aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2023-10-12 12:27:59 -0400
committerNick Mathewson <nickm@torproject.org>2023-10-12 12:27:59 -0400
commit1eaaf7f4ac887ea748375920e27d664c7401f2eb (patch)
tree99eb8d8ae9c91658315f229501ff309ff42e9842
parent7589a207493f5a3200823bc340bccb24987b8164 (diff)
downloadtorspec-1eaaf7f4ac887ea748375920e27d664c7401f2eb.tar.gz
torspec-1eaaf7f4ac887ea748375920e27d664c7401f2eb.zip
Wrap text proposals in backticks.
-rw-r--r--proposals/000-index.txt2
-rw-r--r--proposals/001-process.txt2
-rw-r--r--proposals/098-todo.txt2
-rw-r--r--proposals/099-misc.txt2
-rw-r--r--proposals/100-tor-spec-udp.txt2
-rw-r--r--proposals/101-dir-voting.txt2
-rw-r--r--proposals/102-drop-opt.txt2
-rw-r--r--proposals/103-multilevel-keys.txt2
-rw-r--r--proposals/104-short-descriptors.txt2
-rw-r--r--proposals/105-handshake-revision.txt2
-rw-r--r--proposals/106-less-tls-constraint.txt2
-rw-r--r--proposals/107-uptime-sanity-checking.txt2
-rw-r--r--proposals/108-mtbf-based-stability.txt2
-rw-r--r--proposals/109-no-sharing-ips.txt2
-rw-r--r--proposals/110-avoid-infinite-circuits.txt2
-rw-r--r--proposals/111-local-traffic-priority.txt2
-rw-r--r--proposals/112-bring-back-pathlencoinweight.txt2
-rw-r--r--proposals/113-fast-authority-interface.txt2
-rw-r--r--proposals/114-distributed-storage.txt2
-rw-r--r--proposals/115-two-hop-paths.txt2
-rw-r--r--proposals/116-two-hop-paths-from-guard.txt2
-rw-r--r--proposals/117-ipv6-exits.txt2
-rw-r--r--proposals/118-multiple-orports.txt2
-rw-r--r--proposals/119-controlport-auth.txt2
-rw-r--r--proposals/120-shutdown-descriptors.txt2
-rw-r--r--proposals/121-hidden-service-authentication.txt2
-rw-r--r--proposals/122-unnamed-flag.txt2
-rw-r--r--proposals/123-autonaming.txt2
-rw-r--r--proposals/124-tls-certificates.txt2
-rw-r--r--proposals/125-bridges.txt2
-rw-r--r--proposals/126-geoip-reporting.txt2
-rw-r--r--proposals/127-dirport-mirrors-downloads.txt2
-rw-r--r--proposals/128-bridge-families.txt2
-rw-r--r--proposals/129-reject-plaintext-ports.txt2
-rw-r--r--proposals/130-v2-conn-protocol.txt2
-rw-r--r--proposals/131-verify-tor-usage.txt2
-rw-r--r--proposals/132-browser-check-tor-service.txt2
-rw-r--r--proposals/133-unreachable-ors.txt2
-rw-r--r--proposals/134-robust-voting.txt2
-rw-r--r--proposals/135-private-tor-networks.txt2
-rw-r--r--proposals/136-legacy-keys.txt2
-rw-r--r--proposals/137-bootstrap-phases.txt2
-rw-r--r--proposals/138-remove-down-routers-from-consensus.txt2
-rw-r--r--proposals/139-conditional-consensus-download.txt2
-rw-r--r--proposals/140-consensus-diffs.txt2
-rw-r--r--proposals/141-jit-sd-downloads.txt2
-rw-r--r--proposals/142-combine-intro-and-rend-points.txt2
-rw-r--r--proposals/143-distributed-storage-improvements.txt2
-rw-r--r--proposals/144-enforce-distinct-providers.txt2
-rw-r--r--proposals/145-newguard-flag.txt2
-rw-r--r--proposals/146-long-term-stability.txt2
-rw-r--r--proposals/147-prevoting-opinions.txt2
-rw-r--r--proposals/148-uniform-client-end-reason.txt2
-rw-r--r--proposals/149-using-netinfo-data.txt2
-rw-r--r--proposals/150-exclude-exit-nodes.txt2
-rw-r--r--proposals/151-path-selection-improvements.txt2
-rw-r--r--proposals/152-single-hop-circuits.txt2
-rw-r--r--proposals/153-automatic-software-update-protocol.txt2
-rw-r--r--proposals/154-automatic-updates.txt2
-rw-r--r--proposals/155-four-hidden-service-improvements.txt2
-rw-r--r--proposals/156-tracking-blocked-ports.txt2
-rw-r--r--proposals/157-specific-cert-download.txt2
-rw-r--r--proposals/158-microdescriptors.txt2
-rw-r--r--proposals/159-exit-scanning.txt2
-rw-r--r--proposals/160-bandwidth-offset.txt2
-rw-r--r--proposals/161-computing-bandwidth-adjustments.txt2
-rw-r--r--proposals/162-consensus-flavors.txt2
-rw-r--r--proposals/163-detecting-clients.txt2
-rw-r--r--proposals/164-reporting-server-status.txt2
-rw-r--r--proposals/165-simple-robust-voting.txt2
-rw-r--r--proposals/166-statistics-extra-info-docs.txt2
-rw-r--r--proposals/167-params-in-consensus.txt2
-rw-r--r--proposals/168-reduce-circwindow.txt2
-rw-r--r--proposals/169-eliminating-renegotiation.txt2
-rw-r--r--proposals/170-user-path-config.txt2
-rw-r--r--proposals/171-separate-streams.txt2
-rw-r--r--proposals/172-circ-getinfo-option.txt2
-rw-r--r--proposals/173-getinfo-option-expansion.txt2
-rw-r--r--proposals/174-optimistic-data-server.txt2
-rw-r--r--proposals/175-automatic-node-promotion.txt2
-rw-r--r--proposals/176-revising-handshake.txt2
-rw-r--r--proposals/177-flag-abstention.txt2
-rw-r--r--proposals/178-param-voting.txt2
-rw-r--r--proposals/179-TLS-cert-and-parameter-normalization.txt2
-rw-r--r--proposals/180-pluggable-transport.txt2
-rw-r--r--proposals/181-optimistic-data-client.txt2
-rw-r--r--proposals/182-creditbucket.txt2
-rw-r--r--proposals/183-refillintervals.txt2
-rw-r--r--proposals/184-v3-link-protocol.txt2
-rw-r--r--proposals/185-dir-without-dirport.txt2
-rw-r--r--proposals/186-multiple-orports.txt2
-rw-r--r--proposals/187-allow-client-auth.txt2
-rw-r--r--proposals/188-bridge-guards.txt2
-rw-r--r--proposals/189-authorize-cell.txt2
-rw-r--r--proposals/190-shared-secret-bridge-authorization.txt2
-rw-r--r--proposals/191-mitm-bridge-detection-resistance.txt2
-rw-r--r--proposals/192-store-bridge-information.txt2
-rw-r--r--proposals/193-safe-cookie-authentication.txt2
-rw-r--r--proposals/194-mnemonic-urls.txt2
-rw-r--r--proposals/195-TLS-normalization-for-024.txt2
-rw-r--r--proposals/196-transport-control-ports.txt2
-rw-r--r--proposals/197-postmessage-ipc.txt2
-rw-r--r--proposals/198-restore-clienthello-semantics.txt2
-rw-r--r--proposals/199-bridgefinder-integration.txt2
-rw-r--r--proposals/200-new-create-and-extend-cells.txt2
-rw-r--r--proposals/201-bridge-v3-reqs-stats.txt2
-rw-r--r--proposals/202-improved-relay-crypto.txt2
-rw-r--r--proposals/203-https-frontend.txt2
-rw-r--r--proposals/204-hidserv-subdomains.txt2
-rw-r--r--proposals/205-local-dnscache.txt2
-rw-r--r--proposals/206-directory-sources.txt2
-rw-r--r--proposals/207-directory-guards.txt2
-rw-r--r--proposals/208-ipv6-exits-redux.txt2
-rw-r--r--proposals/209-path-bias-tuning.txt2
-rw-r--r--proposals/210-faster-headless-consensus-bootstrap.txt2
-rw-r--r--proposals/211-mapaddress-tor-status.txt2
-rw-r--r--proposals/212-using-old-consensus.txt2
-rw-r--r--proposals/213-remove-stream-sendmes.txt2
-rw-r--r--proposals/214-longer-circids.txt2
-rw-r--r--proposals/215-update-min-consensus-ver.txt2
-rw-r--r--proposals/216-ntor-handshake.txt2
-rw-r--r--proposals/217-ext-orport-auth.txt2
-rw-r--r--proposals/218-usage-controller-events.txt2
-rw-r--r--proposals/219-expanded-dns.txt2
-rw-r--r--proposals/220-ecc-id-keys.txt2
-rw-r--r--proposals/221-stop-using-create-fast.txt2
-rw-r--r--proposals/222-remove-client-timestamps.txt2
-rw-r--r--proposals/223-ace-handshake.txt2
-rw-r--r--proposals/224-rend-spec-ng.txt2
-rw-r--r--proposals/225-strawman-shared-rand.txt2
-rw-r--r--proposals/226-bridgedb-database-improvements.txt2
-rw-r--r--proposals/227-vote-on-package-fingerprints.txt2
-rw-r--r--proposals/228-cross-certification-onionkeys.txt2
-rw-r--r--proposals/229-further-socks5-extensions.txt2
-rw-r--r--proposals/230-rsa1024-relay-id-migration.txt2
-rw-r--r--proposals/231-migrate-authority-rsa1024-ids.txt2
-rw-r--r--proposals/232-pluggable-transports-through-proxy.txt2
-rw-r--r--proposals/233-quicken-tor2web-mode.txt2
-rw-r--r--proposals/234-remittance-addresses.txt2
-rw-r--r--proposals/235-kill-named-flag.txt2
-rw-r--r--proposals/236-single-guard-node.txt2
-rw-r--r--proposals/237-directory-servers-for-all.txt2
-rw-r--r--proposals/238-hs-relay-stats.txt2
-rw-r--r--proposals/239-consensus-hash-chaining.txt2
-rw-r--r--proposals/240-auth-cert-revocation.txt2
-rw-r--r--proposals/241-suspicious-guard-turnover.txt2
-rw-r--r--proposals/242-better-families.txt2
