Commit Graph

1493 Commits

Author SHA1 Message Date
teor
34fb76cd5f
Prop 312: Add s7r as an author
Part of 33073.
2020-02-05 22:06:33 +10:00
teor
da1b248e2e
Prop 312: Add State Management
Document tor's current address detection state management, and our
new state management for IPv4 and IPv6 address detection.

As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:06:30 +10:00
teor
492549864e
Prop 312: Add libevent DNS API
As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:06:00 +10:00
teor
1f9f3986d1
Prop 312: Add Ignore Addresses on Inbound Conns
Add an optional change.

Part of 33073.
2020-02-05 22:05:53 +10:00
teor
13e8c8c231
Prop 312: Define an IPv6 sybil block
As suggested by Nick Mathewson and s7r.

Part of 33073.
2020-02-05 22:05:31 +10:00
teor
89e7222f65
Prop 312: Require explicit authority addresses
Only use explicit IPv4 and IPv6 address literals, configured in Address
or ORPort lines, for directory authority addresses.

As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:05:07 +10:00
teor
55d3beb6c2
Prop 312: Make bridge changes clearer
Part of 33073.
2020-02-05 22:05:00 +10:00
teor
e1815226f1
Prop 312: Avoid some address detection state
As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:04:47 +10:00
teor
043ac7d7aa
Prop 312: Rewrite authenticated address detection
All these changes are optional in the proposal:
* Add the NETINFO cell address detection method
  (as suggested by Nick Mathewson)
* Defer decisions about ignoring some addresses, or using those
  addresses as the lowest priority method
* Simplify the load-balancing design

Part of 33073.
2020-02-05 22:04:10 +10:00
teor
7269d17c6f
Prop 312: Improve AddressDisableIPv6
Explain why we might need to turn IPv6 address detection off.

Part of 33073.
2020-02-05 22:04:04 +10:00
teor
6e7d4abd1f
Prop 312: Use Authority IPs for the Socket Method
Add an optional section, where we propose using a directory authority
IPv4 and IPv6 address for socket-based local interface address
detection.

As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:03:50 +10:00
teor
f090a2233c
Prop 312: Explain address resolution using sockets
As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:03:33 +10:00
teor
fd4716f1ce
Prop 312: Improve interface address method
Explain why some relays may not have any publicly routable interface
addresses.

Part of 33073.
2020-02-05 22:03:26 +10:00
teor
0159850437
Prop 312: Remove the DirPort method
It's unlikely to be useful for most configurations.

As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:03:12 +10:00
teor
f12ddad6bf
Prop 312: Explain how to choose addresses
Explain how we choose between multiple addresses, in a list, and over
time.

Part of 33073.
2020-02-05 22:03:05 +10:00
teor
7a55bf1662
Prop 312: Explain why untrusted addresses are bad
And describe a potential attack that gives a relay the wrong address,
then monitors its traffic.

As suggested by Nick Mathewson.

Part of 33073.
2020-02-05 22:02:52 +10:00
teor
8a9ea6f224
Prop 312: Explain public IPv6 addresses
Since relays put the discovered IPv6 address in their descriptor,
it needs to be publicly routable. (If the relay is on the public
network.)

As suggested by Nick Mathewson.

Also fix inconsistent use of directory authority, directory server,
and directory mirror.

Part of 33073.
2020-02-05 22:02:33 +10:00
teor
66d08ba358
Prop 312: Add an early extends section
Add an optional change to support clients extending as soon as
possible, after a relay restarts.

Part of 33073.
2020-02-05 22:02:26 +10:00
teor
534114e2c3
Prop 312: Improve auto IPv6 ORPort section
Add information about binding to IPv4 and IPv6.

Also do a slight reformat.

Part of 33073.
2020-02-05 22:02:22 +10:00
teor
77da452bd6
Prop 312: Fix a heading
Part of 33073.
2020-02-05 22:02:18 +10:00
teor
8902ece4fe
Prop 312: Add info on IPv6 address privacy
And why it shouldn't affect tor relays, at least with the default
settings.

As suggested by s7r.

Part of 33073.
2020-02-05 22:02:03 +10:00
teor
615ebe5fd4
Prop 312: Explain default outbound address better
Part of 33073.
2020-02-05 22:01:57 +10:00
teor
0e20e5a067
Prop 312: Add an alternative IPv6 disable design
And explain why we didn't use the existing ORPort IPv4Only flag to
disable IPv6 address resolution.

Part of 33073.
2020-02-05 22:01:54 +10:00
teor
f1af76a78a
Prop 312: Explain private address handling better
Part of 33073
2020-02-05 22:01:48 +10:00
teor
0cafa9dfba
Prop 312: Reformat references
Part of 33073.
2020-02-05 22:01:45 +10:00
teor
ef7838eab2
Prop 312: Relay Auto IPv6 Addreess - Initial Draft
Related tickets: 33073 (proposal), 5940 (implementation).
2020-02-05 22:01:25 +10:00
teor
5e79a7dd21
Prop 311: Allow for auto-configured IPv6 ORPorts
Part of 24404.
2020-02-05 21:52:58 +10:00
teor
f7fb789de4
Prop 311: Rewrite and re-order tor-spec changes
We want to allow relays to upgrade to trying both addresses in an
EXTEND2 cell, without requiring a new protocol version.

