Commit Graph

370 Commits

Author SHA1 Message Date
Nick Mathewson
cafd868a78 Clarify that implementation is for discussion of implementation 2010-08-03 14:25:07 -04:00
Nick Mathewson
d5abd0b43e Add proposal 174 from Ian Goldberg: Optimistic Data for Tor: Server Side 2010-08-03 14:23:51 -04:00
Nick Mathewson
9d317e9bb4 Bless two proposals from Damian Johnson as 172 and 173.
(Leaving a gap for the proposal Jake blessed as 171.)
2010-08-03 13:23:34 -04:00
Nick Mathewson
bea55766af Merge remote branch 'mikeperry/cbt-bugfixes3' 2010-06-29 18:57:50 -04:00
Mike Perry
e84025bc2b Update path-spec.txt with contents of proposal 151. 2010-05-10 12:59:05 -07:00
Steven Murdoch
9e473bd1be Update idea xxx-using-spdy, based on or-dev discussion
- Mention potentially negative consequence of server push, combined
  with client caching

- Make the new cell type more generic, allowing other types of
  exit-side transforms (suggested by nickm)

See http://archives.seul.org/or/dev/Feb-2010/msg00000.html
2010-03-14 19:07:52 +00:00
Steven Murdoch
9c315bda0e Add new idea: Using the SPDY protocol to improve Tor performance 2010-03-12 21:17:46 +00:00
Sebastian Hahn
f3003d588f Add proposal 170 "Configuration options regarding circuit building" 2010-03-03 23:56:59 -05:00
Nick Mathewson
2e159967c9 Mark 160 and 161 as Finished. 2010-02-22 20:52:32 -05:00
Roger Dingledine
a8a0542c77 minor fixes in proposal 169
still need to finish reading it, but so far so good
2010-02-21 17:20:37 -05:00
Nick Mathewson
f75f7322b9 Clarify a paragraph in prop 169. 2010-01-29 16:39:27 -05:00
Nick Mathewson
c5380d6064 The name for the proposal status of 151 is "finished", not "Implemented" 2010-01-28 00:04:45 -05:00
Nick Mathewson
380d00246b Proposal 169: Eliminate TLS renegotiation
I propose a backward-compatible change to the Tor connection
establishment protocol to avoid the use of TLS
renegotiation.

Rather than doing a TLS renegotiation to exchange
certificates and authenticate the original handshake, this
proposal takes an approach similar to Steven Murdoch's
proposal 124, and uses Tor cells to authenticate the
parties' identities once the initial TLS handshake is
finished.
2010-01-28 00:04:25 -05:00
Nick Mathewson
a007a7c6ba Revise consensus-flavors proposal to better URLs.
The old flavored consensus URL format made it harder to decode URLs
based on their prefixes, and didn't take into account our "only give
it to me if it's signed by enough authorities" stuff.
2009-10-18 18:46:12 -04:00
Nick Mathewson
0bce0161dd Revise proposal 162: SHA256(x), not SHA256(SHA256(x))
The point of doing SHA256 twice is, generally, is to prevent message
extension attacks where an attacker who knows H(A) can calculate
H(A|B).  But for attaching a signature to a document, the attacker
already _knows_ A, so trying to keep them from calculating H(A|B) is
pointless.
2009-10-15 15:17:13 -04:00
Nick Mathewson
80a7a34755 Revise 162's idea of how detached signatures work with flavors
The original proposal was vague and would have made older Tors reject
detached-signature documents as soon as they saw one with flavors.
2009-10-15 15:17:12 -04:00
Roger Dingledine
cf2afcd707 Fix typos and comments, plus two bugs
A) We were considering a circuit had timed out in the special cases
where we close rendezvous circuits because the final rendezvous
circuit couldn't be built in time.
B) We were looking at the wrong timestamp_created when considering
a timeout.
2009-09-20 19:50:44 -04:00
Mike Perry
f39bedf250 Implement and document new network liveness algorithm.
Based on irc discussion with arma.
2009-09-20 14:51:30 -07:00
Mike Perry
81dc435ffa Update proposal to match implementation. 2009-09-16 17:03:54 -07:00
Karsten Loesing
b508e4748f Remove trailing spaces. As if bytes were free...
Also correct some typos.
2009-09-16 15:52:05 -07:00
Mike Perry
fd412549fd Update proposal to bring it more in-line with implementation. 2009-09-16 15:52:03 -07:00
Nick Mathewson
d9872cc676 Mark proposal 167 as implemented. 2009-09-14 23:24:39 -04:00
Nick Mathewson
1d9b8a1e16 Merge commit 'karsten/proposal-166-impl-master' 2009-08-26 11:36:40 -04:00
Roger Dingledine
f1b5fd2aaa new proposals: params in consensus, and lower circwindow 2009-08-25 00:34:29 -04:00
Karsten Loesing
75c59d1a92 Some final (?) cleanups of proposal 166 implementation. 2009-08-19 23:36:27 +02:00
Karsten Loesing
dccadb30cd Clean up proposal 166 and its implementation. 2009-08-18 15:53:08 +02:00
Mike Perry
3a1b9526f8 Update the ratio calculation to prefer faster measurements.
Also: simplify complicated filtering steps, always take the
most recent measurement, and use slightly smaller file sizes
based on measurements.
2009-08-06 14:38:54 -07:00
Mike Perry
011b732436 Update 161 to reflect current implementation.
Also mention rounding step.
2009-08-06 14:38:36 -07:00
Karsten Loesing
884c621aa7 Proposal: Including Network Statistics in Extra-Info Documents 2009-07-23 10:59:00 -04:00
Nick Mathewson
bdd5785f07 Small changes to proposals 158 and 162 based on comments from arma 2009-06-15 14:18:32 -04:00
Nick Mathewson
7404c936d0 Finish an incomplete sentence in a proposal. 2009-06-07 23:53:05 -04:00
Roger Dingledine
08fd7e61c7 proposals tweaks patch
is attached