-rw-r--r--proposals/243-hsdir-flag-need-stable.txt2
-rw-r--r--proposals/244-use-rfc5705-for-tls-binding.txt2
-rw-r--r--proposals/245-tap-out.txt2
-rw-r--r--proposals/246-merge-hsdir-and-intro.txt2
-rw-r--r--proposals/247-hs-guard-discovery.txt2
-rw-r--r--proposals/248-removing-rsa-identities.txt2
-rw-r--r--proposals/249-large-create-cells.txt2
-rw-r--r--proposals/250-commit-reveal-consensus.txt2
-rw-r--r--proposals/251-netflow-padding.txt2
-rw-r--r--proposals/252-single-onion.txt2
-rw-r--r--proposals/253-oob-hmac.txt2
-rw-r--r--proposals/254-padding-negotiation.txt2
-rw-r--r--proposals/255-hs-load-balancing.txt2
-rw-r--r--proposals/256-key-revocation.txt2
-rw-r--r--proposals/257-hiding-authorities.txt2
-rw-r--r--proposals/258-dirauth-dos.txt2
-rw-r--r--proposals/259-guard-selection.txt2
-rw-r--r--proposals/260-rend-single-onion.txt2
-rw-r--r--proposals/261-aez-crypto.txt2
-rw-r--r--proposals/262-rekey-circuits.txt2
-rw-r--r--proposals/263-ntru-for-pq-handshake.txt2
-rw-r--r--proposals/264-subprotocol-versions.txt2
-rw-r--r--proposals/265-load-balancing-with-overhead.txt2
-rw-r--r--proposals/266-removing-current-obsolete-clients.txt2
-rw-r--r--proposals/267-tor-consensus-transparency.txt2
-rw-r--r--proposals/268-guard-selection.txt2
-rw-r--r--proposals/269-hybrid-handshake.txt2
-rw-r--r--proposals/270-newhope-hybrid-handshake.txt2
-rw-r--r--proposals/271-another-guard-selection.txt2
-rw-r--r--proposals/272-valid-and-running-by-default.txt2
-rw-r--r--proposals/273-exit-relay-pinning.txt2
-rw-r--r--proposals/274-rotate-onion-keys-less.txt2
-rw-r--r--proposals/275-md-published-time-is-silly.txt2
-rw-r--r--proposals/276-lower-bw-granularity.txt2
-rw-r--r--proposals/277-detect-id-sharing.txt2
-rw-r--r--proposals/278-directory-compression-scheme-negotiation.txt2
-rw-r--r--proposals/279-naming-layer-api.txt2
-rw-r--r--proposals/280-privcount-in-tor.txt2
-rw-r--r--proposals/281-bulk-md-download.txt2
-rw-r--r--proposals/282-remove-named-from-consensus.txt2
-rw-r--r--proposals/283-ipv6-in-micro-consensus.txt2
-rw-r--r--proposals/284-hsv3-control-port.txt2
-rw-r--r--proposals/285-utf-8.txt2
-rw-r--r--proposals/286-hibernation-api.txt2
-rw-r--r--proposals/287-reduce-lifetime.txt2
-rw-r--r--proposals/288-privcount-with-shamir.txt2
-rw-r--r--proposals/289-authenticated-sendmes.txt2
-rw-r--r--proposals/290-deprecate-consensus-methods.txt2
-rw-r--r--proposals/291-two-guard-nodes.txt2
-rw-r--r--proposals/292-mesh-vanguards.txt2
-rw-r--r--proposals/293-know-when-to-publish.txt2
-rw-r--r--proposals/294-tls-1.3.txt2
-rw-r--r--proposals/295-relay-crypto-with-adl.txt2
-rw-r--r--proposals/296-expose-bandwidth-files.txt2
-rw-r--r--proposals/297-safer-protover-shutdowns.txt2
-rw-r--r--proposals/298-canonical-families.txt2
-rw-r--r--proposals/299-ip-failure-count.txt2
-rw-r--r--proposals/300-walking-onions.txt2
-rw-r--r--proposals/301-dont-vote-on-package-fingerprints.txt2
-rw-r--r--proposals/302-padding-machines-for-onion-clients.txt2
-rw-r--r--proposals/303-protover-removal-policy.txt2
-rw-r--r--proposals/304-socks5-extending-hs-error-codes.txt2
-rw-r--r--proposals/305-establish-intro-dos-defense-extention.txt2
-rw-r--r--proposals/306-ipv6-happy-eyeballs.txt2
-rw-r--r--proposals/307-onionbalance-v3.txt2
-rw-r--r--proposals/308-counter-galois-onion.txt2
-rw-r--r--proposals/309-optimistic-socks-in-tor.txt2
-rw-r--r--proposals/310-bandaid-on-guard-selection.txt2
-rw-r--r--proposals/311-relay-ipv6-reachability.txt2
-rw-r--r--proposals/312-relay-auto-ipv6-addr.txt2
-rw-r--r--proposals/313-relay-ipv6-stats.txt2
-rw-r--r--proposals/315-update-dir-required-fields.txt2
-rw-r--r--proposals/317-secure-dns-name-resolution.txt2
-rw-r--r--proposals/324-rtt-congestion-control.txt2
-rw-r--r--proposals/327-pow-over-intro.txt2
-rw-r--r--proposals/329-traffic-splitting.txt2
-rw-r--r--proposals/334-middle-only-flag.txt2
-rw-r--r--proposals/343-rend-caa.txt3
-rw-r--r--proposals/344-protocol-info-leaks.txt2
-rw-r--r--proposals/proposal-status.txt2
227 files changed, 454 insertions, 1 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 48765d0..d81a0e2 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -1,3 +1,4 @@
+```
Filename: 000-index.txt
Title: Index of Tor Proposals
Author: Nick Mathewson
@@ -533,3 +534,4 @@ Proposals by status:
INFORMATIONAL:
159 Exit Scanning
300 Walking Onions: Scaling and Saving Bandwidth
+```
diff --git a/proposals/001-process.txt b/proposals/001-process.txt
index 7211c3b..51526bb 100644
--- a/proposals/001-process.txt
+++ b/proposals/001-process.txt
@@ -1,3 +1,4 @@
+```
Filename: 001-process.txt
Title: The Tor Proposal Process
Author: Nick Mathewson
@@ -207,3 +208,4 @@ Proposal numbering:
Numbers 000-099 are reserved for special and meta-proposals. 100 and up
are used for actual proposals. Numbers aren't recycled.
+```
diff --git a/proposals/098-todo.txt b/proposals/098-todo.txt
index 0acb464..91202c9 100644
--- a/proposals/098-todo.txt
+++ b/proposals/098-todo.txt
@@ -1,3 +1,4 @@
+```
Filename: 098-todo.txt
Title: Proposals that should be written
Author: Nick Mathewson, Roger Dingledine
@@ -107,3 +108,4 @@ B.2. ... and that we have no idea how to do.
Let onion keys be not just RSA but maybe DH too, for Paul's reply onion
design.
+```
diff --git a/proposals/099-misc.txt b/proposals/099-misc.txt
index ef34c80..bc44540 100644
--- a/proposals/099-misc.txt
+++ b/proposals/099-misc.txt
@@ -1,3 +1,4 @@
+```
Filename: 099-misc.txt
Title: Miscellaneous proposals
Author: Various
@@ -29,3 +30,4 @@ Proposals
-- Nick Mathewson
+```
diff --git a/proposals/100-tor-spec-udp.txt b/proposals/100-tor-spec-udp.txt
index 7f06222..e9f1eae 100644
--- a/proposals/100-tor-spec-udp.txt
+++ b/proposals/100-tor-spec-udp.txt
@@ -1,3 +1,4 @@
+```
Filename: 100-tor-spec-udp.txt
Title: Tor Unreliable Datagram Extension Proposal
Author: Marc Liberatore
@@ -420,3 +421,4 @@ traffic "for free".
example, what happens when a UDP packet doesn't fit in a single cell?)
-NM
+```
diff --git a/proposals/101-dir-voting.txt b/proposals/101-dir-voting.txt
index 634d3f1..39fa6c6 100644
--- a/proposals/101-dir-voting.txt
+++ b/proposals/101-dir-voting.txt
@@ -1,3 +1,4 @@
+```
Filename: 101-dir-voting.txt
Title: Voting on the Tor Directory System
Author: Nick Mathewson
@@ -281,3 +282,4 @@ by the authorities. -RD]
off very quickly from downloading consensus docs until they're
actually implemented.
+```
diff --git a/proposals/102-drop-opt.txt b/proposals/102-drop-opt.txt
index 490376b..a7d0cbe 100644
--- a/proposals/102-drop-opt.txt
+++ b/proposals/102-drop-opt.txt
@@ -1,3 +1,4 @@
+```
Filename: 102-drop-opt.txt
Title: Dropping "opt" from the directory format
Author: Nick Mathewson
@@ -36,3 +37,4 @@ Status:
once earlier formats are obsolete.
+```
diff --git a/proposals/103-multilevel-keys.txt b/proposals/103-multilevel-keys.txt
index 7ec254a..3bb3c28 100644
--- a/proposals/103-multilevel-keys.txt
+++ b/proposals/103-multilevel-keys.txt
@@ -1,3 +1,4 @@
+```
Filename: 103-multilevel-keys.txt
Title: Splitting identity key from regularly used signing key
Author: Nick Mathewson
@@ -202,3 +203,4 @@ Extensions to Proposal 101.
unknown signing keys might be enough to make the consensus
correctly signed, do not use the consensus, but do not discard
it until we have a new keys document.
+```
diff --git a/proposals/104-short-descriptors.txt b/proposals/104-short-descriptors.txt
index 90e0764..c543bf1 100644
--- a/proposals/104-short-descriptors.txt
+++ b/proposals/104-short-descriptors.txt
@@ -1,3 +1,4 @@
+```
Filename: 104-short-descriptors.txt
Title: Long and Short Router Descriptors
Author: Nick Mathewson
@@ -179,3 +180,4 @@ Migration:
* Once tools that want bandwidth info support fetching extra info:
* Have routers stop including bandwidth info in their router
descriptors.
