Commit Graph

3020 Commits

Author SHA1 Message Date
Mike Perry
f26e739db4 Padding spec update for Bug 30992's machine_ctr field. 2020-06-10 17:39:13 -05:00
Nick Mathewson
87eefe8c53 Walking onions proposal is completed.
Or at least, the first version of it.
2020-06-03 11:02:52 -04:00
Nick Mathewson
4f8d5a4b24 Add proposals 321 and 322 for walking-onions-related stuff 2020-05-27 15:12:01 -04:00
Nick Mathewson
73060b223c Merge remote-tracking branch 'tor-github/pr/116' 2020-05-22 10:22:57 -04:00
Nick Mathewson
238a098e0b prop319: correct some typos about cell types. 2020-05-19 12:37:09 -04:00
teor
560c9181ca
tor-spec: Add Relay=3 protocol version
With minor edits from the draft in proposal 311.

Closes ticket 33227.
2020-05-18 12:59:48 +10:00
Roger Dingledine
63a9476cfd resolve singularity for which version used the new version spec 2020-05-16 18:10:17 -04:00
Nick Mathewson
3c14e0a7cd a minor edit on 320 2020-05-11 16:46:16 -04:00
Nick Mathewson
bb347f8a69 a few missing words in prop 319 2020-05-11 16:11:33 -04:00
Nick Mathewson
f160516451 Add proposal 320 for removing TAP finally 2020-05-11 16:11:11 -04:00
Nick Mathewson
8560a5be21 Add proposal 319: RELAY_FRAGMENT cells 2020-05-11 16:06:20 -04:00
Nick Mathewson
4625a59da9 Add proposal 318, to limit the range of subprotocol versions. 2020-05-11 16:02:59 -04:00
Nick Mathewson
2dd966b784 Proposal 314 has been accepted; proposals can be markdown. 2020-05-11 15:57:05 -04:00
Nick Mathewson
e889dbe264 prop315: update to describe bridges
We need to be a little more careful when making things required on
bridge descriptors, but only a little: the partitioning
opportunities aren't that bad.
2020-05-11 09:44:48 -04:00
teor
00d67ace14
Prop 311: Make self-tests slightly stricter
Ignore create cells from clients when checking for relay reachability.

Part of 33222.
2020-05-08 09:40:36 +10:00
teor
d6e18ebe53
Prop 311: Say "port forwarding" for clarity 2020-05-01 17:23:44 +10:00
teor
40486e0b5e
Prop 311: Another reachability edge case
Part of 33222.
2020-05-01 17:14:37 +10:00
Nick Mathewson
2b31c63891 Correct the certificate extension identifier for signed-with-ed25519-key
I believe it was an error to use "4" for this value, but the error
has been enshrined in implementation.
2020-04-28 10:10:34 -04:00
teor
b43b915661
tor-spec: Do the same extend checks as tor
Update the extend checks to match tor's implementation, particularly
the comments in channel_tls_matches_target_method().
2020-04-28 21:07:24 +10:00
teor
79fba6de64
tor-spec: Explain the truncated reason better
It's the payload of a DESTROY cell, but the data of a RELAY_TRUNCATED
cell.
2020-04-28 17:34:15 +10:00
teor
ce0d233f6d
tor-spec: Extends accept all-zero ed25519 keys
The spec gives conficting advice about all-zero ed25519 keys in extends.
Resolve this conflict by documenting tor's current behaviour.

Also move a sentence about circuit IDs, so it's closer to the associated
paragraph.
2020-04-28 17:30:30 +10:00
teor
f12126bd8a
Prop 311: Add design for reachability circuits
Update 4.2.3. Separate IPv4 and IPv6 Reachability Flags.

Add a detailed design for checking cells on reachability self-test
circuits.
2020-04-28 13:40:30 +10:00
teor
2e67ae1c70
Prop 312: Clarify torrc Address option
Clarify section 3.2.1.  Make the Address torrc Option Support IPv6.

