summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Fix typo.mesh-vanguardsMike Perry2018-05-15
|
* Trim down the huge tables in the middle of the proposal.Mike Perry2018-05-10
|
* Mesh vanguards tweaks from asn's review.Mike Perry2018-05-10
|
* Write a proposal for the mesh vanguards design.Mike Perry2018-05-08
|
* Prop 247: Some notes from mailinglist discussionguard_discovery_dev2Mike Perry2016-01-27
|
* Add nodes from mailinglist discussion.load_balancing2Mike Perry2016-01-15
|
* Add my removing-obsolete-clients proposal as 266Nick Mathewson2016-01-14
|
* add proposal 265: Load Balancing with Overhead ParametersNick Mathewson2016-01-14
|
* In addition to the content, explain the format tooSven Herzberg2016-01-14
| | | | | | The term “X509 certificate” actually only describes one part of the format. Be more explicit to mean DER encoded certificates (in contrast to PEM encoded certifcates).
* Merge remote-tracking branch 'public/bug16227'Nick Mathewson2016-01-12
|\
| * One more singleton case.Nick Mathewson2016-01-12
| |
| * Document which descriptor items aren't allowed to take extra argsNick Mathewson2016-01-12
| | | | | | | | Closes #16227
* | prop250: Update to the latest version from asn/dgouletDavid Goulet2016-01-12
| | | | | | | | | | | | This version matches the implementation submitted for review. Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | Apply updated proposal 263 from tor-devNick Mathewson2016-01-12
|/
* Fix a sentence that teor pointed out whereNick Mathewson2016-01-11
|
* Update Proposal #247 based on discussion and community review.guard_discovery_dev-rebasedMike Perry2016-01-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The following changes were made: * Randomize second and third guard layers. * Fold in my comments about using disjoint sets ("buckets") for the third level guard. * Make the paremeter discussion subsection its own section, and include tables with far more detail for the Sybil success rates. * Changed the default parameters based on these tables, and based on my own intuition about Tor's performance properties. * Move the load balancing, torrc, and other performance considerations to their own section (Section 5). * Move "3.2. Distinguishing new HS circuits from normal HS circuits" to section 4.1. * Fold in some of "3.3. Circuit nodes can now be linked to specific hidden services" into 4.1. Some of it I just removed, though, because I did not find it credible. * Added Roger's concerns about guard linkability to Section 4.2. * Added a denial of service subsection to Section 4.3. * Try to make a coherent threat model and specify its assumptions * Put the rotation period in a separate subsection from the number of guards * Switch to using min(X,X) and max(X,X) for the distribution for the second and third layer guard lifespans, respectively. Add a subsection describing this distribution (3.2.3) * Include python functions for the min and max probability distributions. * Mention that third nodes can probe to see if they are one of the current RPs. * Provide CDF for rotation functions for Sybil runtime expecations. * Add s7r's DoS points. * Add notes from Thursday dev meeting discussion. * Address Aaron's mailinglist comments (except for the CDF). * Add discussion items from the dev meeting.
* 264: Putting version numbers on the Tor subprotocolsNick Mathewson2016-01-06
|
* Prop262: s/shake128/shake256/Nick Mathewson2015-12-31
|
* Add proposal 263 (ntru)Nick Mathewson2015-12-28
|
* Add proposal 261 and 262, for AEZ and rekeyingNick Mathewson2015-12-28
|
* Bug 16081: Document status code consistency in single replyGeorg Koppen2015-12-16
|
* Clarify that HSDir flag is provided after 96 hours uptimeDonncha O'Cearbhaill2015-11-23
|
* Give rend-single-onion a number (260)Nick Mathewson2015-11-20
|
* Merge remote-tracking branch 'teor/reject-private'Nick Mathewson2015-11-20
|\
| * Update control-spec for exit-policy/reject-private/*teor (Tim Wilson-Brown)2015-11-16
| |
* | Merge branch 'rend-ng-descriptors_squashed'Nick Mathewson2015-11-20
|\ \
| * | prop224: avoid replicas with the same blinded keyteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Each replicas uses one of multiple blinded keys (and a different descriptor signing key) to avoid HSDirs being able to locate other replicas of the service. In combination with the changes to the salt and revision-counter, this also makes it difficult to link descriptors from the same service at all. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: use a different salt for each replica and uploadteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use a different salt for each descriptor replica and upload, to avoid matching encrypted blobs, which could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: randomise revision-counter to avoid information leaksteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Randomise revision-counter start value and increment to avoid leaking: * the descriptor validity start time, * the age of new hidden services, * the stability of a hidden service, * a value that could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: deal with replica hashring collisionsteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | If multiple replicas want to use the same HSDir, give it to the lower-numbered replica, and have the higher-numbered replica(s) ignore it when counting nodes. This avoids services choosing the same HSDir for multiple replicas / spreads, and therefore losing redundancy.