+```
diff --git a/proposals/105-handshake-revision.txt b/proposals/105-handshake-revision.txt
index 791a016..45a937c 100644
--- a/proposals/105-handshake-revision.txt
+++ b/proposals/105-handshake-revision.txt
@@ -1,3 +1,4 @@
+```
Filename: 105-handshake-revision.txt
Title: Version negotiation for the Tor protocol.
Author: Nick Mathewson, Roger Dingledine
@@ -321,3 +322,4 @@ Security issues:
authorities' RecommmendedVersions mechanism, even if it is still
technically possible to use them.
+```
diff --git a/proposals/106-less-tls-constraint.txt b/proposals/106-less-tls-constraint.txt
index 7e7621d..1655525 100644
--- a/proposals/106-less-tls-constraint.txt
+++ b/proposals/106-less-tls-constraint.txt
@@ -1,3 +1,4 @@
+```
Filename: 106-less-tls-constraint.txt
Title: Checking fewer things during TLS handshakes
Author: Nick Mathewson
@@ -109,3 +110,4 @@ OTHER SPEC CHANGES:
When a client doesn't give us an identity, we should never extend any
circuits to it (duh), and we should allow it to set circuit ID however it
wants.
+```
diff --git a/proposals/107-uptime-sanity-checking.txt b/proposals/107-uptime-sanity-checking.txt
index 922129b..7764889 100644
--- a/proposals/107-uptime-sanity-checking.txt
+++ b/proposals/107-uptime-sanity-checking.txt
@@ -1,3 +1,4 @@
+```
Filename: 107-uptime-sanity-checking.txt
Title: Uptime Sanity Checking
Author: Kevin Bauer & Damon McCoy
@@ -52,3 +53,4 @@ Discussion:
This proposal also led to 108-mtbf-based-stability.txt
+```
diff --git a/proposals/108-mtbf-based-stability.txt b/proposals/108-mtbf-based-stability.txt
index 2941037..962d273 100644
--- a/proposals/108-mtbf-based-stability.txt
+++ b/proposals/108-mtbf-based-stability.txt
@@ -1,3 +1,4 @@
+```
Filename: 108-mtbf-based-stability.txt
Title: Base "Stable" Flag on Mean Time Between Failures
Author: Nick Mathewson
@@ -86,3 +87,4 @@ Implementation:
Servers should probe at random intervals to test whether servers are
running.
+```
diff --git a/proposals/109-no-sharing-ips.txt b/proposals/109-no-sharing-ips.txt
index a0f1fff..98927e9 100644
--- a/proposals/109-no-sharing-ips.txt
+++ b/proposals/109-no-sharing-ips.txt
@@ -1,3 +1,4 @@
+```
Filename: 109-no-sharing-ips.txt
Title: No more than one server per IP address
Author: Kevin Bauer & Damon McCoy
@@ -88,3 +89,4 @@ Compatibility:
[Note Roger's tweak to this behavior, in
http://archives.seul.org/or/cvs/Oct-2007/msg00118.html]
+```
diff --git a/proposals/110-avoid-infinite-circuits.txt b/proposals/110-avoid-infinite-circuits.txt
index 7d6772d..07f5461 100644
--- a/proposals/110-avoid-infinite-circuits.txt
+++ b/proposals/110-avoid-infinite-circuits.txt
@@ -1,3 +1,4 @@
+```
Filename: 110-avoid-infinite-circuits.txt
Title: Avoiding infinite length circuits
Author: Roger Dingledine
@@ -118,3 +119,4 @@ Acknowledgements:
is working on implementing a fix based on this design in the summer
2007 timeframe.)
+```
diff --git a/proposals/111-local-traffic-priority.txt b/proposals/111-local-traffic-priority.txt
index 9411463..762634e 100644
--- a/proposals/111-local-traffic-priority.txt
+++ b/proposals/111-local-traffic-priority.txt
@@ -1,3 +1,4 @@
+```
Filename: 111-local-traffic-priority.txt
Title: Prioritizing local traffic over relayed traffic
Author: Roger Dingledine
@@ -149,3 +150,4 @@ Prognosis:
We could probably remove the third case and it would still work,
but hey.
+```
diff --git a/proposals/112-bring-back-pathlencoinweight.txt b/proposals/112-bring-back-pathlencoinweight.txt
index 3f6c337..5109328 100644
--- a/proposals/112-bring-back-pathlencoinweight.txt
+++ b/proposals/112-bring-back-pathlencoinweight.txt
@@ -1,3 +1,4 @@
+```
Filename: 112-bring-back-pathlencoinweight.txt
Title: Bring Back Pathlen Coin Weight
Author: Mike Perry
@@ -161,3 +162,4 @@ Migration:
[1] http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf
+```
diff --git a/proposals/113-fast-authority-interface.txt b/proposals/113-fast-authority-interface.txt
index 8912b53..55e925f 100644
--- a/proposals/113-fast-authority-interface.txt
+++ b/proposals/113-fast-authority-interface.txt
@@ -1,3 +1,4 @@
+```
Filename: 113-fast-authority-interface.txt
Title: Simplifying directory authority administration
Author: Nick Mathewson
@@ -83,3 +84,4 @@ Resolution:
automatically create bindings", and that approach is implemented.
There are remaining issues in the problem statement above that need
their own solutions.
+```
diff --git a/proposals/114-distributed-storage.txt b/proposals/114-distributed-storage.txt
index 91a787d..1c0f40f 100644
--- a/proposals/114-distributed-storage.txt
+++ b/proposals/114-distributed-storage.txt
@@ -1,3 +1,4 @@
+```
Filename: 114-distributed-storage.txt
Title: Distributed Storage for Tor Hidden Service Descriptors
Author: Karsten Loesing
@@ -437,3 +438,4 @@ Compatibility:
After the second transition phase, the authoritative directories should stop
serving hidden service descriptors.
+```
diff --git a/proposals/115-two-hop-paths.txt b/proposals/115-two-hop-paths.txt
index 9854c9a..7ef07b4 100644
--- a/proposals/115-two-hop-paths.txt
+++ b/proposals/115-two-hop-paths.txt
@@ -1,3 +1,4 @@
+```
Filename: 115-two-hop-paths.txt
Title: Two Hop Paths
Author: Mike Perry
@@ -383,3 +384,4 @@ Migration:
[1] http://p2pnet.net/story/11279
[2] http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf
[3] Proof available upon request ;)
+```
diff --git a/proposals/116-two-hop-paths-from-guard.txt b/proposals/116-two-hop-paths-from-guard.txt
index f456253..8228c7a 100644
--- a/proposals/116-two-hop-paths-from-guard.txt
+++ b/proposals/116-two-hop-paths-from-guard.txt
@@ -1,3 +1,4 @@
+```
Filename: 116-two-hop-paths-from-guard.txt
Title: Two hop paths from entry guards
Author: Michael Lieberman
@@ -116,3 +117,4 @@ MIT
mentioned above.
2) It would give governments an incentive to confiscate exit nodes to see if
they are pulling this trick.
+```
diff --git a/proposals/117-ipv6-exits.txt b/proposals/117-ipv6-exits.txt
index f343ff7..e5231db 100644
--- a/proposals/117-ipv6-exits.txt
+++ b/proposals/117-ipv6-exits.txt
@@ -1,3 +1,4 @@
+```
Filename: 117-ipv6-exits.txt
Title: IPv6 exits
Author: coderman
@@ -409,3 +410,4 @@ Contents
'Network Address Translation - Protocol Translation (NAT-PT)'
http://www.ietf.org/rfc/rfc2766.txt
+```
diff --git a/proposals/118-multiple-orports.txt b/proposals/118-multiple-orports.txt
index 69ab382..0378589 100644
--- a/proposals/118-multiple-orports.txt
+++ b/proposals/118-multiple-orports.txt
@@ -1,3 +1,4 @@
+```
Filename: 118-multiple-orports.txt
Title: Advertising multiple ORPorts at once
Author: Nick Mathewson
@@ -85,3 +86,4 @@ Notes 3 July:
- Write up the simple version of this. No ranges needed yet. No
networkstatus chagnes yet.
+```
diff --git a/proposals/119-controlport-auth.txt b/proposals/119-controlport-auth.txt
index 9ed1cc1..32c70b6 100644
--- a/proposals/119-controlport-auth.txt
+++ b/proposals/119-controlport-auth.txt
@@ -1,3 +1,4 @@
+```
Filename: 119-controlport-auth.txt
Title: New PROTOCOLINFO command for controllers
Author: Roger Dingledine
@@ -138,3 +139,4 @@ Unsolved problems:
to think about how to demand password-based authentication without
bothering the user about it.
+```
diff --git a/proposals/120-shutdown-descriptors.txt b/proposals/120-shutdown-descriptors.txt
index 5cfe2b5..465ef86 100644
--- a/proposals/120-shutdown-descriptors.txt
+++ b/proposals/120-shutdown-descriptors.txt
@@ -1,3 +1,4 @@
+```
Filename: 120-shutdown-descriptors.txt
Title: Shutdown descriptors when Tor servers stop
Author: Roger Dingledine
@@ -81,3 +82,4 @@ Comments:
2) Maybe add a rule "Don't do this for hibernation if we expect to wake
up before the next consensus is published"?
- NM 9 Oct 2007
+```
diff --git a/proposals/121-hidden-service-authentication.txt b/proposals/121-hidden-service-authentication.txt
index 404ca57..678d4d4 100644
--- a/proposals/121-hidden-service-authentication.txt
+++ b/proposals/121-hidden-service-authentication.txt
@@ -1,3 +1,4 @@
+```
Filename: 121-hidden-service-authentication.txt
Title: Hidden Service Authentication
Author: Tobias Kamm, Thomas Lauterbach, Karsten Loesing, Ferdinand Rieger,
@@ -774,3 +775,4 @@ Implementation:
checking access counters.
- Log access for accountability.
