summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* typo fixes while reading 264Roger Dingledine2016-02-12
|
* fixes from reading 266; and ask a questionRoger Dingledine2016-02-12
|
* renumber 260Roger Dingledine2016-02-11
|
* grammar/etc clarifications while reading proposal 260Roger Dingledine2016-02-11
|
* tiny tweaks to proposal 255 after readingRoger Dingledine2016-02-11
|
* Apply Zhenfei et. al's changes to prop#263.Isis Lovecruft2016-02-10
| | | | | | | | After the following development meeting discussing this proposal: http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-02-04-13.28.html These changes were sent to tor-dev@lists.torproject.org: https://lists.torproject.org/pipermail/tor-dev/2016-February/010379.html
* prop250: Change INT_8 to INT_1, it's in bytesDavid Goulet2016-02-09
| | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* Changes to prop250 after reading group and Nick's comments.George Kadianakis2016-02-05
| | | | | | | | | | | | - Remove ed25519 keys completely. Use RSA keys for referencing. - Replace SHA256 with SHA3-256 (Keccak). - Specify better the format and contents of TIMESTAMP. - Put TIMESTAMP in the front of COMMIT for symmetry with REVEAL. - Use base64 not base32. - Specify what happens when PREVIOUS_SRV is unknown. - Remove some paragraphs that are no longer valid. - Simplify consistent ordering in HASHED_REVEALS. - Put algorithm name first on disk and commit.
* typo and clarification for proposal 249Roger Dingledine2016-02-04
|
* grammar fixes on proposal 263Roger Dingledine2016-02-04
|
* Fix a typo in the directory spec where cache was used instead of clientteor (Tim Wilson-Brown)2016-01-25
|
* Clients may bootstrap from a default fallback directory mirrorteor (Tim Wilson-Brown)2016-01-25
| | | | | Update the directory spec to describe client behaviour with default fallback directory mirrors after #15775 and #4483.
* prop246: Change status to needs-researchDavid Goulet2016-01-18
| | | | Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* Add my removing-obsolete-clients proposal as 266Nick Mathewson2016-01-14
|
* add proposal 265: Load Balancing with Overhead ParametersNick Mathewson2016-01-14
|
* In addition to the content, explain the format tooSven Herzberg2016-01-14
| | | | | | The term “X509 certificate” actually only describes one part of the format. Be more explicit to mean DER encoded certificates (in contrast to PEM encoded certifcates).
* Merge remote-tracking branch 'public/bug16227'Nick Mathewson2016-01-12
|\
| * One more singleton case.Nick Mathewson2016-01-12
| |
| * Document which descriptor items aren't allowed to take extra argsNick Mathewson2016-01-12
| | | | | | | | Closes #16227
* | prop250: Update to the latest version from asn/dgouletDavid Goulet2016-01-12
| | | | | | | | | | | | This version matches the implementation submitted for review. Signed-off-by: David Goulet <dgoulet@ev0ke.net>
* | Apply updated proposal 263 from tor-devNick Mathewson2016-01-12
|/
* Fix a sentence that teor pointed out whereNick Mathewson2016-01-11
|
* Update Proposal #247 based on discussion and community review.Mike Perry2016-01-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The following changes were made: * Randomize second and third guard layers. * Fold in my comments about using disjoint sets ("buckets") for the third level guard. * Make the paremeter discussion subsection its own section, and include tables with far more detail for the Sybil success rates. * Changed the default parameters based on these tables, and based on my own intuition about Tor's performance properties. * Move the load balancing, torrc, and other performance considerations to their own section (Section 5). * Move "3.2. Distinguishing new HS circuits from normal HS circuits" to section 4.1. * Fold in some of "3.3. Circuit nodes can now be linked to specific hidden services" into 4.1. Some of it I just removed, though, because I did not find it credible. * Added Roger's concerns about guard linkability to Section 4.2. * Added a denial of service subsection to Section 4.3. * Try to make a coherent threat model and specify its assumptions * Put the rotation period in a separate subsection from the number of guards * Switch to using min(X,X) and max(X,X) for the distribution for the second and third layer guard lifespans, respectively. Add a subsection describing this distribution (3.2.3) * Include python functions for the min and max probability distributions. * Mention that third nodes can probe to see if they are one of the current RPs. * Provide CDF for rotation functions for Sybil runtime expecations. * Add s7r's DoS points. * Add notes from Thursday dev meeting discussion. * Address Aaron's mailinglist comments (except for the CDF). * Add discussion items from the dev meeting.