The spec documents the planned "choose at random" behaviour, but
allows relays to try both IPv4 and IPv6 in future.

Part of 24404.
2020-02-05 21:52:55 +10:00
teor
cdc5a152aa
Prop 311: Reformat references
Part of 24404.
2020-02-05 21:52:52 +10:00
teor
6eee2ca426
Prop 311: Avoid depending on exact extend details
We don't want to depend on extends preferring IPv4 or IPv6,
or the exact extend implementation, if we don't have to.

Part of 24404.
2020-02-05 21:52:49 +10:00
teor
14906a6fd9
Prop 311: Clarify "may not"
Part of 24404.
2020-02-05 21:52:46 +10:00
teor
8e85047b65
Prop 311: Improve Subprotocol Version
* don't ban useful behaviours, just mention that they might not happen
* don't talk about reachability, other tor instances don't care
* specify random choice between IPv4 and IPv6 (and add a TODO)

As suggested by Nick Mathewson.

Part of 24404.
2020-02-05 21:52:42 +10:00
teor
5c0aa29f81
Prop 311: Improve RelaySendIPv6Extends option name
As suggested by Nick Mathewson.

Part of 24404.
2020-02-05 21:52:39 +10:00
teor
a3e2f6cd61
Prop 311: Improve Extra Reachability Checks
And add extra logging when tor would have previously found itself
reachable, but the new checks fail.

As suggested by Nick Mathewson.

Part of 24404.
2020-02-05 21:52:36 +10:00
teor
27936d046e
Prop 311: Allow Extends to Prefer IPv4 or IPv6
Add an alternate design, suggested by Nick Mathewson.

Part of 24404.
2020-02-05 21:52:33 +10:00
teor
b6a75a8a14
Prop 311: Add IPv6 ORPort to Extend Conditions
As suggested by Nick Mathewson.

Part of 24404.
2020-02-05 21:52:30 +10:00
teor
9966ad3f3f
Prop 311: Support seamless upgrades
We want to support these two cases:
  * upgrade to working IPv6,
  * stay on IPv4-only, if a guessed IPv6 address isn't reachable.

Part of 24404.
2020-02-05 21:52:27 +10:00
teor
3c19e051a6
Prop 311: Make capitalisation consistent
Part of 24404.
2020-02-05 21:52:15 +10:00
teor
64745746f4
Prop 311: Make bridge mentions consistent
Part of 24404.
2020-02-05 21:52:09 +10:00
teor
7f8a655017
Prop 311: Fix a typo in section 5
Part of 24404.
2020-02-05 21:52:06 +10:00
teor
e5aa0b3411
Prop 311: Include heartbeat logs in monitoring
Some of the statistics may also be available in relay heartbeat logs.

Part of 24404.
2020-02-05 21:52:03 +10:00
teor
f67267bc53
Prop 311: Clarify prop 306 references
Improve the explanations of some of the references to proposal 306:
Client Auto IPv6 Connection. And add a section that specifically
mentions modifying that proposal.

Part of 24404.
2020-02-05 21:52:00 +10:00
teor
d175e08706
Prop 311: Add exception for recent tor changes
Some IPv6 behaviour has changed in recent tor versions, as noted in the
proposal.

Part of 24404.
2020-02-05 21:51:57 +10:00
teor
0348668dec
Prop 311: Explain Directory Authority behaviour
Where it's different from relay behaviour.

Part of ticket 24404.
2020-02-05 21:51:53 +10:00
teor
a65f689482
Prop 311: Use shorter file names for future proposals
And use short proposal names in references.

Part of 24404.
2020-02-05 21:51:22 +10:00
teor
d719ac4022
Prop 311: IPv6 ORPort Reachability - Initial Draft
Related tickets: 24404 (proposal), 24403 (implementation).
2020-01-24 16:13:01 +10:00
teor
8f094d7485
prop 309: Fix trailing space 2020-01-22 14:13:37 +10:00
teor
ff165e0f44
Merge remote-tracking branch 'tor-github/pr/102' 2020-01-15 22:50:10 +10:00
teor
e27cbca306
Prop 306: Restore some statistics from an earlier draft
These statistics are optional, but they may be useful:
* client and relay connections
* statistics in the heartbeat logs

Also improve the explanation of the "extra prop 306 connections"
statistic.

Part of 29801.
2020-01-15 22:44:36 +10:00
teor
21aaad10e6
Prop 306: Add a bootstrap changes section
Clients need to change how they select fallback directory mirrors
during bootstrap, or some IPv6-only clients will fail to bootstrap.

Part of 29801.
2020-01-15 22:44:32 +10:00
teor
f5c6f61cc9
Prop 306: Improve load-balancing for NumIPv6Guards
The previous design would have doubled the load on IPv6-supporting
relays.

