summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* | | | | prop224: Fix crypto issues pointed out by Nick.George Kadianakis2016-04-14
| |_|/ / |/| | | | | | | | | | | | | | | - No point in using SHAKE *with* HKDF. Just use SHAKE. - Use our KDF to do key expansion for rendezvous crypto.
* | | | dir-spec.txt: Update requirements for Guard/Fast flags.George Kadianakis2016-04-13
| | | |
* | | | prop224: Remove the MAINT_INTRO feature.George Kadianakis2016-04-08
| | | | | | | | | | | | | | | | | | | | Too complex and not sufficient gain. For full rationale, please see thread: https://lists.torproject.org/pipermail/tor-dev/2016-March/010560.html
* | | | prop224: Clarify backwards compatibility sections slightly.George Kadianakis2016-04-08
| | | |
* | | | prop224: Add missing key expansion section for rendezvous crypto.George Kadianakis2016-04-08
| | | |
* | | | prop224: Clarify use of shared random values.George Kadianakis2016-04-08
| | | |
* | | | prop224: Fix undefined variables in the ntor section.George Kadianakis2016-04-08
| | | |
* | | | prop224: In cells, replace TYPE/LEN/KEY with just TYPE/KEY.George Kadianakis2016-04-08
| | | |
* | | | prop224: Various improvements.George Kadianakis2016-04-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Kill last remnants of TAP from the proposal. - Replace SHA256 with SHA3-256 and our KDF with SHAKE. - Make the INTRO_ESTABLISHED cell extensible. - Improve the descriptor format a bit. - Don't be ambiguous about "INTRODUCE" cells (pointed out by malekbr). - Cleanup the scaling section.
* | | | prop224: Minor fixes to descriptor formatJohn Brooks2016-04-08
| | | |
* | | | prop224: Some syntax fixes and remove time-periodDavid Goulet2016-04-08
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | | | Fix typo in rend-spec.txtDavid Goulet2016-04-06
|/ / / | | | | | | | | | | | | | | | Base64 holds 6 bits, not 5. Patch from twim. Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | | Merge remote-tracking branch 'public/ed25519_voting_again'Nick Mathewson2016-03-21
|\ \ \
| * | | Clarify NoEdConsensus flag a bit harder.Nick Mathewson2016-03-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | (Note that no corresponding tor change is needed, since we don't actually use these keys yet.) Resolves 17668.{S1,T1}
| * | | Document how ed25519 voting actually should workNick Mathewson2016-02-23
| | | |
* | | | Apply notes from last month's meeting about prop264,266.Nick Mathewson2016-03-15
| | | |
* | | | tiny tweak to proposal 264Roger Dingledine2016-03-11
| | | |
* | | | Mark prop#241 as rejected due to being made obsolete by prop#259.Isis Lovecruft2016-02-28
| | | |
* | | | proposal: 267-tor-consensus-transparency.txt (from Linus)Nick Mathewson2016-02-25
|/ / /
* | | Update prop264 per discussionNick Mathewson2016-02-20
| | |
* | | mark 265 accepted, targetting 029.Nick Mathewson2016-02-20
| | |
* | | retitile 257 per discussionNick Mathewson2016-02-20
| | |
* | | update some proposal statusNick Mathewson2016-02-19
| | |
* | | prop250: Mention the hard limit of 255 dirauthDavid Goulet2016-02-15
| | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | | typo fixes while reading 264Roger Dingledine2016-02-12
| | |
* | | fixes from reading 266; and ask a questionRoger Dingledine2016-02-12
| | |
* | | renumber 260Roger Dingledine2016-02-11
| | |
* | | grammar/etc clarifications while reading proposal 260Roger Dingledine2016-02-11
| | |
* | | tiny tweaks to proposal 255 after readingRoger Dingledine2016-02-11
| | |
* | | Apply Zhenfei et. al's changes to prop#263.Isis Lovecruft2016-02-10
| | | | | | | | | | | | | | | | | | | | | | | | After the following development meeting discussing this proposal: http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-02-04-13.28.html These changes were sent to tor-dev@lists.torproject.org: https://lists.torproject.org/pipermail/tor-dev/2016-February/010379.html
* | | prop250: Change INT_8 to INT_1, it's in bytesDavid Goulet2016-02-09
| | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | | Changes to prop250 after reading group and Nick's comments.George Kadianakis2016-02-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Remove ed25519 keys completely. Use RSA keys for referencing. - Replace SHA256 with SHA3-256 (Keccak). - Specify better the format and contents of TIMESTAMP. - Put TIMESTAMP in the front of COMMIT for symmetry with REVEAL. - Use base64 not base32. - Specify what happens when PREVIOUS_SRV is unknown. - Remove some paragraphs that are no longer valid. - Simplify consistent ordering in HASHED_REVEALS. - Put algorithm name first on disk and commit.