--roger

>From 674f087ab98e1711bb533acf23ee88c7c2a1dfdb Mon Sep 17 00:00:00 2001
From: Roger Dingledine <arma@torproject.org>
Date: Sun, 7 Jun 2009 14:37:32 -0400
Subject: [PATCH] minor edits on proposals
2009-06-07 23:51:14 -04:00
Sebastian Hahn
169c019a60 spelling fixes for proposals 2009-06-06 23:42:07 +02:00
Nick Mathewson
5948543644 Clarify some of proposal 165 based on discussion 2009-05-29 14:51:32 -04:00
Nick Mathewson
2c8b56c029 Proposal 165: Easy migration for voting authority sets.
This proposal tries to do what 134 tried to do, but more securely and
with less whiz-bang NP-hard computation.  Peter had the basic idea.
2009-05-28 12:48:38 -04:00
Nick Mathewson
e86ad6b7fb Reject proposal 134 2009-05-27 14:33:44 -04:00
Roger Dingledine
4c548cd51b early thoughts on a safer way to reach a service via a particular exit. 2009-05-24 20:31:20 -04:00
Roger Dingledine
7df5c031e8 add mikeperry's notes about fairer round-robin for rate limiting 2009-05-24 20:31:20 -04:00
Nick Mathewson
9f69b3d94c [prop140] Note another useful restriction of ed format. 2009-05-22 15:55:40 -04:00
Nick Mathewson
0adb8c8386 Short proposal on reporting why authorities voted as they did 2009-05-22 02:58:42 -04:00
Nick Mathewson
047bc09565 New short proposal about detecting if a node is a client. 2009-05-22 02:57:54 -04:00
Mike Perry
4e1b20b1d3 Finish incomplete sentence. 2009-05-21 21:38:50 -07:00
Mike Perry
f55a70b640 Update proposal 160 with comments from mailinglist.
Also add implementation details and a timestampt to the output of 161.
2009-05-19 21:24:18 -07:00
Marian
2619e35942 New proposal draft about migrating ciphers and hashes in the Tor protocol. 2009-05-16 11:58:56 -04:00
Nick Mathewson
573aeb769e Major revision of proposal 158.
The big changes are to go from a "caches compute the micro-descriptor"
format to an "authorities generate microdescriptors" format.

See or-dev discussions of January 2009 for full rationales.
2009-05-16 00:42:27 -04:00
Nick Mathewson
143e6677ff Add acks section to prop 162. 2009-05-15 16:32:18 -04:00
Nick Mathewson
dc1253af7b Add new proposal 162: "Publish the consensus in multiple flavors" 2009-05-15 13:03:42 -04:00
Mike Perry
2a4c6207ad Update proposal 161 to reflect mailinglist discussion. 2009-05-14 17:53:11 -04:00
Nick Mathewson
ce768fc06e Add proposal 161: computing bandwidth adjustments 2009-05-12 23:00:05 -04:00
Nick Mathewson
183b5905bb Remove some stuff from the SHA-1 paragraph.
We don't need to explain the difference between 2nd preimage and
collision: anybody who doesn't know can use wikipedia.
2009-05-08 12:52:18 -04:00