Part of 29801.
2020-01-15 22:44:29 +10:00
teor
6664ed79ed
Prop 306: Add an optional ClientPreferIPv6ORPort consensus parameter
Part of 29801.
2020-01-15 22:44:23 +10:00
teor
ed8452b9e8
Prop 306: Improve ConnectionAttemptDelay design
Have a single ConnectionAttemptDelay option, with a default value
of 250 msec based on RFC 8305.

Part of 29801.
2020-01-15 22:44:19 +10:00
teor
a78e23a053
Prop 306: Minor fixes and tidying up
* modify design to match Tor's typical design patterns
* add some missing info and special cases
* improve formatting and consistency
* fix some typos

Part of 29801.
2020-01-15 22:44:15 +10:00
Neel Chauhan
84c2af5931
Prop306: Add revisions suggested in Torspec PR #87 2020-01-15 22:44:12 +10:00
Roger Dingledine
54346bf40f fix line endings on prop 307
(whoever committed it, committed it with a bonus ^M on each line)
2019-12-13 15:44:44 -05:00
Roger Dingledine
a51495cdd7 add nsf acks to four proposals 2019-12-13 15:44:01 -05:00
David Goulet
2bdcf78835 prop305: Close it
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-26 15:11:53 -05:00
Nick Mathewson
42339301d4 Add proposal 310 from Florentin Rochet, Aaron Johnson et al 2019-11-25 12:00:37 -05:00
Nick Mathewson
666ca5ebf3 fixup! reindex.py: convert to python3 2019-11-25 12:00:27 -05:00
Nick Mathewson
7b8c6efbbe Prop 121: convert to utf-8 2019-11-25 11:59:50 -05:00
Nick Mathewson
f370c4abc0 reindex.py: convert to python3 2019-11-25 11:59:38 -05:00
David Goulet
7c222131ba prop304: Close proposal now merged into our main specs
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-20 09:36:42 -05:00
Jean Paul Degabriele
5bd5f82e3d Fixed typos pointed out in Tomer's email. 2019-10-24 09:21:50 +02:00
Nick Mathewson
581b45d652 proposal 309: Optimistic SOCKS Data 2019-10-02 13:40:35 -04:00
Nick Mathewson
3b41712498 Merge remote-tracking branch 'mikeperry-github/hs-padding-spec' 2019-09-19 15:30:02 -04:00
Nick Mathewson
317d09bf14 Add Counter Galois Onion as proposal 308 2019-09-14 20:19:28 -04:00
Nick Mathewson
09611eaf46 Add proposal 307 (onionbalance for v3 onion services) 2019-09-06 08:02:46 -04:00
Nick Mathewson
013e51649f Add proposal 306 to the index 2019-09-06 08:00:27 -04:00
Nick Mathewson
2e89f93aee Merge branch 'prop306_squashed' 2019-09-06 08:00:09 -04:00
Neel Chauhan
a4c0cd1a4f Add Proposal 306: A Tor Implementation of IPv6 Happy Eyeballs 2019-09-06 08:00:02 -04:00
Mike Perry
a7e52fc35d Update padding-spec.txt to cover hs circuit padding.
Also update padding proposals that are deprecated by padding-spec.txt,
to refer the reader to the new spec.
2019-08-14 19:07:59 -05:00
Nick Mathewson
dc3683f929 update to latest version as of 11 July 2019-08-06 13:58:28 -04:00
David Goulet
4707f3604c prop305: Fix typo
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-25 10:48:31 -04:00
David Goulet
ca1dea9b8a prop305: Initial import of proposal 305
Hidden service denial of service defenses parameters within the
ESTABLISH_INTRO cell.

Closes #30790

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-19 13:35:39 -04:00
David Goulet
43c8b456af prop304: Run reindex to really make it Accepted
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-06 11:34:20 -04:00
George Kadianakis
3ecd4eb46d Change status of proposal 304 to Accepted. 2019-06-06 14:28:21 +03:00
David Goulet
767df0b55a prop304: Initial import for new SOCKS5 error code
Part of #30382

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-06 14:26:34 +03:00
David Goulet
d58b7d180e prop289: Close it
It is not fully implemented and previous commit merges the relevant sections
into tor-spec.txt and dir-spec.txt.

I've also added "David Goulet" as a author since lots of it has changed from
my work since the creation of the proposal.

Part of #30365

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-31 15:11:53 -04:00
David Goulet
4fc32990cf tor-spec: Add authenticated SENDMEs
This merges proposal 289 into tor-spec.txt.

Most of the circuit-level flow control section has been rewritten to be
clearer and better detail version 0 and 1.