+```
diff --git a/proposals/122-unnamed-flag.txt b/proposals/122-unnamed-flag.txt
index 2ce7bb2..d73f2e4 100644
--- a/proposals/122-unnamed-flag.txt
+++ b/proposals/122-unnamed-flag.txt
@@ -1,3 +1,4 @@
+```
Filename: 122-unnamed-flag.txt
Title: Network status entries need a new Unnamed flag
Author: Roger Dingledine
@@ -134,3 +135,4 @@ Implemented-In: 0.2.0.x
blacklisted from the network, the really bad part is that this logic
is really unintuitive to prospective new server operators.
+```
diff --git a/proposals/123-autonaming.txt b/proposals/123-autonaming.txt
index 74c4869..bc9cdfa 100644
--- a/proposals/123-autonaming.txt
+++ b/proposals/123-autonaming.txt
@@ -1,3 +1,4 @@
+```
Filename: 123-autonaming.txt
Title: Naming authorities automatically create bindings
Author: Peter Palfrader
@@ -52,3 +53,4 @@ Proposal:
This automaton does not necessarily need to live in the Tor code, it
can do its job just as well when it's an external tool.
+```
diff --git a/proposals/124-tls-certificates.txt b/proposals/124-tls-certificates.txt
index 9472d14..0149da7 100644
--- a/proposals/124-tls-certificates.txt
+++ b/proposals/124-tls-certificates.txt
@@ -1,3 +1,4 @@
+```
Filename: 124-tls-certificates.txt
Title: Blocking resistant TLS certificate usage
Author: Steven J. Murdoch
@@ -311,3 +312,4 @@ References:
[5] Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
% <!-- Local IspellDict: american -->
+```
diff --git a/proposals/125-bridges.txt b/proposals/125-bridges.txt
index 9d95729..2b4d0e6 100644
--- a/proposals/125-bridges.txt
+++ b/proposals/125-bridges.txt
@@ -1,3 +1,4 @@
+```
Filename: 125-bridges.txt
Title: Behavior for bridge users, bridge relays, and bridge authorities
Author: Roger Dingledine
@@ -289,3 +290,4 @@ Implemented-In: 0.2.0.x
We should figure this out in the 0.2.1.x timeframe.
+```
diff --git a/proposals/126-geoip-reporting.txt b/proposals/126-geoip-reporting.txt
index 9f3b21c..131b25f 100644
--- a/proposals/126-geoip-reporting.txt
+++ b/proposals/126-geoip-reporting.txt
@@ -1,3 +1,4 @@
+```
Filename: 126-geoip-reporting.txt
Title: Getting GeoIP data and publishing usage summaries
Author: Roger Dingledine
@@ -408,3 +409,4 @@ Implemented-In: 0.2.0.x
Other ideas?
+```
diff --git a/proposals/127-dirport-mirrors-downloads.txt b/proposals/127-dirport-mirrors-downloads.txt
index 377492c..fcdec60 100644
--- a/proposals/127-dirport-mirrors-downloads.txt
+++ b/proposals/127-dirport-mirrors-downloads.txt
@@ -1,3 +1,4 @@
+```
Filename: 127-dirport-mirrors-downloads.txt
Title: Relaying dirport requests to Tor download site / website
Author: Roger Dingledine
@@ -153,3 +154,4 @@ Status: Obsolete
you about a gmail autoresponder address just as easily, and then you'd
get better authentication of the Tor program to boot.
+```
diff --git a/proposals/128-bridge-families.txt b/proposals/128-bridge-families.txt
index e5bdcf9..67f208e 100644
--- a/proposals/128-bridge-families.txt
+++ b/proposals/128-bridge-families.txt
@@ -1,3 +1,4 @@
+```
Filename: 128-bridge-families.txt
Title: Families of private bridges
Author: Roger Dingledine
@@ -62,3 +63,4 @@ Status: Dead
ideas/ directory. Somebody should pick it up sometime and finish the
design and implementation.
+```
diff --git a/proposals/129-reject-plaintext-ports.txt b/proposals/129-reject-plaintext-ports.txt
index 8080ff5..91b9bd4 100644
--- a/proposals/129-reject-plaintext-ports.txt
+++ b/proposals/129-reject-plaintext-ports.txt
@@ -1,3 +1,4 @@
+```
Filename: 129-reject-plaintext-ports.txt
Title: Block Insecure Protocols by Default
Author: Kevin Bauer & Damon McCoy
@@ -112,3 +113,4 @@ Next steps:
b) We should decide which ports to reject by default. The current
consensus is 23,109,110,143 -- the same set that we warn for now.
+```
diff --git a/proposals/130-v2-conn-protocol.txt b/proposals/130-v2-conn-protocol.txt
index f5c31cc..fddbb75 100644
--- a/proposals/130-v2-conn-protocol.txt
+++ b/proposals/130-v2-conn-protocol.txt
@@ -1,3 +1,4 @@
+```
Filename: 130-v2-conn-protocol.txt
Title: Version 2 Tor connection protocol
Author: Nick Mathewson
@@ -182,3 +183,4 @@ Proposal:
Until NETINFO cells have been exchanged, the connection is not open.
+```
diff --git a/proposals/131-verify-tor-usage.txt b/proposals/131-verify-tor-usage.txt
index 8af1151..19a5737 100644
--- a/proposals/131-verify-tor-usage.txt
+++ b/proposals/131-verify-tor-usage.txt
@@ -1,3 +1,4 @@
+```
Filename: 131-verify-tor-usage.txt
Title: Help users to verify they are using Tor
Author: Steven J. Murdoch
@@ -146,3 +147,4 @@ Related work:
Tor should be able to respond with a webpage to notify the user of how
to fix the problem. This also implies that Tor must be told of the
special IP address, and so must be effectively permanent.
+```
diff --git a/proposals/132-browser-check-tor-service.txt b/proposals/132-browser-check-tor-service.txt
index 7aecaaf..d652d6f 100644
--- a/proposals/132-browser-check-tor-service.txt
+++ b/proposals/132-browser-check-tor-service.txt
@@ -1,3 +1,4 @@
+```
Filename: 132-browser-check-tor-service.txt
Title: A Tor Web Service For Verifying Correct Browser Configuration
Author: Robert Hogan
@@ -143,3 +144,4 @@ Open Issues:
future. Or maybe it's not such a bad thing, Tor is merely attempting to make
normally invalid resource requests valid for a given purpose.
+```
diff --git a/proposals/133-unreachable-ors.txt b/proposals/133-unreachable-ors.txt
index 5e2916b..ed80d7a 100644
--- a/proposals/133-unreachable-ors.txt
+++ b/proposals/133-unreachable-ors.txt
@@ -1,3 +1,4 @@
+```
Filename: 133-unreachable-ors.txt
Title: Incorporate Unreachable ORs into the Tor Network
Author: Robert Hogan
@@ -126,3 +127,4 @@ Implementation Issues:
published OR should be willing to accept is an open question. Is one
hundred, mostly idle, such orconns too onerous?
+```
diff --git a/proposals/134-robust-voting.txt b/proposals/134-robust-voting.txt
index c5dfb3b..66dfef5 100644
--- a/proposals/134-robust-voting.txt
+++ b/proposals/134-robust-voting.txt
@@ -1,3 +1,4 @@
+```
Filename: 134-robust-voting.txt
Title: More robust consensus voting with diverse authority sets
Author: Peter Palfrader
@@ -121,3 +122,4 @@ requirement that an adversary must compromise a majority of authorities
in order to control the consensus.
-- Nick
+```
diff --git a/proposals/135-private-tor-networks.txt b/proposals/135-private-tor-networks.txt
index 19ef68b..7ce0d4c 100644
--- a/proposals/135-private-tor-networks.txt
+++ b/proposals/135-private-tor-networks.txt
@@ -1,3 +1,4 @@
+```
Filename: 135-private-tor-networks.txt
Title: Simplify Configuration of Private Tor Networks
Author: Karsten Loesing
@@ -279,3 +280,4 @@ Test:
[warn] Failed to parse/validate config: TestingTorNetwork may only be
configured in combination with a non-default set of DirServers.
+```
diff --git a/proposals/136-legacy-keys.txt b/proposals/136-legacy-keys.txt
index f2b1b5c..ab8c9de 100644
--- a/proposals/136-legacy-keys.txt
+++ b/proposals/136-legacy-keys.txt
@@ -1,3 +1,4 @@
+```
Filename: 136-legacy-keys.txt
Title: Mass authority migration with legacy keys
Author: Nick Mathewson
@@ -98,3 +99,4 @@ Notes:
I don't think this achieves us anything either, though.
+```
diff --git a/proposals/137-bootstrap-phases.txt b/proposals/137-bootstrap-phases.txt
index ebe044c..fbb5081 100644
--- a/proposals/137-bootstrap-phases.txt
+++ b/proposals/137-bootstrap-phases.txt
@@ -1,3 +1,4 @@
+```
Filename: 137-bootstrap-phases.txt
Title: Keep controllers informed as Tor bootstraps
Author: Roger Dingledine
@@ -233,3 +234,4 @@ Implemented-In: 0.2.1.x
Controllers should use this getinfo when they connect or attach to
Tor to learn its current state.
+```
diff --git a/proposals/138-remove-down-routers-from-consensus.txt b/proposals/138-remove-down-routers-from-consensus.txt
index 776911b..037edbb 100644
--- a/proposals/138-remove-down-routers-from-consensus.txt
+++ b/proposals/138-remove-down-routers-from-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 138-remove-down-routers-from-consensus.txt
Title: Remove routers that are not Running from consensus documents
Author: Peter Palfrader
@@ -47,3 +48,4 @@ Implemented-In: 0.2.1.2-alpha
consensus document is formed like before but a new last step removes
all routers from the listing that are not marked as Running.
+```
diff --git a/proposals/139-conditional-consensus-download.txt b/proposals/139-conditional-consensus-download.txt
index 941f5ad..ea00acc 100644
--- a/proposals/139-conditional-consensus-download.txt
+++ b/proposals/139-conditional-consensus-download.txt
@@ -1,3 +1,4 @@
+```
Filename: 139-conditional-consensus-download.txt
Title: Download consensus documents only when it will be trusted
Author: Peter Palfrader
@@ -92,3 +93,4 @@ Footnotes:
1. For the purpose of this proposal a client can be any Tor instance
that downloads a consensus document. This includes relays,
directory caches as well as end users.
