Sebastian Hahn
f3003d588f
Add proposal 170 "Configuration options regarding circuit building"
2010-03-03 23:56:59 -05:00
Nick Mathewson
2e159967c9
Mark 160 and 161 as Finished.
2010-02-22 20:52:32 -05:00
Roger Dingledine
a8a0542c77
minor fixes in proposal 169
...
still need to finish reading it, but so far so good
2010-02-21 17:20:37 -05:00
Nick Mathewson
f75f7322b9
Clarify a paragraph in prop 169.
2010-01-29 16:39:27 -05:00
Nick Mathewson
c5380d6064
The name for the proposal status of 151 is "finished", not "Implemented"
2010-01-28 00:04:45 -05:00
Nick Mathewson
380d00246b
Proposal 169: Eliminate TLS renegotiation
...
I propose a backward-compatible change to the Tor connection
establishment protocol to avoid the use of TLS
renegotiation.
Rather than doing a TLS renegotiation to exchange
certificates and authenticate the original handshake, this
proposal takes an approach similar to Steven Murdoch's
proposal 124, and uses Tor cells to authenticate the
parties' identities once the initial TLS handshake is
finished.
2010-01-28 00:04:25 -05:00
Nick Mathewson
a007a7c6ba
Revise consensus-flavors proposal to better URLs.
...
The old flavored consensus URL format made it harder to decode URLs
based on their prefixes, and didn't take into account our "only give
it to me if it's signed by enough authorities" stuff.
2009-10-18 18:46:12 -04:00
Nick Mathewson
0bce0161dd
Revise proposal 162: SHA256(x), not SHA256(SHA256(x))
...
The point of doing SHA256 twice is, generally, is to prevent message
extension attacks where an attacker who knows H(A) can calculate
H(A|B). But for attaching a signature to a document, the attacker
already _knows_ A, so trying to keep them from calculating H(A|B) is
pointless.
2009-10-15 15:17:13 -04:00
Nick Mathewson
80a7a34755
Revise 162's idea of how detached signatures work with flavors
...
The original proposal was vague and would have made older Tors reject
detached-signature documents as soon as they saw one with flavors.
2009-10-15 15:17:12 -04:00
Roger Dingledine
cf2afcd707
Fix typos and comments, plus two bugs
...
A) We were considering a circuit had timed out in the special cases
where we close rendezvous circuits because the final rendezvous
circuit couldn't be built in time.
B) We were looking at the wrong timestamp_created when considering
a timeout.
2009-09-20 19:50:44 -04:00
Mike Perry
f39bedf250
Implement and document new network liveness algorithm.
...
Based on irc discussion with arma.
2009-09-20 14:51:30 -07:00
Mike Perry
81dc435ffa
Update proposal to match implementation.
2009-09-16 17:03:54 -07:00
Karsten Loesing
b508e4748f
Remove trailing spaces. As if bytes were free...
...
Also correct some typos.
2009-09-16 15:52:05 -07:00
Mike Perry
fd412549fd
Update proposal to bring it more in-line with implementation.
2009-09-16 15:52:03 -07:00
Nick Mathewson
d9872cc676
Mark proposal 167 as implemented.
2009-09-14 23:24:39 -04:00
Nick Mathewson
1d9b8a1e16
Merge commit 'karsten/proposal-166-impl-master'
2009-08-26 11:36:40 -04:00
Roger Dingledine
f1b5fd2aaa
new proposals: params in consensus, and lower circwindow
2009-08-25 00:34:29 -04:00
Karsten Loesing
75c59d1a92
Some final (?) cleanups of proposal 166 implementation.
2009-08-19 23:36:27 +02:00
Karsten Loesing
dccadb30cd
Clean up proposal 166 and its implementation.
2009-08-18 15:53:08 +02:00
Mike Perry
3a1b9526f8
Update the ratio calculation to prefer faster measurements.
...
Also: simplify complicated filtering steps, always take the
most recent measurement, and use slightly smaller file sizes
based on measurements.
2009-08-06 14:38:54 -07:00
Mike Perry
011b732436
Update 161 to reflect current implementation.
...
Also mention rounding step.
2009-08-06 14:38:36 -07:00
Karsten Loesing
884c621aa7
Proposal: Including Network Statistics in Extra-Info Documents
2009-07-23 10:59:00 -04:00
Nick Mathewson
bdd5785f07
Small changes to proposals 158 and 162 based on comments from arma
2009-06-15 14:18:32 -04:00
Nick Mathewson
7404c936d0
Finish an incomplete sentence in a proposal.