Closes #30365

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-31 15:11:37 -04:00
David Goulet
4c63907c92 prop303: Run reindex.py to index it
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-22 14:46:43 -04:00
Nick Mathewson
40065b9894 Merge remote-tracking branch 'dgoulet/ticket30557_01' 2019-05-21 12:14:00 -04:00
David Goulet
33cc0fef51 prop289: Simplify and clarify deployment plan
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-21 11:27:51 -04:00
Nick Mathewson
f171ccb1d7 add prop303 for making protovers required 2019-05-21 11:12:54 -04:00
Nick Mathewson
9503a26102 add 302-padding-machines-for-onion-clients.txt 2019-05-16 09:45:15 -04:00
Roger Dingledine
0b9fbb893c fix a few typos 2019-05-15 18:40:01 -04:00
Nick Mathewson
ddcc8f9551 Merge remote-tracking branch 'tor-github/pr/78' 2019-05-13 14:35:55 -04:00
George Kadianakis
e1ad77e2a1 Merge remote-tracking branch 'dgoulet/ticket26288_01' 2019-05-02 18:19:33 +03:00
Mike Perry
a1935efba2 Bug 30173+29203: Document reduced+disabled padding consensus params 2019-04-18 19:27:31 +00:00
Nick Mathewson
f55b53713e Accept proposal 301 2019-03-20 08:06:13 -04:00
Alexander Færøy
300d66200e Proposal 301: Don't include package fingerprints in consensus documents 2019-03-13 15:53:56 +01:00
David Goulet
b4dbcf0011 fixup! prop289: Spec out the new SENDME cell payload 2019-03-07 11:03:29 -05:00
Neel Chauhan
60405bca0b Add section "Options To Enable The Failure Counter" 2019-03-06 18:04:38 -05:00
Neel Chauhan
9a4380f2c9 Add updated version of proposal 299 2019-03-06 16:45:04 -05:00
Nick Mathewson
8edd7803d9 New version of Proposal 295 from Tomer Ashur, Orr Dunkelman, and Atul Luykx 2019-03-01 11:58:25 -05:00
David Goulet
81ec28177b prop289: Rewrite the Deployment Plan section
Split it into subsection for clarity. Add a new subsection describing the
addition of a new protover value.

This patch removes a paragraph that states the obvious with "We'll need to
do a bunch of testing". It is nice but also huge part of our development
work flow so no need for it in the proposal.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-03-01 11:23:24 -05:00
David Goulet
5ac8a2bbd1 prop289: Add the new consensus params
Spec out the new consensus parameters in the proposal.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-02-25 15:03:31 -05:00
David Goulet
0713f2b4cb prop289: Spec out the new SENDME cell payload
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-02-25 15:03:31 -05:00
Nick Mathewson
8e71376161 Merge remote-tracking branch 'tor-github/pr/25' 2019-02-25 13:35:41 -05:00
Nick Mathewson
43e34fa4ff Proposal 300: Walking Onions 2019-02-05 11:46:45 -05:00
Nick Mathewson
87bc2f172d Convert prop299 to unix line-endings 2019-02-05 07:10:23 -05:00
Nick Mathewson
6f3d59072b Set prop299 status to open 2019-02-05 07:09:55 -05:00
Nick Mathewson
5c19f4d1ca Add proposal 299 from Neel Chauhan 2019-01-28 11:31:47 +01:00
Nick Mathewson
e1cb6341f9 Merge remote-tracking branch 'asn-github/bug28142' 2019-01-15 12:24:20 -05:00
Roger Dingledine
fe3930dccd add nsf ack to prop 249 2018-12-21 02:14:58 -05:00
Nick Mathewson
18fcb9ab42 Mark proposal 297-safer-protocol-shutdowns.txt as implemented (#27735) 2018-12-11 09:52:35 -05:00
George Kadianakis
09814d9109 Specify probability distribution mode. 2018-12-10 18:46:33 +02:00
Nick Mathewson
54c3a5f09d Close and merge prop298 2018-12-05 09:44:12 -05:00
Nick Mathewson
d14164d8b9 Merge prop293 and mark it closed. 2018-12-05 09:28:00 -05:00
Nick Mathewson
9d8c044057 Merge remote-tracking branch 'tor-github/pr/41' 2018-11-06 15:25:52 -05:00
Mike Perry
98e6c66374 Prop #254: The infinity bin is also special. 2018-11-06 01:25:45 +00:00
Mike Perry
470bde64e6 Prop #254: Clarify special cases for bin 0 and inf bin-1. 2018-11-06 01:23:10 +00:00
Mike Perry
a66d8a650f Prop #254: Use range_usec instead of range_sec. 2018-11-06 01:20:32 +00:00
Mike Perry
acd4a89c1c Prop 254: Describe token generation more clearly
I hope...
2018-11-05 23:17:14 +00:00
Mike Perry
1dd7f1ff78 Proposal 254 updates from asn's review. 2018-11-05 19:45:05 +00:00
Nick Mathewson
a315eed530 Proposal 298: canonicalize family lines 2018-10-31 10:48:59 -04:00
George Kadianakis
ab37543cfb Clarify prop#254 in some parts.
Also kill some trailing whitespace.
2018-10-30 18:05:07 +02:00
Mike Perry
a697137e91 fixup! Update Proposal #254 with latest circuit padding plans.
Update padding consensus param limits.
2018-10-29 21:20:16 +00:00
Mike Perry
3fed83a38d Update Proposal #254 with latest circuit padding plans. 2018-10-29 19:45:58 +00:00
Roger Dingledine
8cf90bb7bf stick an nsf funder ack on proposal 289 2018-09-26 23:51:22 -04:00
Nick Mathewson
bd6733234b Add proposal for making protover shutdown logic safer 2018-09-19 12:19:44 -04:00
Roger Dingledine
43c2a65a28 add nsf ack's to prop 291 too 2018-08-22 23:28:31 -04:00
Roger Dingledine
4ff93b8792 add nsf funder acknowledgement to two proposals 2018-08-22 22:39:38 -04:00
Roger Dingledine
8e2035bfcd simplify confusing sentence 2018-08-22 22:36:26 -04:00
Roger Dingledine
c95c1bb1ed fix a typo twice 2018-08-06 15:54:27 -04:00
Nick Mathewson
c0b2dc9f17 Call it prop296 2018-07-17 08:46:18 -04:00
Nick Mathewson
b3abfdffee Merge remote-tracking branch 'teor/ticket21377-squashed' 2018-07-17 08:45:48 -04:00
Roger Dingledine
d31c33c95f one more typo 2018-07-16 23:42:35 -04:00
Roger Dingledine
6f0112693e three tiny fixes to prop#293 2018-07-16 13:39:52 -04:00
teor
d29d9ada0b
bandwidth: edit bandwidth URL dir-spec and proposal
* dir-spec: don't post bandwidth files to other authorities
* dir-spec: add URL for current bandwidth file
* dir-spec: clean up the consensus and vote "current" publication schedule