+```
diff --git a/proposals/140-consensus-diffs.txt b/proposals/140-consensus-diffs.txt
index c50aba0..d1a5a1d 100644
--- a/proposals/140-consensus-diffs.txt
+++ b/proposals/140-consensus-diffs.txt
@@ -1,3 +1,4 @@
+```
Filename: 140-consensus-diffs.txt
Title: Provide diffs between consensuses
Author: Peter Palfrader
@@ -231,3 +232,4 @@ Ticket: https://bugs.torproject.org/13339
This parameter determines how old a consensus can be (in hours)
before a client should no longer try to find a diff for it.
+```
diff --git a/proposals/141-jit-sd-downloads.txt b/proposals/141-jit-sd-downloads.txt
index bba6493..1216ded 100644
--- a/proposals/141-jit-sd-downloads.txt
+++ b/proposals/141-jit-sd-downloads.txt
@@ -1,3 +1,4 @@
+```
Filename: 141-jit-sd-downloads.txt
Title: Download server descriptors on demand
Author: Peter Palfrader
@@ -321,3 +322,4 @@ Status: Obsolete
B needs to contact C so it can ask about the descriptor before passing it
back to the client.
+```
diff --git a/proposals/142-combine-intro-and-rend-points.txt b/proposals/142-combine-intro-and-rend-points.txt
index 3abd5c8..6ad34eb 100644
--- a/proposals/142-combine-intro-and-rend-points.txt
+++ b/proposals/142-combine-intro-and-rend-points.txt
@@ -1,3 +1,4 @@
+```
Filename: 142-combine-intro-and-rend-points.txt
Title: Combine Introduction and Rendezvous Points
Author: Karsten Loesing, Christian Wilms
@@ -275,3 +276,4 @@ References:
[5] Lasse Øverlier and Paul Syverson, Locating Hidden Servers. In the
Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
+```
diff --git a/proposals/143-distributed-storage-improvements.txt b/proposals/143-distributed-storage-improvements.txt
index ce3f781..c89c309 100644
--- a/proposals/143-distributed-storage-improvements.txt
+++ b/proposals/143-distributed-storage-improvements.txt
@@ -1,3 +1,4 @@
+```
Filename: 143-distributed-storage-improvements.txt
Title: Improvements of Distributed Storage for Tor Hidden Service Descriptors
Author: Karsten Loesing
@@ -191,3 +192,4 @@ Compatibility:
All proposed improvements are compatible to the currently implemented
design as described in proposal 114.
+```
diff --git a/proposals/144-enforce-distinct-providers.txt b/proposals/144-enforce-distinct-providers.txt
index 1a682f3..da3845e 100644
--- a/proposals/144-enforce-distinct-providers.txt
+++ b/proposals/144-enforce-distinct-providers.txt
@@ -1,3 +1,4 @@
+```
Filename: 144-enforce-distinct-providers.txt
Title: Increase the diversity of circuits by detecting nodes belonging the
same provider
@@ -163,3 +164,4 @@ In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies
(PET 2007), Ottawa, Canada, June 2007.
http://freehaven.net/anonbib/#murdoch-pet2007
[5] http://bugs.noreply.org/flyspray/index.php?do=details&id=690
+```
diff --git a/proposals/145-newguard-flag.txt b/proposals/145-newguard-flag.txt
index 98c6508..7646727 100644
--- a/proposals/145-newguard-flag.txt
+++ b/proposals/145-newguard-flag.txt
@@ -1,3 +1,4 @@
+```
Filename: 145-newguard-flag.txt
Title: Separate "suitable as a guard" from "suitable as a new guard"
Author: Nick Mathewson
@@ -38,3 +39,4 @@ Alternatives
We might instead have authorities list weights with which nodes
should be picked as guards.
+```
diff --git a/proposals/146-long-term-stability.txt b/proposals/146-long-term-stability.txt
index 650be33..110231f 100644
--- a/proposals/146-long-term-stability.txt
+++ b/proposals/146-long-term-stability.txt
@@ -1,3 +1,4 @@
+```
Filename: 146-long-term-stability.txt
Title: Add new flag to reflect long-term stability
Author: Nick Mathewson
@@ -91,3 +92,4 @@ Issues and future possibilities:
Longterm is a really awkward name.
+```
diff --git a/proposals/147-prevoting-opinions.txt b/proposals/147-prevoting-opinions.txt
index 22f5c0f..42787a5 100644
--- a/proposals/147-prevoting-opinions.txt
+++ b/proposals/147-prevoting-opinions.txt
@@ -1,3 +1,4 @@
+```
Filename: 147-prevoting-opinions.txt
Title: Eliminate the need for v2 directories in generating v3 directories
Author: Nick Mathewson
@@ -118,3 +119,4 @@ Reasons for rejection:
-c | sort | grep " [1-4] " | wc -l`, result is 63, divide by 7*24
published consensuses, obtain 0.375 as end result.)
+```
diff --git a/proposals/148-uniform-client-end-reason.txt b/proposals/148-uniform-client-end-reason.txt
index 1db3b3e..0ee8145 100644
--- a/proposals/148-uniform-client-end-reason.txt
+++ b/proposals/148-uniform-client-end-reason.txt
@@ -1,3 +1,4 @@
+```
Filename: 148-uniform-client-end-reason.txt
Title: Stream end reasons from the client side should be uniform
Author: Roger Dingledine
@@ -55,3 +56,4 @@ Design:
like most of the Windows clients currently do and like the non-Windows
clients already do sometimes.
+```
diff --git a/proposals/149-using-netinfo-data.txt b/proposals/149-using-netinfo-data.txt
index 0ad663c..d8d052c 100644
--- a/proposals/149-using-netinfo-data.txt
+++ b/proposals/149-using-netinfo-data.txt
@@ -1,3 +1,4 @@
+```
Filename: 149-using-netinfo-data.txt
Title: Using data from NETINFO cells
Author: Nick Mathewson
@@ -43,3 +44,4 @@ Avoiding MITM attacks
connections without first trying to build a canonical one.
+```
diff --git a/proposals/150-exclude-exit-nodes.txt b/proposals/150-exclude-exit-nodes.txt
index b497ae6..460058c 100644
--- a/proposals/150-exclude-exit-nodes.txt
+++ b/proposals/150-exclude-exit-nodes.txt
@@ -1,3 +1,4 @@
+```
Filename: 150-exclude-exit-nodes.txt
Title: Exclude Exit Nodes from a circuit
Author: Mfr
@@ -45,3 +46,4 @@ Risks:
about broken exits because of this option. This issue can probably
be addressed sufficiently with documentation.
+```
diff --git a/proposals/151-path-selection-improvements.txt b/proposals/151-path-selection-improvements.txt
index e92b574..5eacfa7 100644
--- a/proposals/151-path-selection-improvements.txt
+++ b/proposals/151-path-selection-improvements.txt
@@ -1,3 +1,4 @@
+```
Filename: 151-path-selection-improvements.txt
Title: Improving Tor Path Selection
Author: Fallon Chen, Mike Perry
@@ -147,3 +148,4 @@ Issues
timeout can be achieved without cutting off a great number of the
total paths. This will eliminate a great deal of the performance
variation of Tor usage.
+```
diff --git a/proposals/152-single-hop-circuits.txt b/proposals/152-single-hop-circuits.txt
index d0b28b1..1e271af 100644
--- a/proposals/152-single-hop-circuits.txt
+++ b/proposals/152-single-hop-circuits.txt
@@ -1,3 +1,4 @@
+```
Filename: 152-single-hop-circuits.txt
Title: Optionally allow exit from single-hop circuits
Author: Geoff Goodell
@@ -60,3 +61,4 @@ Security Considerations
exit-from-single-hop-circuits" when choosing random paths through
the Tor network.
+```
diff --git a/proposals/153-automatic-software-update-protocol.txt b/proposals/153-automatic-software-update-protocol.txt
index c2979bb..7cf0c0a 100644
--- a/proposals/153-automatic-software-update-protocol.txt
+++ b/proposals/153-automatic-software-update-protocol.txt
@@ -1,3 +1,4 @@
+```
Filename: 153-automatic-software-update-protocol.txt
Title: Automatic software update protocol
Author: Jacob Appelbaum
@@ -173,3 +174,4 @@ question.
x.x Other Things
Other things should be added to this proposal. What are they?
+```
diff --git a/proposals/154-automatic-updates.txt b/proposals/154-automatic-updates.txt
index 4c2c6d3..e893344 100644
--- a/proposals/154-automatic-updates.txt
+++ b/proposals/154-automatic-updates.txt
@@ -1,3 +1,4 @@
+```
Filename: 154-automatic-updates.txt
Title: Automatic Software Update Protocol
Author: Matt Edman
@@ -375,3 +376,4 @@ References
[3] Tor version specification,
https://tor-svn.freehaven.net/svn/tor/trunk/doc/spec/version-spec.txt
+```
diff --git a/proposals/155-four-hidden-service-improvements.txt b/proposals/155-four-hidden-service-improvements.txt
index 423c9e8..3406481 100644
--- a/proposals/155-four-hidden-service-improvements.txt
+++ b/proposals/155-four-hidden-service-improvements.txt
@@ -1,3 +1,4 @@
+```
Filename: 155-four-hidden-service-improvements.txt
Title: Four Improvements of Hidden Service Performance
Author: Karsten Loesing, Christian Wilms
@@ -118,3 +119,4 @@ References:
[3] http://freehaven.net/~karsten/hidserv/design-2008-08-15.pdf
+```
diff --git a/proposals/156-tracking-blocked-ports.txt b/proposals/156-tracking-blocked-ports.txt
index acc0625..578621f 100644
--- a/proposals/156-tracking-blocked-ports.txt
+++ b/proposals/156-tracking-blocked-ports.txt
@@ -1,3 +1,4 @@
+```
Filename: 156-tracking-blocked-ports.txt
Title: Tracking blocked ports on the client side
Author: Robert Hogan
@@ -527,3 +528,4 @@ Index: src/or/circuitbuild.c
/** If <b>question</b> is the string "entry-guards", then dump
+```
diff --git a/proposals/157-specific-cert-download.txt b/proposals/157-specific-cert-download.txt
index e0ef0e8..8a69611 100644
--- a/proposals/157-specific-cert-download.txt
+++ b/proposals/157-specific-cert-download.txt
@@ -1,3 +1,4 @@
+```
Filename: 157-specific-cert-download.txt
Title: Make certificate downloads specific
Author: Nick Mathewson
@@ -100,3 +101,4 @@ Why cross-certify too?
