aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-12-15 07:58:31 +0000
committerRoger Dingledine <arma@torproject.org>2006-12-15 07:58:31 +0000
commit0bc0688668586e15cfdfee8828893d041d5babb1 (patch)
tree6638ec0645b498afdde592b0dfc82b69e1ed0d0a /doc
parent38bd6837dba242bc7e86f033a206cd5082930934 (diff)
downloadtor-0bc0688668586e15cfdfee8828893d041d5babb1.tar
tor-0bc0688668586e15cfdfee8828893d041d5babb1.tar.gz
if we rotate our onion key, publish a new descriptor, and
die soon after, we want to stick with that onion key when we restart. svn:r9121
Diffstat (limited to 'doc')
-rw-r--r--doc/dir-spec.txt11
1 files changed, 5 insertions, 6 deletions
diff --git a/doc/dir-spec.txt b/doc/dir-spec.txt
index 6ca5cd4e8..10aa424a0 100644
--- a/doc/dir-spec.txt
+++ b/doc/dir-spec.txt
@@ -205,7 +205,7 @@ $Id$
"onion-key" NL a public key in PEM format
This key is used to encrypt EXTEND cells for this OR. The key MUST be
- accepted for at least XXXX hours after any new key is published in a
+ accepted for at least 1 week after any new key is published in a
subsequent descriptor.
"signing-key" NL a public key in PEM format
@@ -257,7 +257,7 @@ $Id$
"eventdns" bool NL
Declare whether this version of Tor is using the newer enhanced
- dns logic. Versions of Tor without eventdns SHOULD not be used for
+ dns logic. Versions of Tor without eventdns SHOULD NOT be used for
reverse hostname lookups.
[All versions of Tor before 0.1.2.2-alpha should be assumed to have
@@ -431,8 +431,7 @@ $Id$
blacklisted, and elect not to include them in their network-status lists.
Thus, the network-status list includes all non-blacklisted,
- non-expired, non-superseded descriptors for ORs that the directory has
- observed at least once to be running.
+ non-expired, non-superseded descriptors.
4. Directory server operation
@@ -506,8 +505,8 @@ $Id$
router. Servers must not discard any descriptor listed by any current
network-status document from any authority. If there is enough space to
store additional descriptors, servers SHOULD try to hold those which
- clients are likely download the most. (Currently, this is judged based on
- the interval for which each descriptor seemed newest.)
+ clients are likely to download the most. (Currently, this is judged
+ based on the interval for which each descriptor seemed newest.)
Authorities SHOULD NOT download descriptors for routers that they would
immediately reject for reasons listed in 3.1.