summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
| * | | Add some handshake terminology to glossaryTaylor Yu2017-05-19
| | | |
* | | | stop claiming there should be an extra newline in router descriptorsRoger Dingledine2017-05-20
|/ / / | | | | | | | | | | | | we stopped requiring it sometime between 2003 and now, and also we stopped adding it sometime between 2003 and now. closes ticket 6879.
* | | Merge remote-tracking branch 'asn/guard_spec_roger'Nick Mathewson2017-05-19
|\ \ \
| * | | Fix some issues in guard-spec.txt pointed out by arma.George Kadianakis2017-05-19
| | | | | | | | | | | | | | | | See https://lists.torproject.org/pipermail/tor-dev/2017-May/012263.html .
* | | | annotate %include stuff with versionNick Mathewson2017-05-19
| | | |
* | | | Merge remote-tracking branch 'jigsaw/torrc-dir-fix-1922_squashed'Nick Mathewson2017-05-19
|\ \ \ \ | |/ / / |/| | |
| * | | Adds GETCONF FORCE flag and getinfo config-can-saveconf #1922Daniel Pinto2017-05-18
| | | |
* | | | one more fix on guard-specRoger Dingledine2017-05-19
| | | |
* | | | more subtle fixes to guard-specRoger Dingledine2017-05-19
| | | | | | | | | | | | | | | | | | | | i don't think i broke anything, but it would be worth somebody looking over it to be sure.
* | | | easy and hopefully uncontroversial fixes to guard-specRoger Dingledine2017-05-19
| | | | | | | | | | | | | | | | | | | | please do feel free to look through and make sure i didn't break anything though :)
* | | | minor touch-ups on the glossaryRoger Dingledine2017-05-19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the only exciting one is that we don't use guards to defend against "enumeration attacks" -- i'm not quite sure what an enumeration attack is, but it sounds like something where the guard is able to make a list of users, and where having that list is bad news in itself. that's not quite what guards are for.
* | | | clarify a "Consensus methods 11 and before" phrase that's been confusing meRoger Dingledine2017-05-19
| | | |
* | | | trivial whitespace fixRoger Dingledine2017-05-19
|/ / /
* | | Mark proposals 151 and 161 closed.Nick Mathewson2017-05-18
| | | | | | | | | | | | | | | Mike informs me that prop151 got merged into path-spec and 161 got split into dir-spec and a spec file in the bwauth code.
* | | Mark proposals 121 and 155 as closed.Nick Mathewson2017-05-18
| | | | | | | | | | | | | | | | | | According to Karsten, 121 has long been merged into rend-spec.txt, and 155 is implementation-specific stuff that doesn't affect the protocol itself.
* | | Add more correct "implemented-in" versions.Nick Mathewson2017-05-16
| | |
* | | Merge prop274; mark it closed.Nick Mathewson2017-05-16
| | |
* | | Fill in "implemented-in" fields.Nick Mathewson2017-05-16
| | |
* | | Note the part of prop#275 that got implemented.Nick Mathewson2017-05-16
| | |
* | | Update proposal indexNick Mathewson2017-05-16
| | |
* | | Mark prop278 as "finished".Nick Mathewson2017-05-16
| | |
* | | Merge branch 'prop140_completed_squashed'Nick Mathewson2017-05-15
|\ \ \
| * | | Merge prop140 into dir-spec.txtNick Mathewson2017-05-15
| | | |
* | | | resolve a confusing typo about the v3 link handshakeRoger Dingledine2017-05-14
| | | | | | | | | | | | | | | | unless it was meant to be this way, and I'm the one who got confused?
* | | | Prop 278: Return a more standard HTTP status on failure.Yawning Angel2017-05-12
| | | | | | | | | | | | | | | | | | | | | | | | "406 Not Acceptable" is the status code that implementations are supposed to return when a request cannot be serviced due to `Accept-*` headers.