References:
This is related to part 2 of bug 854.
+```
diff --git a/proposals/158-microdescriptors.txt b/proposals/158-microdescriptors.txt
index 442d705..d267c0b 100644
--- a/proposals/158-microdescriptors.txt
+++ b/proposals/158-microdescriptors.txt
@@ -1,3 +1,4 @@
+```
Filename: 158-microdescriptors.txt
Title: Clients download consensus + microdescriptors
Author: Roger Dingledine
@@ -197,3 +198,4 @@ Implemented-In: 0.2.3.1-alpha
Phase three, clients should start fetching and caching them instead
of normal descriptors.
+```
diff --git a/proposals/159-exit-scanning.txt b/proposals/159-exit-scanning.txt
index d2a7f3b..0f4d329 100644
--- a/proposals/159-exit-scanning.txt
+++ b/proposals/159-exit-scanning.txt
@@ -1,3 +1,4 @@
+```
Filename: 159-exit-scanning.txt
Title: Exit Scanning
Author: Mike Perry
@@ -140,3 +141,4 @@ Having a separate file that is under the exclusive control of the
scanner allows us to heavily isolate the scanner from the Tor
authority, potentially even running them on separate machines.
+```
diff --git a/proposals/160-bandwidth-offset.txt b/proposals/160-bandwidth-offset.txt
index 8ad4d18..33abd45 100644
--- a/proposals/160-bandwidth-offset.txt
+++ b/proposals/160-bandwidth-offset.txt
@@ -1,3 +1,4 @@
+```
Filename: 160-bandwidth-offset.txt
Title: Authorities vote for bandwidth offsets in consensus
Author: Roger Dingledine
@@ -103,3 +104,4 @@ Target: 0.2.1.x
+```
diff --git a/proposals/161-computing-bandwidth-adjustments.txt b/proposals/161-computing-bandwidth-adjustments.txt
index 6968724..38a1f9e 100644
--- a/proposals/161-computing-bandwidth-adjustments.txt
+++ b/proposals/161-computing-bandwidth-adjustments.txt
@@ -1,3 +1,4 @@
+```
Title: Computing Bandwidth Adjustments
Filename: 161-computing-bandwidth-adjustments.txt
Author: Mike Perry
@@ -172,3 +173,4 @@ Status: Closed
This file can be either copied or rsynced into a directory readable
by the directory authority.
+```
diff --git a/proposals/162-consensus-flavors.txt b/proposals/162-consensus-flavors.txt
index 2a227a0..85e6421 100644
--- a/proposals/162-consensus-flavors.txt
+++ b/proposals/162-consensus-flavors.txt
@@ -1,3 +1,4 @@
+```
Filename: 162-consensus-flavors.txt
Title: Publish the consensus in multiple flavors
Author: Nick Mathewson
@@ -188,3 +189,4 @@ Acknowledgements:
Aspects of this design and its applications to hash migration were
heavily influenced by IRC conversations with Marian.
+```
diff --git a/proposals/163-detecting-clients.txt b/proposals/163-detecting-clients.txt
index f2a17a5..5f77703 100644
--- a/proposals/163-detecting-clients.txt
+++ b/proposals/163-detecting-clients.txt
@@ -1,3 +1,4 @@
+```
Filename: 163-detecting-clients.txt
Title: Detecting whether a connection comes from a client
Author: Nick Mathewson
@@ -116,3 +117,4 @@ Open questions:
[Suggested answer: for now, just try making circuits through
the node. Extend this to extending circuits as needed.]
+```
diff --git a/proposals/164-reporting-server-status.txt b/proposals/164-reporting-server-status.txt
index 24fcc8f..418b3f8 100644
--- a/proposals/164-reporting-server-status.txt
+++ b/proposals/164-reporting-server-status.txt
@@ -1,3 +1,4 @@
+```
Filename: 164-reporting-server-status.txt
Title: Reporting the status of server votes
Author: Nick Mathewson
@@ -90,3 +91,4 @@ Risks:
+```
diff --git a/proposals/165-simple-robust-voting.txt b/proposals/165-simple-robust-voting.txt
index 28ea6d9..c759ee8 100644
--- a/proposals/165-simple-robust-voting.txt
+++ b/proposals/165-simple-robust-voting.txt
@@ -1,3 +1,4 @@
+```
Filename: 165-simple-robust-voting.txt
Title: Easy migration for voting authority sets
Author: Nick Mathewson
@@ -134,3 +135,4 @@ Acknowledgments:
The design came out of an IRC conversation with Peter Palfrader. He
had the basic idea first.
+```
diff --git a/proposals/166-statistics-extra-info-docs.txt b/proposals/166-statistics-extra-info-docs.txt
index 8b0c6a1..0075ade 100644
--- a/proposals/166-statistics-extra-info-docs.txt
+++ b/proposals/166-statistics-extra-info-docs.txt
@@ -1,3 +1,4 @@
+```
Filename: 166-statistics-extra-info-docs.txt
Title: Including Network Statistics in Extra-Info Documents
Author: Karsten Loesing
@@ -389,3 +390,4 @@ Implementation notes:
gathering statistics. However, in the near future, statistics shall
be enabled gathered by all relays by default, where requiring a
./configure option would be a barrier for many relay operators.
+```
diff --git a/proposals/167-params-in-consensus.txt b/proposals/167-params-in-consensus.txt
index d23bc9c..f616c35 100644
--- a/proposals/167-params-in-consensus.txt
+++ b/proposals/167-params-in-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 167-params-in-consensus.txt
Title: Vote on network parameters in consensus
Author: Roger Dingledine
@@ -45,3 +46,4 @@ Implemented-In: 0.2.2
I don't have any non-integer values in mind yet. So I say we cross
that bridge when we get to it.
+```
diff --git a/proposals/168-reduce-circwindow.txt b/proposals/168-reduce-circwindow.txt
index 9932ff6..48fc146 100644
--- a/proposals/168-reduce-circwindow.txt
+++ b/proposals/168-reduce-circwindow.txt
@@ -1,3 +1,4 @@
+```
Filename: 168-reduce-circwindow.txt
Title: Reduce default circuit window
Author: Roger Dingledine
@@ -132,3 +133,4 @@ Status: Rejected
isn't very complex. Let's shoot for that, and fall back to (b) if the
patch turns out to be so big that we reconsider.
+```
diff --git a/proposals/169-eliminating-renegotiation.txt b/proposals/169-eliminating-renegotiation.txt
index fe4cd58..36f8acd 100644
--- a/proposals/169-eliminating-renegotiation.txt
+++ b/proposals/169-eliminating-renegotiation.txt
@@ -1,3 +1,4 @@
+```
Filename: 169-eliminating-renegotiation.txt
Title: Eliminate TLS renegotiation for the Tor connection handshake
Author: Nick Mathewson
@@ -404,3 +405,4 @@ Superseded-By: 176
now, I think they should just get it. Eventually we can
deprecate the V2 handshake as we did with the V1 handshake.
+```
diff --git a/proposals/170-user-path-config.txt b/proposals/170-user-path-config.txt
index 42163f1..da85700 100644
--- a/proposals/170-user-path-config.txt
+++ b/proposals/170-user-path-config.txt
@@ -1,3 +1,4 @@
+```
Title: Configuration options regarding circuit building
Filename: 170-user-path-config.txt
Author: Sebastian Hahn
@@ -93,3 +94,4 @@ Compatibility:
The old Strict*Nodes options are deprecated, and the StrictNodes
option is new. Tor users may need to update their configuration file.
+```
diff --git a/proposals/171-separate-streams.txt b/proposals/171-separate-streams.txt
index 01668a4..f482b09 100644
--- a/proposals/171-separate-streams.txt
+++ b/proposals/171-separate-streams.txt
@@ -1,3 +1,4 @@
+```
Filename: 171-separate-streams.txt
Title: Separate streams across circuits by connection metadata
Author: Robert Hogan, Jacob Appelbaum, Damon McCoy, Nick Mathewson
@@ -356,3 +357,4 @@ Lingering questions:
I suspect there are issues remaining with DNS and TransPort users, and
that my "just use AutomapHostsOnResolve" suggestion may be
insufficient.
+```
diff --git a/proposals/172-circ-getinfo-option.txt b/proposals/172-circ-getinfo-option.txt
index 38b0da7..9c9cea7 100644
--- a/proposals/172-circ-getinfo-option.txt
+++ b/proposals/172-circ-getinfo-option.txt
@@ -1,3 +1,4 @@
+```
Filename: 172-circ-getinfo-option.txt
Title: GETINFO controller option for circuit information
Author: Damian Johnson
@@ -136,3 +137,4 @@ Specification:
provides the same fields that would be given by calling "GETINFO rcirc/id/"
with the CircID.
+```
diff --git a/proposals/173-getinfo-option-expansion.txt b/proposals/173-getinfo-option-expansion.txt
index 035471d..9c6cc12 100644
--- a/proposals/173-getinfo-option-expansion.txt
+++ b/proposals/173-getinfo-option-expansion.txt
@@ -1,3 +1,4 @@
+```
Filename: 173-getinfo-option-expansion.txt
Title: GETINFO Option Expansion
Author: Damian Johnson
@@ -103,3 +104,4 @@ Specification:
650-EXITS_SEEN TimeStarted="2008-12-25 23:50:43"
PortSummary=80=16,443=8
+```
diff --git a/proposals/174-optimistic-data-server.txt b/proposals/174-optimistic-data-server.txt
index 193565b..ef34526 100644
--- a/proposals/174-optimistic-data-server.txt
+++ b/proposals/174-optimistic-data-server.txt
@@ -1,3 +1,4 @@
+```
Filename: 174-optimistic-data-server.txt
Title: Optimistic Data for Tor: Server Side
Author: Ian Goldberg
@@ -241,3 +242,4 @@ Performance and scalability notes:
There may be more RAM used at Exit nodes, as mentioned above, but it is
transient.
