Nick Mathewson
2804c6b7ff
Merge commit 'karsten/rendspec-koryk'
2010-08-25 16:44:37 -04:00
Nick Mathewson
a509dbba50
Merge commit 'karsten/dirbytes2'
...
Conflicts:
src/or/rephist.h
2010-08-18 10:06:14 -04:00
Karsten Loesing
db94b7f46e
Count bytes we spend on answering directory requests.
2010-08-18 13:54:41 +02:00
Karsten Loesing
8e8a34eb74
Add koryk's modifications to rend-spec.
2010-08-17 10:02:07 +02:00
Nick Mathewson
9bcea4a8ef
Merge commit 'sebastian/misc-reason'
2010-08-15 21:27:32 -04:00
Sebastian Hahn
2d8db2aacb
Fix url in rend-spec
...
Fixes bug 1822
2010-08-12 02:40:19 +02:00
Sebastian Hahn
28962ecae8
Fix a typo in control-spec
2010-08-12 02:38:58 +02:00
Sebastian Hahn
161b275028
Retry streams that ended with NOROUTE error
...
Also add the NOROUTE reason to control-spec.
2010-08-04 00:51:39 +02:00
Nick Mathewson
cafd868a78
Clarify that implementation is for discussion of implementation
2010-08-03 14:25:07 -04:00
Nick Mathewson
d5abd0b43e
Add proposal 174 from Ian Goldberg: Optimistic Data for Tor: Server Side
2010-08-03 14:23:51 -04:00
Nick Mathewson
9d317e9bb4
Bless two proposals from Damian Johnson as 172 and 173.
...
(Leaving a gap for the proposal Jake blessed as 171.)
2010-08-03 13:23:34 -04:00
Sebastian Hahn
150ed553df
Introduce END_STREAM_REASON_NOROUTE
2010-08-03 16:46:28 +02:00
Nick Mathewson
05fa0a3ef6
Merge commit 'sebastian/rend-spec'
2010-08-03 09:16:24 -04:00
Sebastian Hahn
8557f64220
Clarify that rend cookies shouldn't be reused
2010-08-03 14:48:17 +02:00
Karsten Loesing
b3b3c919c6
Fix copy-and-paste fail in dir-spec.txt.
2010-08-03 13:12:06 +02:00
Karsten Loesing
1cf6da821c
Add two authoritzation protocols to rend-spec.txt.
2010-07-30 10:33:28 +02:00
Karsten Loesing
9ecb64c44d
Clean up Section 1 of rend-spec.txt.
2010-07-30 10:33:28 +02:00
Karsten Loesing
6e4c06598f
Interchange sections 1.2 and 1.3.
2010-07-30 10:29:14 +02:00
Karsten Loesing
f6e0dc2a6e
Rename all RELAY_* cell types to RELAY_COMMAND_*.
2010-07-30 10:28:07 +02:00
Mike Perry
9d5d0f040f
Alter how guard flags are chosen.
...
V3 authorities no longer decide not to vote on Guard+Exit. The bandwidth
weights should take care of this now.
Also, lower the max threshold for WFU to 0.98, to allow more nodes to become
guards.
2010-07-14 20:49:19 -07:00
Nick Mathewson
bea55766af
Merge remote branch 'mikeperry/cbt-bugfixes3'
2010-06-29 18:57:50 -04:00
Nick Mathewson
deb9e4aff7
Make spec docs reference RFC2119
...
Now people will have no excuse for not knowing what "MUST" and "MAY"
mean. Fixes bug 1310.
2010-06-25 14:58:25 -04:00
Mike Perry
2abe1ceccf
Add CLOSE_MS and CLOSE_RATE keywords to buildtimeout event.
2010-06-15 20:04:49 -07:00
Nick Mathewson
faef0fa35d
Merge commit 'sjmurdoch/xxx-using-spdy'
2010-06-11 13:25:38 -04:00
Mike Perry
81736f426f
Update spec with new right-censored pareto estimators.
2010-06-09 00:22:39 -07:00
Mike Perry
29e0d70814
Bug 1296: Add option+logic to disable CBT learning.
...
There are now four ways that CBT can be disabled:
1. Network-wide, with the cbtdisabled consensus param.
2. Via config, with "LearnCircuitBuildTimeout 0"
3. Via config, with "AuthoritativeDirectory 1"
4. Via a state file write failure.
2010-05-10 13:11:48 -07:00
Mike Perry
e84025bc2b
Update path-spec.txt with contents of proposal 151.
