aboutsummaryrefslogtreecommitdiff
path: root/doc/spec
Commit message (Collapse)AuthorAge
* Count bytes we spend on answering directory requests.Karsten Loesing2010-08-18
|
* Clarify that implementation is for discussion of implementationNick Mathewson2010-08-03
|
* Add proposal 174 from Ian Goldberg: Optimistic Data for Tor: Server SideNick Mathewson2010-08-03
|
* Bless two proposals from Damian Johnson as 172 and 173.Nick Mathewson2010-08-03
| | | | (Leaving a gap for the proposal Jake blessed as 171.)
* Merge commit 'sebastian/rend-spec'Nick Mathewson2010-08-03
|\
| * Clarify that rend cookies shouldn't be reusedSebastian Hahn2010-08-03
| |
* | Fix copy-and-paste fail in dir-spec.txt.Karsten Loesing2010-08-03
|/
* Add two authoritzation protocols to rend-spec.txt.Karsten Loesing2010-07-30
|
* Clean up Section 1 of rend-spec.txt.Karsten Loesing2010-07-30
|
* Interchange sections 1.2 and 1.3.Karsten Loesing2010-07-30
|
* Rename all RELAY_* cell types to RELAY_COMMAND_*.Karsten Loesing2010-07-30
|
* Alter how guard flags are chosen.Mike Perry2010-07-14
| | | | | | | | V3 authorities no longer decide not to vote on Guard+Exit. The bandwidth weights should take care of this now. Also, lower the max threshold for WFU to 0.98, to allow more nodes to become guards.
* Merge remote branch 'mikeperry/cbt-bugfixes3'Nick Mathewson2010-06-29
|\
| * Add CLOSE_MS and CLOSE_RATE keywords to buildtimeout event.Mike Perry2010-06-15
| |
| * Update spec with new right-censored pareto estimators.Mike Perry2010-06-09
| |
| * Bug 1296: Add option+logic to disable CBT learning.Mike Perry2010-05-10
| | | | | | | | | | | | | | | | | | There are now four ways that CBT can be disabled: 1. Network-wide, with the cbtdisabled consensus param. 2. Via config, with "LearnCircuitBuildTimeout 0" 3. Via config, with "AuthoritativeDirectory 1" 4. Via a state file write failure.
| * Update path-spec.txt with contents of proposal 151.Mike Perry2010-05-10
| |
| * Add a TIMEOUT_RATE keyword to buildtimeout event.Mike Perry2010-05-10
| |
* | Make spec docs reference RFC2119Nick Mathewson2010-06-25
| | | | | | | | | | Now people will have no excuse for not knowing what "MUST" and "MAY" mean. Fixes bug 1310.
* | Merge commit 'sjmurdoch/xxx-using-spdy'Nick Mathewson2010-06-11
|\ \ | |/ |/|
| * Update idea xxx-using-spdy, based on or-dev discussionSteven Murdoch2010-03-14
| | | | | | | | | | | | | | | | | | | | - Mention potentially negative consequence of server push, combined with client caching - Make the new cell type more generic, allowing other types of exit-side transforms (suggested by nickm) See http://archives.seul.org/or/dev/Feb-2010/msg00000.html
| * Add new idea: Using the SPDY protocol to improve Tor performanceSteven Murdoch2010-03-12
| |
* | Rename CircPriorityHalflifeMsec to CircuitPriorityHalflifeMsecNick Mathewson2010-04-13
| | | | | | | | | | | | | | | | | | Everything that accepted the 'Circ' name handled it wrong, so even now that we fixed the handling of the parameter, we wouldn't be able to set it without making all the 0.2.2.7..0.2.2.10 relays act wonky. This patch makes Tors accept the 'Circuit' name instead, so we can turn on circuit priorities without confusing the versions that treated the 'Circ' name as occasion to act weird.