+```
diff --git a/proposals/175-automatic-node-promotion.txt b/proposals/175-automatic-node-promotion.txt
index d6d86a6..2713a2a 100644
--- a/proposals/175-automatic-node-promotion.txt
+++ b/proposals/175-automatic-node-promotion.txt
@@ -1,3 +1,4 @@
+```
Filename: 175-automatic-node-promotion.txt
Title: Automatically promoting Tor clients to nodes
Author: Steven Murdoch
@@ -238,3 +239,4 @@ Status: Rejected
http://www.itl.nist.gov/div898/handbook/pmc/section3/pmc331.htm (e-Handbook of Statistical Methods)
% vim: spell ai et:
+```
diff --git a/proposals/176-revising-handshake.txt b/proposals/176-revising-handshake.txt
index 20a3ef2..f53190a 100644
--- a/proposals/176-revising-handshake.txt
+++ b/proposals/176-revising-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 176-revising-handshake.txt
Title: Proposed version-3 link handshake for Tor
Author: Nick Mathewson
@@ -622,3 +623,4 @@ Supersedes: 169
now, I think they should just stick with V1. Eventually we can
deprecate the V2 handshake as we did with the V1 handshake.
When that happens, servers can be V3-only.
+```
diff --git a/proposals/177-flag-abstention.txt b/proposals/177-flag-abstention.txt
index cbc0819..02a4657 100644
--- a/proposals/177-flag-abstention.txt
+++ b/proposals/177-flag-abstention.txt
@@ -1,3 +1,4 @@
+```
Filename: 177-flag-abstention.txt
Title: Abstaining from votes on individual flags
Author: Nick Mathewson
@@ -103,3 +104,4 @@ Examples:
it is not run by wombats. (As now, "no" votes win ties.)
+```
diff --git a/proposals/178-param-voting.txt b/proposals/178-param-voting.txt
index 58d2a62..fc7fe25 100644
--- a/proposals/178-param-voting.txt
+++ b/proposals/178-param-voting.txt
@@ -1,3 +1,4 @@
+```
Filename: 178-param-voting.txt
Title: Require majority of authorities to vote for consensus parameters
Author: Sebastian Hahn
@@ -99,3 +100,4 @@ Implementation:
An example implementation of this feature can be found in
https://gitweb.torproject.org/sebastian/tor.git, branch safer_params.
+```
diff --git a/proposals/179-TLS-cert-and-parameter-normalization.txt b/proposals/179-TLS-cert-and-parameter-normalization.txt
index 4272d4f..cf455a8 100644
--- a/proposals/179-TLS-cert-and-parameter-normalization.txt
+++ b/proposals/179-TLS-cert-and-parameter-normalization.txt
@@ -1,3 +1,4 @@
+```
Filename: 179-TLS-cert-and-parameter-normalization.txt
Title: TLS certificate and parameter normalization
Author: Jacob Appelbaum, Gladys Shufflebottom
@@ -384,3 +385,4 @@ present in the Tor TLS setup process?
[4] httpd-2.2.17/modules/ss/ssl_engine_dh.c
[5] http://tools.ietf.org/html/rfc4419
[6] http://archives.seul.org/or/dev/Jan-2011/msg00037.html
+```
diff --git a/proposals/180-pluggable-transport.txt b/proposals/180-pluggable-transport.txt
index c23e5fa..8626375 100644
--- a/proposals/180-pluggable-transport.txt
+++ b/proposals/180-pluggable-transport.txt
@@ -1,3 +1,4 @@
+```
Filename: 180-pluggable-transport.txt
Title: Pluggable transports for circumvention
Author: Jacob Appelbaum, Nick Mathewson
@@ -548,3 +549,4 @@ Appendix: recommendations for transports
protocols -- and in many cases, most possible variants of a given
protocol won't actually exist in the wild.
+```
diff --git a/proposals/181-optimistic-data-client.txt b/proposals/181-optimistic-data-client.txt
index 6d0a929..e1544df 100644
--- a/proposals/181-optimistic-data-client.txt
+++ b/proposals/181-optimistic-data-client.txt
@@ -1,3 +1,4 @@
+```
Filename: 181-optimistic-data-client.txt
Title: Optimistic Data for Tor: Client Side
Author: Ian Goldberg
@@ -126,3 +127,4 @@ Performance and scalability notes:
OPs may queue a little more data, if the SOCKS client pushes it faster
than the OP can write it out. But that's also true today after the
SOCKS CONNECT returns success, right?
+```
diff --git a/proposals/182-creditbucket.txt b/proposals/182-creditbucket.txt
index fc3cb17..b462a61 100644
--- a/proposals/182-creditbucket.txt
+++ b/proposals/182-creditbucket.txt
@@ -1,3 +1,4 @@
+```
Filename: 182-creditbucket.txt
Title: Credit Bucket
Author: Florian Tschorsch and Björn Scheuermann
@@ -181,3 +182,4 @@ References:
[1] Karsten Loesing. Analysis of Circuit Queues in Tor. August 25, 2009.
[2] https://trac.torproject.org/projects/tor/wiki/sponsors/SponsorD/June2011
+```
diff --git a/proposals/183-refillintervals.txt b/proposals/183-refillintervals.txt
index 81ff5b0..b2425fd 100644
--- a/proposals/183-refillintervals.txt
+++ b/proposals/183-refillintervals.txt
@@ -1,3 +1,4 @@
+```
Filename: 183-refillintervals.txt
Title: Refill Intervals
Author: Florian Tschorsch and Björn Scheuermann
@@ -88,3 +89,4 @@ References:
[1] Karsten Loesing. Analysis of Circuit Queues in Tor. August 25, 2009.
[2] https://trac.torproject.org/projects/tor/wiki/sponsors/SponsorD/June2011
+```
diff --git a/proposals/184-v3-link-protocol.txt b/proposals/184-v3-link-protocol.txt
index 820e779..5de9294 100644
--- a/proposals/184-v3-link-protocol.txt
+++ b/proposals/184-v3-link-protocol.txt
@@ -1,3 +1,4 @@
+```
Filename: 184-v3-link-protocol.txt
Title: Miscellaneous changes for a v3 Tor link protocol
Author: Nick Mathewson
@@ -96,3 +97,4 @@ Notes on future-proofing:
tweaking the link protocol to have a variable-length cell type
encoding.
+```
diff --git a/proposals/185-dir-without-dirport.txt b/proposals/185-dir-without-dirport.txt
index 65cfd43..21c5b8c 100644
--- a/proposals/185-dir-without-dirport.txt
+++ b/proposals/185-dir-without-dirport.txt
@@ -1,3 +1,4 @@
+```
Filename: 185-dir-without-dirport.txt
Title: Directory caches without DirPort
Author: Nick Mathewson
@@ -47,3 +48,4 @@ Consensus:
as a directory cache.
This does not require a new version of the consensus algorithm.
+```
diff --git a/proposals/186-multiple-orports.txt b/proposals/186-multiple-orports.txt
index f66ad83..f29d1c6 100644
--- a/proposals/186-multiple-orports.txt
+++ b/proposals/186-multiple-orports.txt
@@ -1,3 +1,4 @@
+```
Filename: 186-multiple-orports.txt
Title: Multiple addresses for one OR or bridge
Author: Nick Mathewson
@@ -283,3 +284,4 @@ TODO:
* Come up with a better alternative to running6 for the longterm?
+```
diff --git a/proposals/187-allow-client-auth.txt b/proposals/187-allow-client-auth.txt
index 67c878e..b461b92 100644
--- a/proposals/187-allow-client-auth.txt
+++ b/proposals/187-allow-client-auth.txt
@@ -1,3 +1,4 @@
+```
Filename: 187-allow-client-auth.txt
Title: Reserve a cell type to allow client authorization
Author: Nick Mathewson
@@ -129,3 +130,4 @@ Counterargument: it's too late!
break their connections only to a couple of alpha versions which
one hopes by then will be long-deprecated already.
+```
diff --git a/proposals/188-bridge-guards.txt b/proposals/188-bridge-guards.txt
index 2a74416..51f7139 100644
--- a/proposals/188-bridge-guards.txt
+++ b/proposals/188-bridge-guards.txt
@@ -1,3 +1,4 @@
+```
Filename: 188-bridge-guards.txt
Title: Bridge Guards and other anti-enumeration defenses
Author: Nick Mathewson, Isis Lovecruft
@@ -520,3 +521,4 @@ Status: Reserve
What fraction of our traffic is bridge traffic? Will this alter
our circuit selection weights?
+```
diff --git a/proposals/189-authorize-cell.txt b/proposals/189-authorize-cell.txt
index 4836c5f..14d9a77 100644
--- a/proposals/189-authorize-cell.txt
+++ b/proposals/189-authorize-cell.txt
@@ -1,3 +1,4 @@
+```
Filename: 189-authorize-cell.txt
Title: AUTHORIZE and AUTHORIZED cells
Author: George Kadianakis
@@ -138,3 +139,4 @@ Status: Obsolete
This proposal does not try to specify how a bridge can avoid
detection by an adversary.
+```
diff --git a/proposals/190-shared-secret-bridge-authorization.txt b/proposals/190-shared-secret-bridge-authorization.txt
index 31c692b..8c9d45b 100644
--- a/proposals/190-shared-secret-bridge-authorization.txt
+++ b/proposals/190-shared-secret-bridge-authorization.txt
@@ -1,3 +1,4 @@
+```
Filename: 190-shared-secret-bridge-authorization.txt
Title: Bridge Client Authorization Based on a Shared Secret
Author: George Kadianakis
@@ -101,3 +102,4 @@ Notes: This is obsoleted by pluggable transports.
Thanks to Nick Mathewson and Robert Ransom for the help and
suggestions while writing this proposal.
