Commit Graph

362 Commits

Author SHA1 Message Date
Nick Mathewson
2e159967c9 Mark 160 and 161 as Finished. 2010-02-22 20:52:32 -05:00
Roger Dingledine
a8a0542c77 minor fixes in proposal 169
still need to finish reading it, but so far so good
2010-02-21 17:20:37 -05:00
Nick Mathewson
f75f7322b9 Clarify a paragraph in prop 169. 2010-01-29 16:39:27 -05:00
Nick Mathewson
c5380d6064 The name for the proposal status of 151 is "finished", not "Implemented" 2010-01-28 00:04:45 -05:00
Nick Mathewson
380d00246b Proposal 169: Eliminate TLS renegotiation
I propose a backward-compatible change to the Tor connection
establishment protocol to avoid the use of TLS
renegotiation.

Rather than doing a TLS renegotiation to exchange
certificates and authenticate the original handshake, this
proposal takes an approach similar to Steven Murdoch's
proposal 124, and uses Tor cells to authenticate the
parties' identities once the initial TLS handshake is
finished.
2010-01-28 00:04:25 -05:00
Nick Mathewson
a007a7c6ba Revise consensus-flavors proposal to better URLs.
The old flavored consensus URL format made it harder to decode URLs
based on their prefixes, and didn't take into account our "only give
it to me if it's signed by enough authorities" stuff.
2009-10-18 18:46:12 -04:00
Nick Mathewson
0bce0161dd Revise proposal 162: SHA256(x), not SHA256(SHA256(x))
The point of doing SHA256 twice is, generally, is to prevent message
extension attacks where an attacker who knows H(A) can calculate
H(A|B).  But for attaching a signature to a document, the attacker
already _knows_ A, so trying to keep them from calculating H(A|B) is
pointless.
2009-10-15 15:17:13 -04:00
Nick Mathewson
80a7a34755 Revise 162's idea of how detached signatures work with flavors
The original proposal was vague and would have made older Tors reject
detached-signature documents as soon as they saw one with flavors.
2009-10-15 15:17:12 -04:00
Roger Dingledine
cf2afcd707 Fix typos and comments, plus two bugs
A) We were considering a circuit had timed out in the special cases
where we close rendezvous circuits because the final rendezvous
circuit couldn't be built in time.
B) We were looking at the wrong timestamp_created when considering
a timeout.
2009-09-20 19:50:44 -04:00
Mike Perry
f39bedf250 Implement and document new network liveness algorithm.
Based on irc discussion with arma.
2009-09-20 14:51:30 -07:00
Mike Perry
81dc435ffa Update proposal to match implementation. 2009-09-16 17:03:54 -07:00
Karsten Loesing
b508e4748f Remove trailing spaces. As if bytes were free...
Also correct some typos.
2009-09-16 15:52:05 -07:00
Mike Perry
fd412549fd Update proposal to bring it more in-line with implementation. 2009-09-16 15:52:03 -07:00
Nick Mathewson
d9872cc676 Mark proposal 167 as implemented. 2009-09-14 23:24:39 -04:00
Nick Mathewson
1d9b8a1e16 Merge commit 'karsten/proposal-166-impl-master' 2009-08-26 11:36:40 -04:00
Roger Dingledine
f1b5fd2aaa new proposals: params in consensus, and lower circwindow 2009-08-25 00:34:29 -04:00
Karsten Loesing
75c59d1a92 Some final (?) cleanups of proposal 166 implementation. 2009-08-19 23:36:27 +02:00
Karsten Loesing
dccadb30cd Clean up proposal 166 and its implementation. 2009-08-18 15:53:08 +02:00
Mike Perry
3a1b9526f8 Update the ratio calculation to prefer faster measurements.
Also: simplify complicated filtering steps, always take the
most recent measurement, and use slightly smaller file sizes
based on measurements.
2009-08-06 14:38:54 -07:00
Mike Perry
011b732436 Update 161 to reflect current implementation.
Also mention rounding step.
2009-08-06 14:38:36 -07:00
Karsten Loesing
884c621aa7 Proposal: Including Network Statistics in Extra-Info Documents 2009-07-23 10:59:00 -04:00
Nick Mathewson
bdd5785f07 Small changes to proposals 158 and 162 based on comments from arma 2009-06-15 14:18:32 -04:00
Nick Mathewson
7404c936d0 Finish an incomplete sentence in a proposal. 2009-06-07 23:53:05 -04:00
Roger Dingledine
08fd7e61c7 proposals tweaks patch
is attached