* | | typo and clarification for proposal 249Roger Dingledine2016-02-04
| | |
* | | grammar fixes on proposal 263Roger Dingledine2016-02-04
| |/ |/|
* | Fix a typo in the directory spec where cache was used instead of clientteor (Tim Wilson-Brown)2016-01-25
| |
* | Clients may bootstrap from a default fallback directory mirrorteor (Tim Wilson-Brown)2016-01-25
| | | | | | | | | | Update the directory spec to describe client behaviour with default fallback directory mirrors after #15775 and #4483.
* | prop246: Change status to needs-researchprop246-researchDavid Goulet2016-01-18
| | | | | | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | Add my removing-obsolete-clients proposal as 266Nick Mathewson2016-01-14
| |
* | add proposal 265: Load Balancing with Overhead ParametersNick Mathewson2016-01-14
| |
* | In addition to the content, explain the format tooSven Herzberg2016-01-14
| | | | | | | | | | | | The term “X509 certificate” actually only describes one part of the format. Be more explicit to mean DER encoded certificates (in contrast to PEM encoded certifcates).
* | Merge remote-tracking branch 'public/bug16227'Nick Mathewson2016-01-12
|\ \
| * | One more singleton case.Nick Mathewson2016-01-12
| | |
| * | Document which descriptor items aren't allowed to take extra argsNick Mathewson2016-01-12
| | | | | | | | | | | | Closes #16227
* | | prop250: Update to the latest version from asn/dgouletDavid Goulet2016-01-12
| | | | | | | | | | | | | | | | | | This version matches the implementation submitted for review. Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | | Apply updated proposal 263 from tor-devNick Mathewson2016-01-12
|/ /
* | Fix a sentence that teor pointed out whereNick Mathewson2016-01-11
| |
* | Update Proposal #247 based on discussion and community review.Mike Perry2016-01-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The following changes were made: * Randomize second and third guard layers. * Fold in my comments about using disjoint sets ("buckets") for the third level guard. * Make the paremeter discussion subsection its own section, and include tables with far more detail for the Sybil success rates. * Changed the default parameters based on these tables, and based on my own intuition about Tor's performance properties. * Move the load balancing, torrc, and other performance considerations to their own section (Section 5). * Move "3.2. Distinguishing new HS circuits from normal HS circuits" to section 4.1. * Fold in some of "3.3. Circuit nodes can now be linked to specific hidden services" into 4.1. Some of it I just removed, though, because I did not find it credible. * Added Roger's concerns about guard linkability to Section 4.2. * Added a denial of service subsection to Section 4.3. * Try to make a coherent threat model and specify its assumptions * Put the rotation period in a separate subsection from the number of guards * Switch to using min(X,X) and max(X,X) for the distribution for the second and third layer guard lifespans, respectively. Add a subsection describing this distribution (3.2.3) * Include python functions for the min and max probability distributions. * Mention that third nodes can probe to see if they are one of the current RPs. * Provide CDF for rotation functions for Sybil runtime expecations. * Add s7r's DoS points. * Add notes from Thursday dev meeting discussion. * Address Aaron's mailinglist comments (except for the CDF). * Add discussion items from the dev meeting.
* | 264: Putting version numbers on the Tor subprotocolsNick Mathewson2016-01-06
| |
* | Prop262: s/shake128/shake256/Nick Mathewson2015-12-31
| |
* | Add proposal 263 (ntru)Nick Mathewson2015-12-28
| |