summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* | clarify how to count sendme windowsRoger Dingledine2016-12-18
| |
* | remove extraneous wordRoger Dingledine2016-12-18
| |
* | fix typo in nameRoger Dingledine2016-12-18
| | | | | | | | (unless i'm wrong and this is a different sebastian)
* | Mark 271 finishedNick Mathewson2016-12-16
| |
* | Merge remote-tracking branch 'public/prop271-changes'Nick Mathewson2016-12-13
|\ \
| * | 271: decouple timeout from the rest of UPDATE_WAITINGNick Mathewson2016-12-08
| | |
| * | 271: Note the stickiness (not persistence) of unconfirmed primary guardsNick Mathewson2016-12-08
| | | | | | | | | | | | asn spotted this during code review.
| * | 271: Lower MAX_SAMPLE_THRESHOLD; add MAX_SAMPLE_SIZENick Mathewson2016-12-08
| | | | | | | | | | | | Specified fix for #20920
| * | 271: Rewrite sec 3.9 for clarity; include per-circuit restrictionsNick Mathewson2016-11-30
| | |
| * | Specify persistence format a little.Nick Mathewson2016-11-29
| | |
| * | Fix the cases where prop271 differs from my implementation.Nick Mathewson2016-11-29
| | |
* | | Keep proposals/proposal-status.txt up to date.George Kadianakis2016-12-02
| | |
* | | Merge remote-tracking branch 'dgoulet/ticket20803_01'Nick Mathewson2016-12-02
|\ \ \
| * | | prop264: Close the proposalticket20803_01David Goulet2016-11-29
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
| * | | Merge proposal 264 to dir-spec and tor-specDavid Goulet2016-11-29
| |/ / | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | prop224: Remove username/password intro-layer auth.George Kadianakis2016-12-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Authorized clients need a x25519 key to decrypt the descriptor anyway, so having username/password method for the intro-layer authorization is not very helpful, since they will need to remember the x25519 key anyway. Perhaps in the future we can reinstate the username/password method, by having x25519/ed25519 keypairs be generated from the low-entropy username/password pair.
* | | prop224: Revisit basic client authorizationGeorge Kadianakis2016-12-01
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In the past prop224 used to embed the client authorization key in the subcredential. The problem here is that if we wanted to revoke a client, we would have to change the whole subcredential of the service, which means that we would have to announce it to all clients. This patch makes it so that every client has an x25519 and an ed25519 which are used to perform client authorization. To achieve this on the descriptor level, we change the descriptor format to a double-layer encryption where the first layer protects against entities who don't know the public key of the HS, and the second layer protects against unauthorized clients who don't know the x25519 key. The intro level authorization remains as is and uses ed25519 for authentication. Thanks to special for noticing this issue. Thanks to Nick for sketching out the x25519 descriptor auth scheme.
* | Merge remote-tracking branch 'dgoulet/ticket19642_01'Nick Mathewson2016-11-10
|\ \
| * | fixup! prop224: Add the single onion service line to descriptorticket19642_01David Goulet2016-11-08
| | |
| * | prop224: Add the single onion service line to descriptorDavid Goulet2016-11-08
| | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | Use proposal number, not RFC number.Nick Mathewson2016-11-08
|/ / | | | | | | (Spotted by Roger)
* | Fix typos and thinkos in prop264. Closes 20577. Thanks, teor!Nick Mathewson2016-11-06
| |
* | Reserve some link protocol numbersNick Mathewson2016-11-04
| |
* | Merge remote-tracking branch 'dgoulet/ticket20278_01'Nick Mathewson2016-11-01
|\ \
| * | cert-spec: Clarify certificate typesticket20278_01David Goulet2016-10-14
| | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | Add DirPort url for retrieving the microdescriptor consensusDamian Johnson2016-10-31
| | | | | | | | | | | | | | | | | | Neat! Turns out tor supports this, just wasn't documented... https://trac.torproject.org/projects/tor/ticket/20501#comment:5
* | | add ExtendByEd25519ID parameter to prop220Nick Mathewson2016-10-28
| | |
* | | Add two entries to big list of consensus methodsNick Mathewson2016-10-27
| | |
* | | Be more specific about consensus method 26 changes.Matt Traudt2016-10-26
| | |
* | | Update dir-spec with consensus method 26Matt Traudt2016-10-26
| | |
* | | Merge remote-tracking branch 'pastly/ticket20273'Nick Mathewson2016-10-24
|\ \ \
| * | | Change 1 to weight_scale in dir-spec section 3.8.3Matt Traudt2016-10-03
| | | |
* | | | prop224: Add a section on the number of introduction pointsDavid Goulet2016-10-17
| | | | | | | | | | | | | | | | | | | | Acked-by: George Kadianakis <desnacked@riseup.net> Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | dir-spec: Fix two typos and a missing comma from a subordinate clause.Isis Lovecruft2016-10-15
| | | |
* | | | Merge remote-tracking branch 'jschanck/269-alt-kdf'Isis Lovecruft2016-10-15
|\ \ \ \ | |_|/ / |/| | |
| * | | prop269: Moved instantiations to appendixJohn M. Schanck2016-10-14
| | | |
| * | | prop269: Append PROTOID to TRANSCRIPTJohn M. Schanck2016-10-14
| | | |
| * | | prop269: Removed hash of initial XTR saltJohn M. Schanck2016-10-14
| | | |
| * | | Merge remote-tracking branch 'origin/master' into 269-change-kdfJohn M. Schanck2016-10-14
| |\ \ \ | |/ / / |/| | |
* | | | prop224: Set status from Draft to OpenDavid Goulet2016-10-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In theory, we shouldn't use Draft anymore. Also, part of proposal 224 is being implemented while we are still changing part of it. Acked-by: George Kadianakis <desnacked@riseup.net> Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | prop224: Minor syntax fix mostly wrapping on 80 charsDavid Goulet2016-10-11
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | prop224: Clarify descriptor version formatDavid Goulet2016-10-11
| | | | | | | | | | | | | | | | Signed-off-by: David Goulet <dgoulet@torproject.org>
* | | | Add draft prop273 from Phillipp Winter et al.Nick Mathewson2016-10-07
| |/ / |/| |
* | | Tag 264 and 272 as "finished". (Not closed; spec merge still needed)Nick Mathewson2016-09-26
| | |
* | | Note TLS link key size and digest change in prop220Nick Mathewson2016-09-22
| | |
* | | correct prop244 and make it more specificNick Mathewson2016-09-22
| | |
* | | prop264: in consensuses, say "pr" rather than "proto"Nick Mathewson2016-09-22
| | |
* | | prop224: Change cert type value from 0A to 0BDavid Goulet2016-09-15
| | | | | | | | | | | | | | | | | | | | | | | | Value 0x0A (10) is taken by onion key cross-certifying ntor identity key from proposal 228. Signed-off-by: David Goulet <dgoulet@torproject.org> Signed-off-by: George Kadianakis <asn@torproject.org>
* | | Merge branch 'dgoulet_ticket19958_01'Nick Mathewson2016-09-14
|\ \ \
| * | | Remove subprotocol versions for everything obsolete.Nick Mathewson2016-09-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | "Because all relays currently on the network are 0.2.4.19 or later, we can require 0.2.4.19, and use 0.2.4.19 as the minimal version so we we don't need to do code archaeology to determine how many no-longer-relevant versions of each protocol once existed." Describe which versions of the HS* stuff we will require/recommend. Also fix a spelling mistake.