Closes ticket #21377.
2018-07-16 10:26:18 +10:00
juga0
96145da5e2
Edit bandwidth file URL proposal
* Correct URL with the one in the dir-spec
* Replace bwauth vote/raw file by bandwidth list file
* Update compatibility, the format has a spec
2018-07-16 10:25:19 +10:00
juga0
58d3cb9cc2
Have Directory Authorities expose bandwidth files
Proposal sent to tor-dev maling list by Tom Ritter.
(https://lists.torproject.org/pipermail/tor-dev/2017-December/012677.html)
2018-07-16 10:25:02 +10:00
sergeyfrolov
d05176bb4a
Fix port in USERADDR example 2018-07-13 17:56:03 -04:00
Nick Mathewson
d6b2bcb5b2 Authorship update for prop295 2018-07-13 17:05:41 -04:00
Nick Mathewson
c590145e6d Correct a point in proposal 288.
Previously our design had called for considering a SHAKE output B
bits at a time, but bitwise slicing is a pain.  Instead, consider
the output 64 bits at a time, mask off the high bits, and discard
values that lie outside the prime field.  Since P is very close to
2^B, nearly all values should be okay.
2018-07-10 19:58:36 -04:00
Nick Mathewson
09220cc5b7 Replace proposal 295 with the right version :/ 2018-07-04 16:41:58 -04:00
Nick Mathewson
b0d5698c49 Add proposal 295 from Tomer Ashur. 2018-07-03 17:38:26 -04:00
teor
436bb12554
Rewrite the UTF-8 specification in prop#285 so it is more specific
Use terminology from The Unicode Standard.
Ban byte-swapped byte order marks.
Add references to The Unicode Standard.
2018-06-22 10:04:42 +10:00
David Goulet
419ba0c307 porp289: Put it back in Open status. No need for needs-revision
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-06-03 15:31:42 -07:00
Nick Mathewson
d6ce1851e8 Mark more items as accepted/needs-rev 2018-06-03 11:43:16 -07:00
Nick Mathewson
abb0dc909d One more reindex 2018-06-03 11:34:09 -07:00
Nick Mathewson
3660c6d11a Mark 255 as reserve: nice idea, worth doing. 2018-06-03 11:33:45 -07:00
Nick Mathewson
95e8d34f0f Another round of status changes 2018-06-03 11:30:35 -07:00
Nick Mathewson
005a92b40d Regenerate index once more. 2018-06-03 11:27:52 -07:00
Nick Mathewson
6d601e837d 226 is not happening soon. 2018-06-03 11:27:41 -07:00
Nick Mathewson
7967797a02 PQ status update 2018-06-03 11:27:32 -07:00
Nick Mathewson
c083575ceb Regenerate index once more. 2018-06-03 11:23:29 -07:00
Nick Mathewson
c280ee707d Mark 292 as accepted. 2018-06-03 11:23:17 -07:00
Nick Mathewson
89edd9d865 Mark 290 as meta 2018-06-03 11:23:04 -07:00
Nick Mathewson
664dd40a58 Mark 286 as accepted 2018-06-03 11:22:06 -07:00
Nick Mathewson
76b32e7a9f Add 242 as reserve. It is an okay idea but it is not going on the roadmap soon 2018-06-03 11:21:10 -07:00
Nick Mathewson
88830f4f2f Mark 234 as rejected. 2018-06-03 11:20:53 -07:00
Nick Mathewson
2a9578d459 Mark 233 as rejected: we are not developing tor2web mode 2018-06-03 11:20:02 -07:00
Nick Mathewson
02f91927b4 Mark prop229 as rejected
These extensions are cool, but if anybody needs them it's better for
them to use HTTP CONNECT.
2018-06-03 11:19:13 -07:00
Nick Mathewson
63c11929b8 Mark three proposals as no longer open because of RC status 2018-06-03 11:18:30 -07:00
