| Commit message (Collapse) | Author | Age |
| ... | |
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
"Because all relays currently on the network are 0.2.4.19 or later, we
can require 0.2.4.19, and use 0.2.4.19 as the minimal version so we
we don't need to do code archaeology to determine how many
no-longer-relevant versions of each protocol once existed."
Describe which versions of the HS* stuff we will require/recommend.
Also fix a spelling mistake.
|
| | | | |
| | | |
| | | |
| | | | |
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| |\ \ \ \
| |/ / /
|/| | | |
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Tor checks that the flag matches the onion service anonymity configured
using OnionServiceSingleHopMode and OnionServiceNonAnonymousMode.
Tor refuses to create unflagged onion service using ADD_ONION, if they
would be non-anonymous. The error is:
512 Tor is in non-anonymous onion mode
Similarly, if the NonAnonymous flag is present, and Tor has the default
anonymous onion config:
512 Tor is in anonymous onion mode
|
| |\ \ \ \ |
|
| | | | | | |
|
| |\ \ \ \ \ |
|
| | | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
This is motivated to remove an ambiguity about what a missing "p" line
means when comparing historical consensus data.
|
| | |_|/ / /
|/| | | | |
|
| | | | | | |
|
| |\ \ \ \ \
| |/ / / /
|/| | | | |
|
| | | | | | |
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Use a more standard format from Tor and proposal 220 instead of our own
construction.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Use a more generic way to version the URL for the command so it's much
easier to parse in the implementation but also decoupled from the command
type.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Also, note that you can safely assume that methods before 13 will
never happen.
Part of proposal 272.
|
| | |/ / /
|/| | | |
|
| | |/ /
|/| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This variant makes two theoretically interesting changes:
1) It only uses client provided inputs for the extractor salt,
2) It includes an additional HMAC step for deriving AUTH.
The first change prevents someone who is attempting to impersonate
the server from biasing the randomness extractor. We don't expect
such a biasing attack to be possible, but there's no harm in
eliminating the possibility.
The second change eliminates the 2^lambda session collision attack
mentioned in previous versions.
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | | |
|
| |/ /
| |
| |
| | |
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| |\ \ |
|
| | | |
| | |
| | |
| | | |
Also add a reference implementation for the scheme.
|
| |\ \ \ |
|
| | |/ / |
|
| | | |
| | |
| | |
| | |
| | |
| | | |
We need this because RSA signatures aren't fixed-length.
Closes part of #19020
|
| | | | |
|
| | | | |
|
| |\ \ \ |
|
| | | | |
| | | |
| | | |
| | | | |
* THANKS TO Dmitry Chestnykh for catching it.
|
| | | | | |
|
| | | | | |
|
| | | | | |
|
| | | | |
| | | |
| | | |
| | | | |
* THANKS TO Yawning Angel for suggesting the clarification.
|
| | | | |
| | | |
| | | |
| | | | |
* THANKS TO eikovi@sigaint.org for pointing them out.
|
| | | | | |
|
| |\ \ \ \ |
|
| | | | | | |
|
| |/ / / / |
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Taken from
https://raw.githubusercontent.com/twstrike/torspec/review/proposals/259-guard-selection.txt
See editorial note for comment on why I'm not just dropping this in
over prop259.
|
| |\ \ \ \ |
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Add ExitPolicyRejectLocalInterfaces option.
Make it clear that the current option values determine the output.
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Also, dir-spec.txt has been updated in a previous commit so we are done
for now.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| | | | | |
| | | | |
| | | | |
| | | | | |
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| | | | | |
| | | | |
| | | | |
| | | | | |
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
| | | | | |
| | | | |
| | | | |
| | | | | |
This is the case in the current codebase.
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
based on arma's comments.
Specifically:
- Give example of algname.
- Point to relevant sections of prop250 when needed.
- Fix the max value of AuthDirNumSRVAgreements.
|
| |/ / / / |
|
| | | | | |
|