| * | prop224: hash raw random bytes before useteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | Exposing raw random bytes from a PRNG has broken Dual EC: http://projectbullrun.org/dual-ec/ext-rand.html Based on ioerror's feedback on prop250, make similar changes: https://lists.torproject.org/pipermail/tor-dev/2015-November/009954.html
| * | prop224: add distinguishing values to every hashteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | Some hashes were missing distinguishing values, even though other hashes had them, and the "Cryptographic building blocks" section appears to require them: "all signatures are generated not over strings themselves, but over those strings prefixed with a distinguishing value"
| * | prop224: note prop252 wants to add extend-info to the descriptorteor (Tim Wilson-Brown)2015-11-20
| | |
* | | Merge remote-tracking branch 'teor/feature-17178-rsos'Nick Mathewson2015-11-20
|\ \ \ | |/ / |/| |
| * | Update RSOS proposal: RendPostPeriod and other option recommendationsteor (Tim Wilson-Brown)2015-11-20
| | |
| * | Prop Rendezvous Single Onionteor (Tim Wilson-Brown)2015-10-23
| | | | | | | | | | | | | | | | | | | | | An updated and expanded version of "Direct Onion Services: Fast-but-not-hidden services”. Also borrows heavily from "Single Onion Services" (Proposal #252).
* | | Add a relay_early section to prop249Nick Mathewson2015-11-16
| |/ |/|
* | Fold in changes to the shared randomness proposal (prop250).George Kadianakis2015-11-12
| | | | | | | | | | | | | | | | | | - Remove majority requirement for commitments. - Remove conflict detection. - Remove the need for SR keys. - Don't use signatures in commits. - Simplify persistent state logic. - Change the protocol starting time from 12:00UTC to 00:00UTC.
* | Bug 17578: Fix typos in control-spec.txtGeorg Koppen2015-11-10
| |
* | Merge remote-tracking branch 'donncha/fix-15190'Nick Mathewson2015-11-04
|\ \
| * | Specify the 10 introduction points limit in hidden service descriptors.Donncha O'Cearbhaill2015-11-02
| | |
| * | Remove the unimplemented service-authentication field (#15190).Donncha O'Cearbhaill2015-11-02
| | |
* | | Rewrite the existing PT spec to be not Tor specific.Yawning Angel2015-11-03
|/ / | | | | | | | | | | | | | | | | | | | | | | This attempts to make it clear that PTs are not just for Tor, and can be used by any project, and should be sufficient documentation for writing the PT glue code both for Tor and other projects. TODO: Fold in the implemented parts of prop 196/217. I'll do this when I have time, since statistics are useful for everybody. Fixes: #13369, #15545 Completes: #16754
* | Merge branch 'prop259-typos'Isis Lovecruft2015-11-01
|\ \
| * | Fix three typos in prop#259.junglefowl2015-11-01
|/ /
* | Fix typo in prop#259.Isis Lovecruft2015-10-30
| |
* | Merge branch 'prop188-self-testing'Isis Lovecruft2015-10-30
|\ \
| * | Add additional comments to prop#188 on bridge reachability self-testing.Isis Lovecruft2015-10-30
| | |
* | | now it is proposal 259Nick Mathewson2015-10-29
| | |
* | | Merge remote-tracking branch 'isis/bug17261-best-guess'Nick Mathewson2015-10-29
|\ \ \ | |/ /