Nick Mathewson
9284489c34 192 is obsoleted by new guard design 2018-06-03 11:17:00 -07:00
Nick Mathewson
80d84560fe Mark 189 and 191 as obsoleted by pluggable transports 2018-06-03 11:16:30 -07:00
Nick Mathewson
648d4348ec Mark prop177 and prop256 as reserve: maybe smart, but not roadmapping these. 2018-06-03 11:15:43 -07:00
Nick Mathewson
efc5e517ed Mark 182 as obsolete because of different bucket refill logic 2018-06-03 11:15:12 -07:00
Nick Mathewson
e64d1e86b0 Reindex. 2018-06-03 11:13:57 -07:00
Nick Mathewson
3161e90237 Obsolete/reject 164 and 165 2018-06-03 11:13:24 -07:00
Nick Mathewson
4967c958c8 Mark 246 as rejected; we don't want to consolidate these. 2018-06-03 11:11:48 -07:00
Nick Mathewson
3fc694dacf Mark 190 as obsoleted by PTs 2018-06-03 11:10:16 -07:00
Nick Mathewson
13621de747 Mark 168 as Rejected
Roger says that they ran experiments and found that it didn't work
as well as they hoped.
2018-06-03 11:09:12 -07:00
Nick Mathewson
176d7fbb4b Mark prop288 as accepted 2018-06-03 11:08:53 -07:00
Nick Mathewson
433cfc01e6 Mark 253 as dead per author's comments. 2018-06-03 11:08:01 -07:00
Nick Mathewson
6fd4a50cb1 Mark prop230 and prop231 as obsolted by Ed keys and superseded. 2018-06-03 11:07:01 -07:00
Nick Mathewson
6e64dbcbdd Proposal 203 is obsoleted by pluggable transports. 2018-06-03 11:05:50 -07:00
Nick Mathewson
3b296bd342 Mark 195 as dead: The unimplemented parts will not happen. 2018-06-03 11:04:50 -07:00
Isis Lovecruft
14cd5da191
Add work-in-progress TLS 1.3 proposal as a draft with number 294. 2018-06-01 22:07:55 +00:00
Isis Lovecruft
bbd9567db9
Merge branch 'tls13' 2018-06-01 22:02:02 +00:00
Nick Mathewson
a323d84e7c Add a new proposal to help us move forward with 275. 2018-05-30 17:19:54 -07:00
George Kadianakis
f6e93d9751 Minor fixup now that a number has been assigned to vanguard proposal. 2018-05-28 13:03:33 +03:00
Nick Mathewson
e541f2afe5 mesh vanguards is now prop292 2018-05-27 09:59:24 -04:00
George Kadianakis
5bf8980bb8 Supersede proposal 247 by xxx-mesh-vanguards.txt.
We need to update the xxx part when we give a number to the new proposal.
2018-05-24 12:40:01 +03:00
Mike Perry
d4aaf28eb3 Write a proposal for the mesh vanguards design. 2018-05-24 12:39:57 +03:00
Mike Perry
d0bbdb3ccb Prop 247: Some notes from mailinglist discussion 2018-05-24 12:39:37 +03:00
Mike Perry
a19d0bf1f0 Prop 265: Add nodes from mailinglist discussion. 2018-05-24 12:39:29 +03:00
Roger Dingledine
13b598f2e5 reflow to call 251 really done 2018-04-18 15:43:07 -04:00
Roger Dingledine
4b93747f86 normalize lack of period at end of title 2018-04-18 15:41:57 -04:00
Roger Dingledine
3260c2225e declare prop#251 closed 2018-04-18 15:38:49 -04:00
Roger Dingledine
066c24c46d fix some sort of weird encoding mistake 2018-04-18 03:19:03 -04:00
David Goulet
f7fa4b925b prop291: Change MOAR to MORE
Some of us understands that "MOAR" is a funny word that means MORE++ but
unfortunately, not everyone can get that reference especially when you don't
speak English as your first language.