--roger

>From 674f087ab98e1711bb533acf23ee88c7c2a1dfdb Mon Sep 17 00:00:00 2001
From: Roger Dingledine <arma@torproject.org>
Date: Sun, 7 Jun 2009 14:37:32 -0400
Subject: [PATCH] minor edits on proposals
2009-06-07 23:51:14 -04:00
Sebastian Hahn
169c019a60 spelling fixes for proposals 2009-06-06 23:42:07 +02:00
Nick Mathewson
5948543644 Clarify some of proposal 165 based on discussion 2009-05-29 14:51:32 -04:00
Nick Mathewson
2c8b56c029 Proposal 165: Easy migration for voting authority sets.
This proposal tries to do what 134 tried to do, but more securely and
with less whiz-bang NP-hard computation.  Peter had the basic idea.
2009-05-28 12:48:38 -04:00
Nick Mathewson
e86ad6b7fb Reject proposal 134 2009-05-27 14:33:44 -04:00
Roger Dingledine
4c548cd51b early thoughts on a safer way to reach a service via a particular exit. 2009-05-24 20:31:20 -04:00
Roger Dingledine
7df5c031e8 add mikeperry's notes about fairer round-robin for rate limiting 2009-05-24 20:31:20 -04:00
Nick Mathewson
9f69b3d94c [prop140] Note another useful restriction of ed format. 2009-05-22 15:55:40 -04:00
Nick Mathewson
0adb8c8386 Short proposal on reporting why authorities voted as they did 2009-05-22 02:58:42 -04:00
Nick Mathewson
047bc09565 New short proposal about detecting if a node is a client. 2009-05-22 02:57:54 -04:00
Mike Perry
4e1b20b1d3 Finish incomplete sentence. 2009-05-21 21:38:50 -07:00
Mike Perry
f55a70b640 Update proposal 160 with comments from mailinglist.
Also add implementation details and a timestampt to the output of 161.
2009-05-19 21:24:18 -07:00
Marian
2619e35942 New proposal draft about migrating ciphers and hashes in the Tor protocol. 2009-05-16 11:58:56 -04:00
Nick Mathewson
573aeb769e Major revision of proposal 158.
The big changes are to go from a "caches compute the micro-descriptor"
format to an "authorities generate microdescriptors" format.

See or-dev discussions of January 2009 for full rationales.
2009-05-16 00:42:27 -04:00
Nick Mathewson
143e6677ff Add acks section to prop 162. 2009-05-15 16:32:18 -04:00
Nick Mathewson
dc1253af7b Add new proposal 162: "Publish the consensus in multiple flavors" 2009-05-15 13:03:42 -04:00
Mike Perry
2a4c6207ad Update proposal 161 to reflect mailinglist discussion. 2009-05-14 17:53:11 -04:00
Nick Mathewson
ce768fc06e Add proposal 161: computing bandwidth adjustments 2009-05-12 23:00:05 -04:00
Nick Mathewson
183b5905bb Remove some stuff from the SHA-1 paragraph.
We don't need to explain the difference between 2nd preimage and
collision: anybody who doesn't know can use wikipedia.
2009-05-08 12:52:18 -04:00
Marian
7a2c8e55af Clarify some points in what-uses-sha1. 2009-05-08 12:46:43 -04:00
Sebastian Hahn
deea710cdc Fix typo in 001-process.txt 2009-05-05 11:12:41 -04:00
Sebastian Hahn
d230827912 Remove all svn metadata minus what I missed.
Tor doesn't use SVN anymore, making $Revision$, $Id$ and $Date$
meaningless. Remove them without replacement.
2009-05-05 17:05:46 +02:00
Sebastian Hahn
d0cb5e5b0b SVN-specific metadata should no longer be part of a proposal
Update the proposal creation instructions to remove the Version
and Last-Modified fields.
2009-05-05 17:05:45 +02:00
Roger Dingledine
df8a47464a add a new proposal for authorities to vote for bandwidth "offsets" 2009-05-05 08:53:12 -04:00
Roger Dingledine
ae8e0aeca6 Fix typos in proposal 141. 2009-05-05 08:52:22 -04:00
Nick Mathewson
7e411f4b30 Initial division of SHA1 uses by collision/preimage needs.
More thought is needed on each collision opportunity to figure out how
exploitable it is.
2009-05-02 11:52:38 -05:00
Nick Mathewson
08e4a07720 delete trailing whitespace in xxx-what-uses-sha1.txt 2009-05-02 11:49:45 -05:00