* | Add a missing NL to dir-spec.Nick Mathewson2010-03-21
| | | | | | | | Found by Oğuz
* | fix some dangling refs in dirspecNick Mathewson2010-03-15
| |
* | Clarify title of section 3.3Nick Mathewson2010-03-13
|/
* Document possibility of "unknown" version state.Nick Mathewson2010-03-09
| | | | reported by atagar; fixes bug 1289.
* Clarify that CRLF means "A CR then an LF". Explain what those are.Nick Mathewson2010-03-05
| | | | Apparently this is not as obvious as I thought.
* Add proposal 170 "Configuration options regarding circuit building"Sebastian Hahn2010-03-03
|
* Merge remote branch 'mikeperry/consensus-bw-weights5-merge'Nick Mathewson2010-02-25
|\ | | | | | | | | Conflicts: ChangeLog
| * Update dir-spec.txt with begin_dir weights.Mike Perry2010-02-25
| |
| * Update consensus methods in spec.Mike Perry2010-02-22
| |
| * Update specs for weight computation and use.Mike Perry2010-02-22
| |
* | Mark 160 and 161 as Finished.Nick Mathewson2010-02-22
|/
* minor fixes in proposal 169Roger Dingledine2010-02-21
| | | | still need to finish reading it, but so far so good
* Allow "EXTENDCIRCUIT 0" to omit a path.Mike Perry2010-02-18
|
* Add BUILDTIMEOUT_SET event for CBT stress testing.Mike Perry2010-02-18
|
* Clarify a paragraph in prop 169.Nick Mathewson2010-01-29
|
* The name for the proposal status of 151 is "finished", not "Implemented"Nick Mathewson2010-01-28
|
* Proposal 169: Eliminate TLS renegotiationNick Mathewson2010-01-28
| | | | | | | | | | | | | I propose a backward-compatible change to the Tor connection establishment protocol to avoid the use of TLS renegotiation. Rather than doing a TLS renegotiation to exchange certificates and authenticate the original handshake, this proposal takes an approach similar to Steven Murdoch's proposal 124, and uses Tor cells to authenticate the parties' identities once the initial TLS handshake is finished.
* whitespace fixesRoger Dingledine2010-01-15
|
* fix some typos in our spec filesRoger Dingledine2010-01-15
|
* ship the bridges spec file in the tarball tooRoger Dingledine2010-01-15
|
* start to document commonly used "param" argumentsRoger Dingledine2009-12-19
|
* Fix bridge statistics.Karsten Loesing2009-12-17
| | | | | | Fix statistics on client numbers by country as seen by bridges that were broken in 0.2.2.1-alpha. Also switch to reporting full 24-hour intervals instead of variable 12-to-48-hour intervals.
* New controller command "getinfo config-text"Roger Dingledine2009-12-13
| | | | | It returns the contents that Tor would write if you send it a SAVECONF command, so the controller can write the file to disk itself.
* Revise consensus-flavors proposal to better URLs.Nick Mathewson2009-10-18
| | | | | | The old flavored consensus URL format made it harder to decode URLs based on their prefixes, and didn't take into account our "only give it to me if it's signed by enough authorities" stuff.
* Revise proposal 162: SHA256(x), not SHA256(SHA256(x))Nick Mathewson2009-10-15
| | | | | | | | The point of doing SHA256 twice is, generally, is to prevent message extension attacks where an attacker who knows H(A) can calculate H(A|B). But for attaching a signature to a document, the attacker already _knows_ A, so trying to keep them from calculating H(A|B) is pointless.
* Revise 162's idea of how detached signatures work with flavorsNick Mathewson2009-10-15
| | | | | The original proposal was vague and would have made older Tors reject detached-signature documents as soon as they saw one with flavors.
* correct the spec for the stream_bw event.Roger Dingledine2009-10-10
| | | | | | | "neonomad" pointed out on or-talk that the order is opposite from the intuitive order. explain why. we chose to fix the spec rather than the code because there are controllers like torflow that already expect the current behavior.