* 264: Putting version numbers on the Tor subprotocolsNick Mathewson2016-01-06
|
* Prop262: s/shake128/shake256/Nick Mathewson2015-12-31
|
* Add proposal 263 (ntru)Nick Mathewson2015-12-28
|
* Add proposal 261 and 262, for AEZ and rekeyingNick Mathewson2015-12-28
|
* Bug 16081: Document status code consistency in single replyGeorg Koppen2015-12-16
|
* Clarify that HSDir flag is provided after 96 hours uptimeDonncha O'Cearbhaill2015-11-23
|
* Give rend-single-onion a number (260)Nick Mathewson2015-11-20
|
* Merge remote-tracking branch 'teor/reject-private'Nick Mathewson2015-11-20
|\
| * Update control-spec for exit-policy/reject-private/*teor (Tim Wilson-Brown)2015-11-16
| |
* | Merge branch 'rend-ng-descriptors_squashed'Nick Mathewson2015-11-20
|\ \
| * | prop224: avoid replicas with the same blinded keyteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Each replicas uses one of multiple blinded keys (and a different descriptor signing key) to avoid HSDirs being able to locate other replicas of the service. In combination with the changes to the salt and revision-counter, this also makes it difficult to link descriptors from the same service at all. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: use a different salt for each replica and uploadteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use a different salt for each descriptor replica and upload, to avoid matching encrypted blobs, which could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: randomise revision-counter to avoid information leaksteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Randomise revision-counter start value and increment to avoid leaking: * the descriptor validity start time, * the age of new hidden services, * the stability of a hidden service, * a value that could be used to link other replicas of the service. If descriptors for different replicas cannot be linked, then it becomes much harder for a malicious HSDir to discover other replicas and attept to DoS them.
| * | prop224: deal with replica hashring collisionsteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | If multiple replicas want to use the same HSDir, give it to the lower-numbered replica, and have the higher-numbered replica(s) ignore it when counting nodes. This avoids services choosing the same HSDir for multiple replicas / spreads, and therefore losing redundancy.
| * | prop224: hash raw random bytes before useteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | Exposing raw random bytes from a PRNG has broken Dual EC: http://projectbullrun.org/dual-ec/ext-rand.html Based on ioerror's feedback on prop250, make similar changes: https://lists.torproject.org/pipermail/tor-dev/2015-November/009954.html
| * | prop224: add distinguishing values to every hashteor (Tim Wilson-Brown)2015-11-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | Some hashes were missing distinguishing values, even though other hashes had them, and the "Cryptographic building blocks" section appears to require them: "all signatures are generated not over strings themselves, but over those strings prefixed with a distinguishing value"
| * | prop224: note prop252 wants to add extend-info to the descriptorteor (Tim Wilson-Brown)2015-11-20
| | |
* | | Merge remote-tracking branch 'teor/feature-17178-rsos'Nick Mathewson2015-11-20
|\ \ \ | |/ / |/| |
| * | Update RSOS proposal: RendPostPeriod and other option recommendationsteor (Tim Wilson-Brown)2015-11-20
| | |
| * | Prop Rendezvous Single Onionteor (Tim Wilson-Brown)2015-10-23
| | | | | | | | | | | | | | | | | | | | | An updated and expanded version of "Direct Onion Services: Fast-but-not-hidden services”. Also borrows heavily from "Single Onion Services" (Proposal #252).
* | | Add a relay_early section to prop249Nick Mathewson2015-11-16
| |/ |/|
* | Fold in changes to the shared randomness proposal (prop250).George Kadianakis2015-11-12
| | | | | | | | | | | | | | | | | | - Remove majority requirement for commitments. - Remove conflict detection. - Remove the need for SR keys. - Don't use signatures in commits. - Simplify persistent state logic. - Change the protocol starting time from 12:00UTC to 00:00UTC.
* | Bug 17578: Fix typos in control-spec.txtGeorg Koppen2015-11-10
| |
* | Merge remote-tracking branch 'donncha/fix-15190'Nick Mathewson2015-11-04
|\ \
| * | Specify the 10 introduction points limit in hidden service descriptors.Donncha O'Cearbhaill2015-11-02
| | |
| * | Remove the unimplemented service-authentication field (#15190).Donncha O'Cearbhaill2015-11-02
| | |
* | | Rewrite the existing PT spec to be not Tor specific.Yawning Angel2015-11-03
|/ / | | | | | | | | | | | | | | | | | | | | | | This attempts to make it clear that PTs are not just for Tor, and can be used by any project, and should be sufficient documentation for writing the PT glue code both for Tor and other projects. TODO: Fold in the implemented parts of prop 196/217. I'll do this when I have time, since statistics are useful for everybody. Fixes: #13369, #15545 Completes: #16754