2010-05-10 12:59:05 -07:00
Mike Perry
835ab53102
Add a TIMEOUT_RATE keyword to buildtimeout event.
2010-05-10 12:59:05 -07:00
Nick Mathewson
96a0edf373
Rename CircPriorityHalflifeMsec to CircuitPriorityHalflifeMsec
...
Everything that accepted the 'Circ' name handled it wrong, so even now
that we fixed the handling of the parameter, we wouldn't be able to
set it without making all the 0.2.2.7..0.2.2.10 relays act wonky.
This patch makes Tors accept the 'Circuit' name instead, so we can
turn on circuit priorities without confusing the versions that treated
the 'Circ' name as occasion to act weird.
2010-04-13 13:29:30 -04:00
Nick Mathewson
28cda33299
Add a missing NL to dir-spec.
...
Found by Oğuz
2010-03-21 12:45:01 -04:00
Nick Mathewson
03b9c2cb90
fix some dangling refs in dirspec
2010-03-15 15:41:59 -04:00
Steven Murdoch
9e473bd1be
Update idea xxx-using-spdy, based on or-dev discussion
...
- Mention potentially negative consequence of server push, combined
with client caching
- Make the new cell type more generic, allowing other types of
exit-side transforms (suggested by nickm)
See http://archives.seul.org/or/dev/Feb-2010/msg00000.html
2010-03-14 19:07:52 +00:00
Nick Mathewson
f8d176d1b9
Clarify title of section 3.3
2010-03-13 14:54:05 -05:00
Steven Murdoch
9c315bda0e
Add new idea: Using the SPDY protocol to improve Tor performance
2010-03-12 21:17:46 +00:00
Nick Mathewson
2d29c7be2d
Document possibility of "unknown" version state.
...
reported by atagar; fixes bug 1289.
2010-03-09 00:08:38 -05:00
Nick Mathewson
ac8b8bca11
Clarify that CRLF means "A CR then an LF". Explain what those are.
...
Apparently this is not as obvious as I thought.
2010-03-05 17:00:42 -05:00
Sebastian Hahn
f3003d588f
Add proposal 170 "Configuration options regarding circuit building"
2010-03-03 23:56:59 -05:00
Nick Mathewson
2ab3389ed6
Merge remote branch 'mikeperry/consensus-bw-weights5-merge'
...
Conflicts:
ChangeLog
2010-02-25 16:22:29 -05:00
Mike Perry
00f9a35678
Update dir-spec.txt with begin_dir weights.
2010-02-25 11:42:24 -08:00
Mike Perry
4311318f7d
Update consensus methods in spec.
2010-02-22 18:43:44 -08:00
Nick Mathewson
2e159967c9
Mark 160 and 161 as Finished.
2010-02-22 20:52:32 -05:00
Mike Perry
5d4f5ef07d
Update specs for weight computation and use.
2010-02-22 16:52:11 -08:00
Roger Dingledine
a8a0542c77
minor fixes in proposal 169
...
still need to finish reading it, but so far so good
2010-02-21 17:20:37 -05:00
Mike Perry
ac68704f07
Allow "EXTENDCIRCUIT 0" to omit a path.
2010-02-18 09:08:31 -08:00
Mike Perry
8512e33773
Add BUILDTIMEOUT_SET event for CBT stress testing.
2010-02-18 09:08:31 -08:00
Nick Mathewson
f75f7322b9
Clarify a paragraph in prop 169.
2010-01-29 16:39:27 -05:00
Nick Mathewson
c5380d6064
The name for the proposal status of 151 is "finished", not "Implemented"
2010-01-28 00:04:45 -05:00
Nick Mathewson
380d00246b
Proposal 169: Eliminate TLS renegotiation
...
I propose a backward-compatible change to the Tor connection
establishment protocol to avoid the use of TLS
renegotiation.
Rather than doing a TLS renegotiation to exchange
certificates and authenticate the original handshake, this
proposal takes an approach similar to Steven Murdoch's
proposal 124, and uses Tor cells to authenticate the
parties' identities once the initial TLS handshake is
finished.
2010-01-28 00:04:25 -05:00
Roger Dingledine
b9f1bd3c4e
whitespace fixes
2010-01-15 15:58:35 -05:00
Roger Dingledine
397f7c874f
fix some typos in our spec files
2010-01-15 15:56:54 -05:00