* | | | Merge remote-tracking branch 'dgoulet/ticket21871_01'Nick Mathewson2017-05-11
|\ \ \ \ | |_|_|/ |/| | |
| * | | prop224: Change how descriptor encode encryption keysticket21871_01David Goulet2017-04-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Every intro point, legacy or not, needs a ntor encryption key. However, in the case of a legacy introductin point, we need an extra RSA key so the IP can relay the INTRODUCE1 cell on the right circuit. We now only need the cross certificate for the encryption key because the signing-key extention make sure we have the actual key encoded in that certificate. The legacy key cross certificate doesn't support that extention so we need both the RSA key and the crosscert. Fixes #21871 Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | fix typos in proposal 275Roger Dingledine2017-05-10
| | | |
* | | | Merge remote-tracking branch 'dgoulet/ticket22060_01'Nick Mathewson2017-05-09
|\ \ \ \ | |_|/ / |/| | |
| * | | dir-spec: Add obsolete version for allow-single-hop-exitsticket22060_01David Goulet2017-04-25
| | | | | | | | | | | | | | | | | | | | | | | | We've rendered this option obsolete in 0.3.1.0-alpha. Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | small edits and tweaksNick Mathewson2017-05-09
| | | |
* | | | Merge remote-tracking branch 'chelseakomlo/glossary-term-additions'Nick Mathewson2017-05-09
|\ \ \ \
| * | | | adds more descriptive subsections, changes section organizationChelsea H. Komlo2017-05-07
| | | | |
* | | | | Merge remote-tracking branch 'mikeperry/padding_spec'Nick Mathewson2017-05-08
|\ \ \ \ \ | |/ / / / |/| | | |
| * | | | Update Prop254 to match implementation.Mike Perry2017-01-14
| | | | |
| * | | | At long last, a padding specification appears.Mike Perry2016-01-27
| | | | | | | | | | | | | | | | | | | | Baby steps. Crawl before you can walk. Walk before you can run.
* | | | | prop140: kill off digest prefixes.Nick Mathewson2017-05-04
| | | | |
* | | | | Explain the reasoning behind the "x-tor-lzma" name.Alexander Færøy2017-05-03
| | | | |
* | | | | We're using LZMA without the "xz" features for Tor.Alexander Færøy2017-05-03
| | | | | | | | | | | | | | | | | | | | Rename LZMA2 to LZMA in the proposal and rename x-lzma2 to x-tor-lzma.
* | | | | Correct a mistake in my last prop140 patchNick Mathewson2017-05-03
| | | | |
* | | | | Fix a security problem in prop140 related to signature encodingNick Mathewson2017-05-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The problem was that clients would, when contacting caches, identify consensuses by the sha3 digest of the entire consensus, including signatures. But there are multiple valid encodings for a set of signatures, meaning that a malicious cache could serve each client a different encoding, and recognize the clients using the sha3 digests in their requests. The first part of the solution is to fetch consensuses diffs based only on the consensus's digest-as-signed: the digest of the consensus with no signatures on it. The second part of the solution is to generate diffs using the <n>,$d format to first remove all trailing signatures, so that the diffs will apply to any valid consensus, no matter how the signatures are encoded.
* | | | | Merge branch 'ticket22042_01'Nick Mathewson2017-05-03
|\ \ \ \ \
| * | | | | control: Add to HS_DESC event the QUERY_NO_HSDIR reasonDavid Goulet2017-05-03
| | |/ / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It is possible that a descriptor fetch fails because there are no suitable HSDir that the client can pick. In this case, return the QUERY_NO_HSDIR reason which makes HsDir to become "UNKNOWN" both in the HS_DESC and HS_DESC_CONTENT event. Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | | fix trivial typoRoger Dingledine2017-05-02
|/ / / /
* | | | prop224: Be consistent with our concatenation symbol (|)David Goulet2017-04-19
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | prop224: Replace HMAC by a H constructionDavid Goulet2017-04-19
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | prop224: Use consistent notation of period_numDavid Goulet2017-04-19
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | prop224: Make ed25519 identity key mandatory for link specifiersDavid Goulet2017-04-19
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | fix two simple typosRoger Dingledine2017-04-16
| | | |
* | | | Prop #278: Be explicit about handling both ".z"-suffixes and "plaintext" files.Alexander Færøy2017-04-07
| | | |