The list of possible configurations was incorrect.
2020-04-28 13:20:11 +10:00
Nick Mathewson
df3c4f559b add proposal 317 from Christian Hofer. 2020-04-27 08:40:05 -04:00
Nick Mathewson
2ec807e104 whitespace fixes on proposal 295. 2020-04-23 15:21:46 -04:00
Nick Mathewson
2202910e2b Latest version of proposal 295 (from Jan :/ ) 2020-04-23 15:20:50 -04:00
Nick Mathewson
ade20b9265 proposal 316: flashflow. 2020-04-23 15:12:30 -04:00
Nick Mathewson
3ada0e7ed3 Add proposal 314 (markdown) and 315 (required fields.)
Also tweak reindex.py under the assumption that we will be accepting
proposal 314.
2020-04-23 10:43:48 -04:00
Georg Koppen
47b495f5f0
Bug 33759: Fix recent_measurements_excluded_few_count key 2020-03-30 13:32:56 +00:00
Nick Mathewson
0832bcb2ad Merge remote-tracking branch 'tor-github/pr/114' 2020-03-26 10:39:05 -04:00
teor
f81b1e6cc5
dir-list: Fix a version typo 2020-03-13 11:22:41 +10:00
Nick Mathewson
2692b1c94c Merge branch 'master' of git-rw.torproject.org:/torspec 2020-03-12 12:48:22 -04:00
Nick Mathewson
2896446cea Merge remote-tracking branch 'tor-github/pr/113' 2020-03-12 12:48:12 -04:00
Nick Mathewson
739c26d0f6 Merge remote-tracking branch 'tor-github/pr/107' 2020-03-12 12:47:52 -04:00
Steven Engler
f633334867
dir-spec: descriptor differences are cosmetic if 2 hours, not 12 hours
See ticket 33573.
2020-03-09 10:01:27 -04:00
juga0
1621056cf7 bandwidth-file: Replace Add by Adds 2020-03-05 14:27:52 +00:00
juga0
9cf0d3fbcb bandwidth-file: Remove specification version 1.3.0.
since there was never a bandwidth file published by bwauths using that
nor sbws ever generated that version because it was forgotten to
increment it when adding country related KeyValues.
2020-03-05 14:27:52 +00:00
juga0
7b12eb7cee bandwidth-file: Add forgotten KeyValues
Some bandwidth related KeyValues were added to the version 1.2.0,
but they were forgotten when writing this specification.
The same happened with some monitoring KeyValues in the version 1.4.0.
They have not been added to the examples, since they don't contain all
the KeyValues.

Closes #30726.
2020-03-05 14:27:52 +00:00
George Kadianakis
0bfbfadc15 rend-spec-v3.txt: Various spec fixes from OBv3 development.
- "auth-client" is actually a mandatory field right now.

- The intro point cross-certificates are the other way around (#29853)

- The descriptor MAC includes the salt_len and it's not the
  standard v3 MAC format.
2020-03-04 19:34:19 +02:00
George Kadianakis
bde904ab95 control-spec.txt: CONSENSUS_ARRIVED is a STATUS_CLIENT event. 2020-03-04 19:33:53 +02:00
juga0
4ec93f2d8b bandwidth-file: Correct KeyValues names
The KeyValues never appeared in a bandwidth file generated by the
bwauths with those names, it was a mistake when writing this
specification.

The replacements done are:

- s/desc_bw_average/desc_bw_avg/
- s/desc_obs_bw_last/desc_bw_obs_last/
- s/desc_obs_bw_mean/desc_bw_obs_mean/

And in the examples:

- s/desc_avg_bw/desc_bw_avg/
- s/desc_obs_bw_last/desc_bw_obs_last/
- s/desc_obs_bw_mean/desc_bw_obs_mean/

Part of #30726.
2020-03-03 14:58:04 +00:00
teor
373e4eb21c
Prop 313: Remove ConnDirectionStatistics bug
Bug 33214 wasn't actually a bug, it was just a mistake in the analysis.

Part of 33052.
2020-02-24 14:33:44 +10:00
Nick Mathewson
0c42e77da8 Merge branch 'ticket4631_squashed' 2020-02-20 08:19:21 -05:00
teor
a300681487 dir-spec: Edit uploaded vote rejection spec
Be more specific: clearly distinguish between uploaded and downloaded
votes.

Add the Tor version that introduces this behaviour.

Spec for ticket 4631.
2020-02-20 08:19:12 -05:00
teor
0e44723e90
dir-spec: Fix a typo in subprotocol version voting 2020-02-12 19:56:05 +10:00
teor
1617310eb6
Prop 313: Fix Impacts of Consensus Health IPv6
Part of 33052.
2020-02-11 21:27:22 +10:00
teor
e25eb89d2e
Prop 313: Make a Section Title Clearer
Part of 33052.
2020-02-11 21:23:35 +10:00
teor
90f989d83a
Prop 313: Remove Medium-Term Stats from Consensus Health
We don't want to put stats on Consensus Health, if they depend on Wgd,
because those stats are designed for Sponsor 55 in 2020.

(If Wgd ever changes, we don't want the stats to be wrong.)

Part of 33052.
2020-02-11 21:19:53 +10:00
teor
8af14dea81
Prop 312: Clarify IPv6 ORPort Binding
Part of 33049.
2020-02-11 14:11:09 +10:00
teor
e759c0ec4e
Prop 312: Clarify OS hostname API behaviour
Part of 33049.
2020-02-11 13:38:17 +10:00