2009-06-07 23:53:05 -04:00
Roger Dingledine
08fd7e61c7
proposals tweaks patch
...
is attached
--roger
>From 674f087ab98e1711bb533acf23ee88c7c2a1dfdb Mon Sep 17 00:00:00 2001
From: Roger Dingledine <arma@torproject.org>
Date: Sun, 7 Jun 2009 14:37:32 -0400
Subject: [PATCH] minor edits on proposals
2009-06-07 23:51:14 -04:00
Sebastian Hahn
169c019a60
spelling fixes for proposals
2009-06-06 23:42:07 +02:00
Nick Mathewson
5948543644
Clarify some of proposal 165 based on discussion
2009-05-29 14:51:32 -04:00
Nick Mathewson
2c8b56c029
Proposal 165: Easy migration for voting authority sets.
...
This proposal tries to do what 134 tried to do, but more securely and
with less whiz-bang NP-hard computation. Peter had the basic idea.
2009-05-28 12:48:38 -04:00
Nick Mathewson
e86ad6b7fb
Reject proposal 134
2009-05-27 14:33:44 -04:00
Roger Dingledine
4c548cd51b
early thoughts on a safer way to reach a service via a particular exit.
2009-05-24 20:31:20 -04:00
Roger Dingledine
7df5c031e8
add mikeperry's notes about fairer round-robin for rate limiting
2009-05-24 20:31:20 -04:00
Nick Mathewson
9f69b3d94c
[prop140] Note another useful restriction of ed format.
2009-05-22 15:55:40 -04:00
Nick Mathewson
0adb8c8386
Short proposal on reporting why authorities voted as they did
2009-05-22 02:58:42 -04:00
Nick Mathewson
047bc09565
New short proposal about detecting if a node is a client.
2009-05-22 02:57:54 -04:00
Mike Perry
4e1b20b1d3
Finish incomplete sentence.
2009-05-21 21:38:50 -07:00
Mike Perry
f55a70b640
Update proposal 160 with comments from mailinglist.
...
Also add implementation details and a timestampt to the output of 161.
2009-05-19 21:24:18 -07:00
Marian
2619e35942
New proposal draft about migrating ciphers and hashes in the Tor protocol.
2009-05-16 11:58:56 -04:00
Nick Mathewson
573aeb769e
Major revision of proposal 158.
...
The big changes are to go from a "caches compute the micro-descriptor"
format to an "authorities generate microdescriptors" format.
See or-dev discussions of January 2009 for full rationales.
2009-05-16 00:42:27 -04:00
Nick Mathewson
143e6677ff
Add acks section to prop 162.
2009-05-15 16:32:18 -04:00
Nick Mathewson
dc1253af7b
Add new proposal 162: "Publish the consensus in multiple flavors"
2009-05-15 13:03:42 -04:00
Mike Perry
2a4c6207ad
Update proposal 161 to reflect mailinglist discussion.
2009-05-14 17:53:11 -04:00
Nick Mathewson
ce768fc06e
Add proposal 161: computing bandwidth adjustments
2009-05-12 23:00:05 -04:00
Nick Mathewson
183b5905bb
Remove some stuff from the SHA-1 paragraph.
...
We don't need to explain the difference between 2nd preimage and
collision: anybody who doesn't know can use wikipedia.
2009-05-08 12:52:18 -04:00
Marian
7a2c8e55af
Clarify some points in what-uses-sha1.
2009-05-08 12:46:43 -04:00
Sebastian Hahn
deea710cdc
Fix typo in 001-process.txt
2009-05-05 11:12:41 -04:00
Sebastian Hahn
d230827912
Remove all svn metadata minus what I missed.
...
Tor doesn't use SVN anymore, making $Revision$, $Id$ and $Date$
meaningless. Remove them without replacement.
2009-05-05 17:05:46 +02:00
Sebastian Hahn
d0cb5e5b0b
SVN-specific metadata should no longer be part of a proposal
...
Update the proposal creation instructions to remove the Version
and Last-Modified fields.
2009-05-05 17:05:45 +02:00
Roger Dingledine
df8a47464a
add a new proposal for authorities to vote for bandwidth "offsets"
2009-05-05 08:53:12 -04:00
Roger Dingledine
ae8e0aeca6
Fix typos in proposal 141.
2009-05-05 08:52:22 -04:00
Nick Mathewson
7e411f4b30
Initial division of SHA1 uses by collision/preimage needs.
...
More thought is needed on each collision opportunity to figure out how
exploitable it is.
2009-05-02 11:52:38 -05:00