summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* | Add proposal 261 and 262, for AEZ and rekeyingNick Mathewson2015-12-28
| |
* | Bug 16081: Document status code consistency in single replyGeorg Koppen2015-12-16
| |
* | Clarify that HSDir flag is provided after 96 hours uptimeDonncha O'Cearbhaill2015-11-23
| |
* | Give rend-single-onion a number (260)Nick Mathewson2015-11-20
| |
* | Merge remote-tracking branch 'teor/reject-private'Nick Mathewson2015-11-20
|\ \
| * | Update control-spec for exit-policy/reject-private/*teor (Tim Wilson-Brown)2015-11-16
| | |
* | | Merge branch 'rend-ng-descriptors_squashed'Nick Mathewson2015-11-20
|\ \ \
| * | | prop224: avoid replicas with the same blinded keyteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Each replicas uses one of multiple blinded keys (and a different descriptor signing key) to avoid HSDirs being able to locate other replicas of the service. In combination with the changes to the salt and revision-counter, this also makes it difficult to link descriptors from the same service at all. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | | prop224: use a different salt for each replica and uploadteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use a different salt for each descriptor replica and upload, to avoid matching encrypted blobs, which could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | | prop224: randomise revision-counter to avoid information leaksteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Randomise revision-counter start value and increment to avoid leaking: * the descriptor validity start time, * the age of new hidden services, * the stability of a hidden service, * a value that could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | | prop224: deal with replica hashring collisionsteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If multiple replicas want to use the same HSDir, give it to the lower-numbered replica, and have the higher-numbered replica(s) ignore it when counting nodes. This avoids services choosing the same HSDir for multiple replicas / spreads, and therefore losing redundancy.
| * | | prop224: hash raw random bytes before useteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Exposing raw random bytes from a PRNG has broken Dual EC: http://projectbullrun.org/dual-ec/ext-rand.html Based on ioerror's feedback on prop250, make similar changes: https://lists.torproject.org/pipermail/tor-dev/2015-November/009954.html
| * | | prop224: add distinguishing values to every hashteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some hashes were missing distinguishing values, even though other hashes had them, and the "Cryptographic building blocks" section appears to require them: "all signatures are generated not over strings themselves, but over those strings prefixed with a distinguishing value"
| * | | prop224: note prop252 wants to add extend-info to the descriptorteor (Tim Wilson-Brown)2015-11-20
| | | |
* | | | Merge remote-tracking branch 'teor/feature-17178-rsos'Nick Mathewson2015-11-20
|\ \ \ \ | |/ / / |/| | |
| * | | Update RSOS proposal: RendPostPeriod and other option recommendationsteor (Tim Wilson-Brown)2015-11-20
| | | |
| * | | Prop Rendezvous Single Onionteor (Tim Wilson-Brown)2015-10-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | An updated and expanded version of "Direct Onion Services: Fast-but-not-hidden services”. Also borrows heavily from "Single Onion Services" (Proposal #252).
* | | | Add a relay_early section to prop249Nick Mathewson2015-11-16
| |/ / |/| |
* | | Fold in changes to the shared randomness proposal (prop250).George Kadianakis2015-11-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | - Remove majority requirement for commitments. - Remove conflict detection. - Remove the need for SR keys. - Don't use signatures in commits. - Simplify persistent state logic. - Change the protocol starting time from 12:00UTC to 00:00UTC.
