| Commit message (Collapse) | Author | Age | ||
|---|---|---|---|---|
| ... | ||||
| * | | Add proposal 237: All relays are directory servers by Matthew Finkel | Nick Mathewson | 2014-08-18 | |
| |/ | ||||
| * | Add consensus method 18 to the list in dir-spec section 3.8.1 | Nick Mathewson | 2014-08-18 | |
| | | ||||
| * | Tweak proposals 220 and 224 to make them work with trunnel | Nick Mathewson | 2014-08-11 | |
| | | ||||
| * | update the spec to say that you must refuse inbound relay_early cells | Roger Dingledine | 2014-08-02 | |
| | | ||||
| * | Move dir-spec-v2 to attic. (#12645) | Nick Mathewson | 2014-07-17 | |
| | | ||||
| * | Apply Yawning's pt-spec.txt improvements. | George Kadianakis | 2014-07-10 | |
| | | ||||
| * | Replace the old pt-spec.txt with a new better one. | George Kadianakis | 2014-07-10 | |
| | | ||||
| * | Add some words about meek in proposal 203 | Lunar | 2014-07-07 | |
| | | | | | This is mostly David Fifield's words from an email exchange. | |||
| * | Fix bogus negation in control-spec; spotted by Frithjof. | Nick Mathewson | 2014-06-11 | |
| | | ||||
| * | fix a repeated-typo; spotted by Yawning | Nick Mathewson | 2014-06-01 | |
| | | ||||
| * | Remove an obsolete 220 question, spotted by George | Nick Mathewson | 2014-05-28 | |
| | | ||||
| * | tweak proposal 220 based on comments from george, nick hopper | Nick Mathewson | 2014-05-28 | |
| | | ||||
| * | Revise prop 140 for dirspec 3 + other improvements | Daniel Martà | 2014-05-27 | |
| | | | | | Signed-off-by: Daniel Martà <mvdan@mvdan.cc> | |||
| * | Fix minor typos in tor-spec.txt | Martin Kepplinger | 2014-05-14 | |
| | | ||||
| * | Describe how implementations should (not) process "id rsa1024" lines | Nick Mathewson | 2014-05-07 | |
| | | ||||
| * | Use the prop220-aware format for id lines in mds | Nick Mathewson | 2014-05-06 | |
| | | ||||
| * | Merge remote-tracking branch 'public/bug11743_option_b' | Nick Mathewson | 2014-05-06 | |
| |\ | ||||
| | * | Describe 'id' line in microdescs, and consensus method 18 | Nick Mathewson | 2014-05-05 | |
| | | | ||||
| * | | Correct format of description of ntor-onion-key line | Nick Mathewson | 2014-05-05 | |
| |/ | ||||
| * | Add xxx-single-guard-node as proposal 236. | Nick Mathewson | 2014-04-23 | |
| | | ||||
| * | Merge remote-tracking branch 'asn/single_guard' | Nick Mathewson | 2014-04-23 | |
| |\ | ||||
| | * | Add Nick's name in the authors and delete some trailing whitespace. | George Kadianakis | 2014-04-22 | |
| | | | ||||
| | * | Nick Hopper changes | George Kadianakis | 2014-04-17 | |
| | | | | | | | | | Acked-by: George Kadianakis <desnacked@riseup.net> | |||
| | * | Add xxx-single-guard-node.txt . | George Kadianakis | 2014-04-16 | |
| | | | ||||
| * | | Clarify that 0 is the only reserved circID value | Nick Mathewson | 2014-04-23 | |
| | | | | | | | | | Fixes 11565. | |||
| * | | from Sebastian: 235-kill-named-flag.txt | Nick Mathewson | 2014-04-18 | |
| | | | ||||
| * | | Clarify KH behavior in rend-spec.txt | Nick Mathewson | 2014-04-18 | |
| |/ | ||||
| * | Reflow proposals 233, 234. | Nick Mathewson | 2014-04-14 | |
| | | ||||
| * | Add proposals 233 and 234 from Virgil Griffith et al | Nick Mathewson | 2014-04-14 | |
| | | ||||
| * | Clarify 232 status | Nick Mathewson | 2014-04-14 | |
| | | ||||
| * | Change "PROXY true" to "PROXY DONE" for consistency | Yawning Angel | 2014-04-14 | |
| | | ||||
| * | Make pluggable-transports-through-proxy.txt into proposal 232 | Nick Mathewson | 2014-04-14 | |
| | | ||||
| * | Proposal 231: Migrating authority RSA1024 identity keys | Nick Mathewson | 2014-04-08 | |
| | | ||||
| * | fix typo and reindex | Nick Mathewson | 2014-04-08 | |
| | | ||||
| * | Merge branch 'rsa1024_migrate' | Nick Mathewson | 2014-04-08 | |
| |\ | ||||
| | * | Give the rsa1024-relay-id-migration.txt proposal a number | Nick Mathewson | 2014-04-08 | |
| | | | ||||
| | * | spelling | Nick Mathewson | 2014-04-07 | |
| | | | ||||
| | * | Draft proposal for how to migrate a bunch of router identity keys | Nick Mathewson | 2014-04-07 | |
| | | | | | | | | | We might decide to do this as part of a CVE-2014-0160 response. | |||
| * | | document new exit-policy/* GETINFOs | Nick Mathewson | 2014-04-08 | |
| | | | ||||
| * | | Document new PT_MISSING reason for ending an OR_CONN | Nick Mathewson | 2014-04-07 | |
| | | | | | | | | | (See #9665 for more background.) | |||
| * | | Document that rend-spec.txt uses KDF-Tor like TAP does | Nick Mathewson | 2014-03-27 | |
| | | | | | | | | | Fix for #8809 | |||
| * | | put a timestamp on nickm's proposal status document | Roger Dingledine | 2014-03-13 | |
| | | | ||||
| * | | mention ipv6 addresses in net/listeners/* doc | Nick Mathewson | 2014-03-12 | |
| | | | ||||
| * | | Clarifying the output of tor's "GETINFO net/listeners/*" options | Damian Johnson | 2014-03-12 | |
| | | | | | | | | | | | | | | | The control spec didn't fully describe the output of these GETINFO options. This addresses... https://trac.torproject.org/11049 | |||
| * | | clarifications in proposal 224 based on questions from George | Nick Mathewson | 2014-03-07 | |
| | | | ||||
| * | | Merge remote-tracking branch 'karsten/bug8913' | Nick Mathewson | 2014-03-05 | |
| |\ \ | |/ |/| | ||||
| | * | Remove now obsolete backward compatibility and migration plans. | Karsten Loesing | 2014-02-08 | |
| | | | ||||
| | * | V2Dir really means version 2 or higher. | Karsten Loesing | 2014-02-08 | |
| | | | ||||
| | * | Stop pretending that v2 directories are a thing | Nick Mathewson | 2014-02-07 | |
| | | | ||||
| * | | Defang TLS UKS attacks in tor-spec.txt | Nick Mathewson | 2014-03-04 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Our implementations disable session resumption, and don't send AUTHENTICATE before checking CERTS. It turns out that these are pretty important: see discussion of "triple handshake" and related UKS-enabled attacks at https://lists.torproject.org/pipermail/tor-dev/2014-March/006372.html Basically, session resumption plus renegotiation enables the triple- handshake attack. And sending an AUTHENTICATE cell before checking the CERTS cell would lead to sending the wrong SID field in the AUTHENTICATE cell, which would whittle our defense there even further. | |||
