diff options
author | Nick Mathewson <nickm@torproject.org> | 2007-08-21 05:37:24 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2007-08-21 05:37:24 +0000 |
commit | 7dbe7fd4d86f202714ce110b46f59e6ed243af16 (patch) | |
tree | 374bb598df817e4f60b80da4b22d2360f912ba19 /doc | |
parent | 8cb6b2bc74c037331f7da26d4f3f92b34b4b9b98 (diff) | |
download | tor-7dbe7fd4d86f202714ce110b46f59e6ed243af16.tar.gz tor-7dbe7fd4d86f202714ce110b46f59e6ed243af16.zip |
r14758@catbus: nickm | 2007-08-21 01:36:03 -0400
Finish implementing and documenting proposal 108: Authorities now use MTBF data to set their stability flags, once they have at least 4 days of data to use.
svn:r11240
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 20 | ||||
-rw-r--r-- | doc/tor.1.in | 4 |
2 files changed, 19 insertions, 5 deletions
@@ -88,8 +88,7 @@ Things we'd like to do in 0.2.0.x: - Download as needed. o Serve list as needed. o Avoid double-checking signatures every time we get a vote. - - Warn about expired stuff. - - Fix all XXXX020s in vote code + . Code to generate consensus from a list of votes * Detect whether votes are really all for the same period. . Push/pull documents as appropriate. @@ -100,23 +99,34 @@ Things we'd like to do in 0.2.0.x: o Have clients know which authorities are v3 authorities, and what their keys are. - While we're at it, let v3 authorities have fqdns lines. + - Fix all XXXX020s in vote code + - Validate information properly. + - Warn if we get a vote with different authorities than we know. + - Don't count votes with a different valid-after when generating + the same consensus. + - Dump certificates with the wrong time. Or just warn? + - Warn authority ops when their certs are nearly invalid. + - When checking a consensus, make sure that its times are plausible. + - Add a function that will eventually tell us about our clock skew. + For now, just require that authorities not be skewed. - Start caching consensus documents once authorities make them - Start downloading and using consensus documents once caches serve them . 104: Long and Short Router Descriptors o Merge proposal - Drop bandwidth history from router-descriptors - 105: Version negotiation for the Tor protocol - . 108: Base "Stable" Flag on Mean Time Between Failures + o 108: Base "Stable" Flag on Mean Time Between Failures o Track mtbf in rephist.c o Do not delete old stability information if we're an authority. o Make sure authorities call up/down functions as appropriate. o Record mtbf between invocations - - Base Stable on mtbf. - - Test mtbf logic. + o Base Stable on mtbf. + o Test mtbf logic. - 113: Simplifying directory authority administration - 110: prevent infinite-length circuits (phase one) - servers should recognize relay_extend cells and pass them on just like relay cells + - Refactoring: - Make resolves no longer use edge_connection_t unless they are actually _on_ a socks connection: have edge_connection_t and (say) diff --git a/doc/tor.1.in b/doc/tor.1.in index 5be54902ef..e53a89e263 100644 --- a/doc/tor.1.in +++ b/doc/tor.1.in @@ -1199,6 +1199,10 @@ Only used by servers. Holds the fingerprint of the server's identity key. Only for naming authoritative directory servers (see \fBNamingAuthoritativeDirectory\fP). This file lists nickname to identity bindings. Each line lists a nickname and a fingerprint separated by whitespace. See your \fBfingerprint\fP file in the \fIDataDirectory\fP for an example line. If the nickname is \fB!reject\fP then descriptors from the given identity (fingerprint) are rejected by this server. If it is \fB!invalid\fP then descriptors are accepted but marked in the directory as not valid, that is, not recommended. .LP .TP +.B \fIDataDirectory\fP/router-stability +Only used by authoritative directory servers. Tracks measurements for router mean-time-between-failures so that authorities have a good idea of how to set their Stable flags. +.LP +.TP .B \fIHiddenServiceDirectory\fP/hostname The <base32-encoded-fingerprint>.onion domain name for this hidden service. .LP |