Closes #25758

Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-04-16 11:12:52 -04:00
David Goulet
5e2e04eb97 prop291: dos2unix the file so we get a Unix format
No change, just removes the annoying ^M at the end of each line.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-04-16 11:12:06 -04:00
Nick Mathewson
815a7108eb 291: The move to two guard nodes 2018-04-03 14:30:03 -04:00
Roger Dingledine
e2145ba69c fix typo 2018-04-02 00:24:46 -04:00
Roger Dingledine
79e61857d5 remove caesura in proposal name
we can be poetic  in other epochs
2018-03-03 01:49:53 -05:00
Roger Dingledine
ba05c9a935 fix typos in proposal 290 2018-03-03 01:48:33 -05:00
Nick Mathewson
c45e0778ad Add prop290: Continuously update consensus methods 2018-02-21 12:02:04 -05:00
Nick Mathewson
39fde37cfa Add proposal 289: Authenticating sendme cells to mitigate bandwidth attacks 2018-02-13 08:39:00 -05:00
Nick Mathewson
6a649ca3f3 Merge branch 'document_prop278' 2018-02-09 08:38:25 -05:00
David Goulet
6bd0a699a0 control: Merge prop284 into control-spec.txt
The proposal 284 is now effectively Closed.

Closes #24847

Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-01-31 14:55:28 -05:00
Nick Mathewson
1cb56afdc1 Merge prop278 (compression) into dir-spec. 2018-01-24 12:48:12 -05:00
Isis Lovecruft
fc561d2bb5
WIP Migration to TLS 1.3 proposal. 2018-01-23 00:51:09 +00:00
Nick Mathewson
8bc8bf05bb Clarify 285 further. 2018-01-09 12:33:13 -05:00
Nick Mathewson
414df99cfa Mark prop249 as accepted 2018-01-09 11:55:11 -05:00
Nick Mathewson
a76eaa606b reindex 2018-01-02 09:30:01 -05:00
teor
6ac960d451
Update prop#283's Status to Accepted, and add Implemented-In and Ticket
The code that implements prop#283 has been merged to master
(0.3.3.0-alpha-dev).

There is a small amount of cleanup code in #23975 and #24573 that still
needs to be merged. It addresses some correctness and efficiency issues.

Closes #24778.
2018-01-02 13:07:27 +11:00
Isis Lovecruft
5fe5456988
prop#249: Add myself as an author so I get blamed for anything dumb. 2017-12-14 01:24:17 +00:00
Isis Lovecruft
c119bd7800
prop#249: Add section on new consensus parameters. 2017-12-14 01:23:52 +00:00
Isis Lovecruft
3578da4f1f
prop#249: Add section on updates to required/recommended subprotocols. 2017-12-14 01:23:16 +00:00
Isis Lovecruft
5c0962b76f
prop#249: Add detail on padding the number of bytes in each direction. 2017-12-14 01:22:31 +00:00
Isis Lovecruft
7af62db0b0
prop#249: Add link specifiers and a section on new subprotocol numbers. 2017-12-14 01:22:21 +00:00
Isis Lovecruft
bbb7f092a0
prop#249: Add note about interaction with OOM manager. 2017-12-14 00:08:30 +00:00
Isis Lovecruft
d3f18989ce
prop#249: Add example of how to avoid exhausting RELAY_EARLY cells. 2017-12-14 00:03:08 +00:00
Isis Lovecruft
686aaf1105
Typo fixes in prop#249, prop#276, and prop#279. 2017-12-13 23:52:15 +00:00
Isis Lovecruft
21e79aec73
prop#249: Add recommendation on equal number of cells in each direction. 2017-12-13 23:51:21 +00:00
Isis Lovecruft
03a9d4f134
prop#249: Add note on padding being randomness or zeroes. 2017-12-13 23:50:29 +00:00
Isis Lovecruft
ca22bb0f49
Add Ticket: field for prop#140. 2017-12-13 23:49:33 +00:00
Isis Lovecruft
f0e54aab3a
Update the list of current torspec editors. 2017-12-08 01:53:52 +00:00
Isis Lovecruft
8be6722e8d
Require a "Ticket:" field for future proposals in certain states.
New proposals in states {OPEN,ACCEPTED,CLOSED,FINISHED} must have a
"Ticket:" field which may either be a ticket number or a publicly
accessible URL.  When the ticket is just a number, it should be in
reference to Tor's canonical bug tracker.

