented as it will get.
2017-09-20 10:23:42 -04:00
Nick Mathewson
e360873db5
Mark prop158 closed. It has been merged into the spec ages ago.
2017-09-20 10:19:12 -04:00
Nick Mathewson
17d433247b
In prop196, note that USERADDR port is not optional.
...
Part of ticket 23080.
2017-09-20 08:40:45 -04:00
Nick Mathewson
471af27b55
Create rend-spec-v3.txt based on proposal 224
2017-09-19 14:33:33 -04:00
Nick Mathewson
410335394d
make validation MUST; clarify behavior on failure.
2017-09-19 10:32:58 -04:00
Nick Mathewson
4be7ff5ce8
Merge remote-tracking branch 'asn/bug22743'
2017-09-19 10:32:14 -04:00
George Kadianakis
210e19d61b
prop224: Specify and motivate client-side address validation.
...
Also see #23019 for the code patch.
2017-09-19 17:25:33 +03:00
Nick Mathewson
609abee710
Merge remote-tracking branch 'dgoulet/ticket22979_01'
2017-09-18 14:58:41 -04:00
Nick Mathewson
a3d9506c67
Merge remote-tracking branch 'dgoulet/ticket23340_01'
2017-09-18 14:55:47 -04:00
George Kadianakis
417aac20fb
prop224: Improve some prop224 metadata.
...
- Revise author list and acknowledgements list.
- Write list of prop224 improvements
- Kill a spare TODO.
2017-09-18 15:36:09 +03:00
David Goulet
2922ca3243
prop224: Remove the HSDir3 flag concept
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-09-18 08:34:10 -04:00
George Kadianakis
c396cac0f6
prop224: Specify ed25519 base point and add reference.
2017-09-18 15:17:31 +03:00
George Kadianakis
6453c7dc4e
prop224: No special INTRODUCE1 cell for legacy intro points.
...
Intro points don't care about the contents of the INTRO1 cell as long as
the first 20 bytes are correctly formatted, so we don't need to have a
special cell for legacy intros. Remove all references to it.
2017-09-18 15:07:01 +03:00
George Kadianakis
de34dc5965
prop224: Specify that we have a replay cache for rendezvous cookies.
...
See replay_cache_rend_cookie in the codebase.
2017-09-18 14:53:34 +03:00
George Kadianakis
26c35f957f
prop224: RENDEZVOUS2 is RENDEZVOUS1 minus the cookie
2017-09-18 14:51:33 +03:00
David Goulet
0667997d79
prop224: Add an intro onion key in the descriptor
...
The onion key for the ntor handshake is missing in the descriptor in order
for the client to extend to it.
Ticket #22979
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-09-15 10:03:08 -04:00
Roger Dingledine
eb7c64b9ba
other easier fixes to prop#280
2017-09-12 22:39:29 -04:00
teor
51825e0d22
Fix some prop280 typos reported by arma
2017-09-13 11:51:44 +10:00
Nick Mathewson
cb2960f6ba
Add proposal 282
2017-09-12 10:13:43 -04:00