* | | Bug 17578: Fix typos in control-spec.txtGeorg Koppen2015-11-10
| | |
* | | Merge remote-tracking branch 'donncha/fix-15190'Nick Mathewson2015-11-04
|\ \ \
| * | | Specify the 10 introduction points limit in hidden service descriptors.Donncha O'Cearbhaill2015-11-02
| | | |
| * | | Remove the unimplemented service-authentication field (#15190).Donncha O'Cearbhaill2015-11-02
| | | |
* | | | Rewrite the existing PT spec to be not Tor specific.Yawning Angel2015-11-03
|/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This attempts to make it clear that PTs are not just for Tor, and can be used by any project, and should be sufficient documentation for writing the PT glue code both for Tor and other projects. TODO: Fold in the implemented parts of prop 196/217. I'll do this when I have time, since statistics are useful for everybody. Fixes: #13369, #15545 Completes: #16754
* | | Merge branch 'prop259-typos'Isis Lovecruft2015-11-01
|\ \ \
| * | | Fix three typos in prop#259.junglefowl2015-11-01
|/ / /
* | | Fix typo in prop#259.Isis Lovecruft2015-10-30
| | |
* | | Merge branch 'prop188-self-testing'Isis Lovecruft2015-10-30
|\ \ \
| * | | Add additional comments to prop#188 on bridge reachability self-testing.Isis Lovecruft2015-10-30
| | | |
* | | | now it is proposal 259Nick Mathewson2015-10-29
| | | |
* | | | Merge remote-tracking branch 'isis/bug17261-best-guess'Nick Mathewson2015-10-29
|\ \ \ \ | |/ / /
| * | | Add draft proposal of new guard selection algorithm.Isis Lovecruft2015-10-29
| | | |
* | | | Reformat 258.Nick Mathewson2015-10-29
| | | |
* | | | Proposal 258: Denial-of-service resistance for directory authoritiesNick Mathewson2015-10-29
|/ / /
* | | [257] Refactoring authorities and taking parts offlineNick Mathewson2015-10-27
| | |
* | | [256] Key revocation for relays and authoritiesNick Mathewson2015-10-27
| | |
* | | Document our current guard selection algorithm in path-spec.txt.Isis Lovecruft2015-10-23
| | | | | | | | | | | | | | | * ADDS new section, "§5.1. Guard selection algorithm", to path-spec.txt. * FIXES #17261: https://bugs.torproject.org/17261
* | | Update dir-spec.txt with HSDir flag requirementsDavid Goulet2015-10-22
|/ / | | | | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | Merge remote-tracking branch 'teor/gitignore-osx'Nick Mathewson2015-10-21
|\ \
| * | Ignore OS X's .DS_Store directory metadata filesteor (Tim Wilson-Brown)2015-10-19
| | |
* | | Merge remote-tracking branch 'teor/bootstrap-exponential-backoff-v2'Nick Mathewson2015-10-21
|\ \ \ | |/ / |/| |
| * | prop 210 further clarificationsteor (Tim Wilson-Brown)2015-10-17
| | |
| * | fixup prop 210 split relay and client schedulesteor (Tim Wilson-Brown)2015-10-05
| | | | | | | | | | | | Also improve implementation notes.
| * | fixup name the right function in 210teor (Tim Wilson-Brown)2015-10-05
| | |
| * | Simplify implementation: avoid timers & additional connection liststeor (Tim Wilson-Brown)2015-10-05
| | |
| * | fixup Rewrite summary section for revised connection scheduleteor (Tim Wilson-Brown)2015-10-05
| | | | | | | | | | | | And various other fixups
| * | fixup Add IPv4 and IPv6, make an auth connection earlyteor (Tim Wilson-Brown)2015-10-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make one authority connection early so the client can check its clock. Redo the analysis for the new timing schedule. Add IPv4 and IPv6 alternation scheme for clients that have both an IPv4 and IPv6 address. Add retry timer maximum and retry timer reset events. Include min and max fallback directory weights.
| * | Modify 210-faster...consensus-bootstrap for exponential backoffteor (Tim Wilson-Brown)2015-10-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To implement #4483 we need to contact multiple directory mirrors to increase bootstrap reliability. This patch implements the exponential backoff suggested in https://trac.torproject.org/projects/tor/ticket/4483#comment:22 The patch also analyses the reliability of the new scheme, and compares it to the current Tor implementation.
* | | Add proposal for load-balancing hidden servicesTom van der Woerdt2015-10-12
| | |
* | | Clarify Replica field in HS_DESC eventDonncha O'Cearbhaill2015-10-06
| | | | | | | | | | | | | | | Clarify the format of the HS_DESC Replica field and indicate that it is is defined in rend-spec.txt. Resolves #17226.