This information greatly helps both new contributors and relay
operators who are interested in the implementation status of a working
proposal.  This patch permits the "Ticket:" field to be added to older
proposals (<= prop#288), but it does not require it.
2017-12-08 01:53:52 +00:00
Nick Mathewson
c78806e96e mark 284 as finished. 2017-12-05 19:51:51 -05:00
Nick Mathewson
aac4775ffd Merge remote-tracking branch 'dgoulet/ticket20699_02' 2017-12-05 19:45:29 -05:00
Nick Mathewson
48e41c559f Merge remote-tracking branch 'teor/bug23826-23828-v2' 2017-12-04 11:48:43 -05:00
Nick Mathewson
0596c2cbb2 mark prop280 as superseded 2017-12-01 15:25:35 -05:00
Nick Mathewson
8f56a246f8 Add privcount-with-shamir proposal 2017-12-01 15:25:10 -05:00
Nick Mathewson
475662feb6 Add proposal 287, for real this time 2017-11-30 16:53:51 -05:00
Nick Mathewson
bca928a5ac Add proposal 287 2017-11-30 16:53:35 -05:00
Nick Mathewson
71dc93753b Add prop286: Controller APIs for hibernation access on mobile 2017-11-30 07:55:06 -05:00
teor
b523c5c488
Revise proposal 283 based on Nick's feedback 2017-11-22 00:21:55 +11:00
David Goulet
7ad96f18a0 prop284: Extend HSPOST to accept an onion address
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-15 14:42:44 -05:00
Nick Mathewson
4e5b61abb3 285: fix up some of the simpler issues 2017-11-14 14:33:12 -05:00
Nick Mathewson
5ba8d5a7d0 proposal 285: utf-8 all the things 2017-11-13 13:50:59 -05:00
David Goulet
3607351acf prop284: Specify that the REPLICA= argument can't be used
For v3, we don't have this concept of replica attached to a descriptor ID.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-10 15:22:01 -05:00
David Goulet
60f572f0f5 prop284: 32 bytes base64 encoded is 43 bytes, not 32
Trivial fix.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-10 12:06:57 -05:00
David Goulet
f8122635bc prop284: Improve the ADD_ONION new key type wording
Also define the new ed25519 key blob encoding format which is the same
format as the current v2 key blob is expected to be in.

Closes #24165

Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-07 15:07:12 -05:00
David Goulet
9a53e606a0 prop284: dos2unix the proposal
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-07 14:48:35 -05:00
Nick Mathewson
bbb6d34cca add proposal 284: Hidden Service v3 Control Port 2017-11-06 10:02:15 -05:00
teor
c0fbf52667
Fix a minor size miscalculation in prop283 2017-10-26 16:13:40 +11:00
Nick Mathewson
70911f81ea Add 283: Move IPv6 ORPorts from microdescriptors to the microdesc consensus 2017-10-25 12:18:14 -04:00
Nick Mathewson
ae287fa97e Mark proposals 220 and 244 as closed. 2017-09-20 13:44:04 -04:00
Nick Mathewson
6f9b3e058f Close proposal 162 as "as implemented as it will get. 2017-09-20 10:23:42 -04:00
Nick Mathewson
e360873db5 Mark prop158 closed. It has been merged into the spec ages ago. 2017-09-20 10:19:12 -04:00
Nick Mathewson
17d433247b In prop196, note that USERADDR port is not optional.
Part of ticket 23080.
2017-09-20 08:40:45 -04:00
Nick Mathewson
471af27b55 Create rend-spec-v3.txt based on proposal 224 2017-09-19 14:33:33 -04:00
Nick Mathewson
410335394d make validation MUST; clarify behavior on failure. 2017-09-19 10:32:58 -04:00
Nick Mathewson
4be7ff5ce8 Merge remote-tracking branch 'asn/bug22743' 2017-09-19 10:32:14 -04:00
George Kadianakis
210e19d61b prop224: Specify and motivate client-side address validation.
Also see #23019 for the code patch.
2017-09-19 17:25:33 +03:00
Nick Mathewson
609abee710 Merge remote-tracking branch 'dgoulet/ticket22979_01' 2017-09-18 14:58:41 -04:00
Nick Mathewson
a3d9506c67 Merge remote-tracking branch 'dgoulet/ticket23340_01' 2017-09-18 14:55:47 -04:00
George Kadianakis
417aac20fb prop224: Improve some prop224 metadata.
- Revise author list and acknowledgements list.
- Write list of prop224 improvements
- Kill a spare TODO.
2017-09-18 15:36:09 +03:00
David Goulet
2922ca3243 prop224: Remove the HSDir3 flag concept
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-09-18 08:34:10 -04:00
George Kadianakis
c396cac0f6 prop224: Specify ed25519 base point and add reference. 2017-09-18 15:17:31 +03:00
George Kadianakis
6453c7dc4e prop224: No special INTRODUCE1 cell for legacy intro points.
Intro points don't care about the contents of the INTRO1 cell as long as
the first 20 bytes are correctly formatted, so we don't need to have a
special cell for legacy intros. Remove all references to it.
2017-09-18 15:07:01 +03:00
George Kadianakis
de34dc5965 prop224: Specify that we have a replay cache for rendezvous cookies.
See replay_cache_rend_cookie in the codebase.
2017-09-18 14:53:34 +03:00
George Kadianakis
26c35f957f prop224: RENDEZVOUS2 is RENDEZVOUS1 minus the cookie 2017-09-18 14:51:33 +03:00
David Goulet
0667997d79 prop224: Add an intro onion key in the descriptor
The onion key for the ntor handshake is missing in the descriptor in order
for the client to extend to it.

Ticket #22979

Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-09-15 10:03:08 -04:00
Roger Dingledine
eb7c64b9ba other easier fixes to prop#280 2017-09-12 22:39:29 -04:00
teor
51825e0d22
Fix some prop280 typos reported by arma 2017-09-13 11:51:44 +10:00
Nick Mathewson
cb2960f6ba Add proposal 282 2017-09-12 10:13:43 -04:00