+```
diff --git a/proposals/191-mitm-bridge-detection-resistance.txt b/proposals/191-mitm-bridge-detection-resistance.txt
index a4689bb..4faf60d 100644
--- a/proposals/191-mitm-bridge-detection-resistance.txt
+++ b/proposals/191-mitm-bridge-detection-resistance.txt
@@ -1,3 +1,4 @@
+```
Filename: 191-mitm-bridge-detection-resistance.txt
Title: Bridge Detection Resistance against MITM-capable Adversaries
Author: George Kadianakis
@@ -161,3 +162,4 @@ Status: Obsolete
Thanks to Robert Ransom for his great help and suggestions on
devising this scheme and writing this proposal!
+```
diff --git a/proposals/192-store-bridge-information.txt b/proposals/192-store-bridge-information.txt
index fe7d016..4e2dee0 100644
--- a/proposals/192-store-bridge-information.txt
+++ b/proposals/192-store-bridge-information.txt
@@ -1,3 +1,4 @@
+```
Filename: 192-store-bridge-information.txt
Title: Automatically retrieve and store information about bridges
Author: Sebastian Hahn
@@ -135,3 +136,4 @@ the bridge authority side doesn't need any changes. The new
configuration options governing the behaviour of Tor would be
incompatible with previous versions, so the torrc needs to be adapted.
The state file changes should not affect older versions.
+```
diff --git a/proposals/193-safe-cookie-authentication.txt b/proposals/193-safe-cookie-authentication.txt
index a3717fe..c97fcbb 100644
--- a/proposals/193-safe-cookie-authentication.txt
+++ b/proposals/193-safe-cookie-authentication.txt
@@ -1,3 +1,4 @@
+```
Filename: 193-safe-cookie-authentication.txt
Title: Safe cookie authentication for Tor controllers
Author: Robert Ransom
@@ -142,3 +143,4 @@ Rationale:
to keep controllers from using the server as an oracle for its own
challenges (it could be replaced with a hash function).
+```
diff --git a/proposals/194-mnemonic-urls.txt b/proposals/194-mnemonic-urls.txt
index aeae092..0dfbfc0 100644
--- a/proposals/194-mnemonic-urls.txt
+++ b/proposals/194-mnemonic-urls.txt
@@ -1,3 +1,4 @@
+```
Filename: 194-mnemonic-urls.txt
Title: Mnemonic .onion URLs
Author: Sai, Alex Fink
@@ -198,3 +199,4 @@ https://github.com/hellais/Onion-url/blob/master/dev/mnemonic.py
[17] http://www.reddit.com/r/technology/comments/ecllk
[18] http://wordnet.princeton.edu/wordnet/man2.1/wnstats.7WN.html
+```
diff --git a/proposals/195-TLS-normalization-for-024.txt b/proposals/195-TLS-normalization-for-024.txt
index bfc8d9a..8b3d8a9 100644
--- a/proposals/195-TLS-normalization-for-024.txt
+++ b/proposals/195-TLS-normalization-for-024.txt
@@ -1,3 +1,4 @@
+```
Filename: 195-TLS-normalization-for-024.txt
Title: TLS certificate normalization for Tor 0.2.4.x
Author: Jacob Appelbaum, Gladys Shufflebottom, Nick Mathewson, Tim Wilde
@@ -168,3 +169,4 @@ Target: 0.2.4.x
plausible way would probably be an implementation bug in OpenSSL or
something.
+```
diff --git a/proposals/196-transport-control-ports.txt b/proposals/196-transport-control-ports.txt
index f4d8a0e..972ddb3 100644
--- a/proposals/196-transport-control-ports.txt
+++ b/proposals/196-transport-control-ports.txt
@@ -1,3 +1,4 @@
+```
Filename: 196-transport-control-ports.txt
Title: Extended ORPort and TransportControlPort
Author: George Kadianakis, Nick Mathewson
@@ -238,3 +239,4 @@ Implemented-In: 0.2.5.2-alpha
control information with the Tor client. The current proposal doesn't
yet support this, but we should not add functionality that will
prevent it from being possible.
+```
diff --git a/proposals/197-postmessage-ipc.txt b/proposals/197-postmessage-ipc.txt
index da246b3..e9ae6e6 100644
--- a/proposals/197-postmessage-ipc.txt
+++ b/proposals/197-postmessage-ipc.txt
@@ -1,3 +1,4 @@
+```
Filename: 197-postmessage-ipc.txt
Title: Message-based Inter-Controller IPC Channel
Author: Mike Perry
@@ -97,3 +98,4 @@ Implementation plan
needed. However, Torbutton does not have immediate need for this
protocol.
+```
diff --git a/proposals/198-restore-clienthello-semantics.txt b/proposals/198-restore-clienthello-semantics.txt
index 2a3a560..9ec5aa3 100644
--- a/proposals/198-restore-clienthello-semantics.txt
+++ b/proposals/198-restore-clienthello-semantics.txt
@@ -1,3 +1,4 @@
+```
Filename: 198-restore-clienthello-semantics.txt
Title: Restore semantics of TLS ClientHello
Author: Nick Mathewson
@@ -188,3 +189,4 @@ Open questions:
implications of leaking cell types and circuit IDs to a future
compromise.
+```
diff --git a/proposals/199-bridgefinder-integration.txt b/proposals/199-bridgefinder-integration.txt
index fbabf91..4c806e7 100644
--- a/proposals/199-bridgefinder-integration.txt
+++ b/proposals/199-bridgefinder-integration.txt
@@ -1,3 +1,4 @@
+```
Filename: 199-bridgefinder-integration.txt
Title: Integration of BridgeFinder and BridgeFinderHelper
Author: Mike Perry
@@ -412,3 +413,4 @@ Security Concerns: BridgeFinder and BridgeFinderHelper
encountered.
+```
diff --git a/proposals/200-new-create-and-extend-cells.txt b/proposals/200-new-create-and-extend-cells.txt
index 1a556dc..52934c9 100644
--- a/proposals/200-new-create-and-extend-cells.txt
+++ b/proposals/200-new-create-and-extend-cells.txt
@@ -1,3 +1,4 @@
+```
Filename: 200-new-create-and-extend-cells.txt
Title: Adding new, extensible CREATE, EXTEND, and related cells
Author: Robert Ransom
@@ -153,3 +154,4 @@ Bugs:
type that would require it.
+```
diff --git a/proposals/201-bridge-v3-reqs-stats.txt b/proposals/201-bridge-v3-reqs-stats.txt
index e267cba..81503d0 100644
--- a/proposals/201-bridge-v3-reqs-stats.txt
+++ b/proposals/201-bridge-v3-reqs-stats.txt
@@ -1,3 +1,4 @@
+```
Filename: 201-bridge-v3-reqs-stats.txt
Title: Make bridges report statistics on daily v3 network status requests
Author: Karsten Loesing
@@ -36,3 +37,4 @@ Specification:
[0] https://metrics.torproject.org/papers/countingusers-2010-11-30.pdf
+```
diff --git a/proposals/202-improved-relay-crypto.txt b/proposals/202-improved-relay-crypto.txt
index e9a1fd1..4913f98 100644
--- a/proposals/202-improved-relay-crypto.txt
+++ b/proposals/202-improved-relay-crypto.txt
@@ -1,3 +1,4 @@
+```
Filename: 202-improved-relay-crypto.txt
Title: Two improved relay encryption protocols for Tor cells
Author: Nick Mathewson
@@ -817,3 +818,4 @@ R. References
[23R] The 23 Raccoons, "Analysis of the Relative Severity of Tagging
Attacks" http://archives.seul.org/or/dev/Mar-2012/msg00019.html
(You'll want to read the rest of the thread too.)
+```
diff --git a/proposals/203-https-frontend.txt b/proposals/203-https-frontend.txt
index 4bbb271..e9e83c1 100644
--- a/proposals/203-https-frontend.txt
+++ b/proposals/203-https-frontend.txt
@@ -1,3 +1,4 @@
+```
Filename: 203-https-frontend.txt
Title: Avoiding censorship by impersonating an HTTPS server
Author: Nick Mathewson
@@ -275,3 +276,4 @@ Related work:
(high collateral damage).
1. https://trac.torproject.org/projects/tor/wiki/doc/meek
+```
diff --git a/proposals/204-hidserv-subdomains.txt b/proposals/204-hidserv-subdomains.txt
index 056fbad..aee5727 100644
--- a/proposals/204-hidserv-subdomains.txt
+++ b/proposals/204-hidserv-subdomains.txt
@@ -1,3 +1,4 @@
+```
Filename: 204-hidserv-subdomains.txt
Title: Subdomain support for Hidden Service addresses
Author: Alessandro Preite Martinez
@@ -27,3 +28,4 @@ Status: Closed
simply as "aaaaaaaaaaaaaaaa.onion".
+```
diff --git a/proposals/205-local-dnscache.txt b/proposals/205-local-dnscache.txt
index d0a0107..b7c8aa0 100644
--- a/proposals/205-local-dnscache.txt
+++ b/proposals/205-local-dnscache.txt
@@ -1,3 +1,4 @@
+```
Filename: 205-local-dnscache.txt
Title: Remove global client-side DNS caching
Author: Nick Mathewson
@@ -157,3 +158,4 @@ Status: Closed
without most of the security issues, if we restrict it to
DNSSec-signed answers.
+```
diff --git a/proposals/206-directory-sources.txt b/proposals/206-directory-sources.txt
index d81b2f6..bdb6481 100644
--- a/proposals/206-directory-sources.txt
+++ b/proposals/206-directory-sources.txt
@@ -1,3 +1,4 @@
+```
Filename: 206-directory-sources.txt
Title: Preconfigured directory sources for bootstrapping
Author: Nick Mathewson
@@ -87,3 +88,4 @@ Some notes on security:
+```
diff --git a/proposals/207-directory-guards.txt b/proposals/207-directory-guards.txt
index 8d21d3e..51dcdbf 100644
--- a/proposals/207-directory-guards.txt
+++ b/proposals/207-directory-guards.txt
@@ -1,3 +1,4 @@
+```
Filename: 207-directory-guards.txt
Title: Directory guards
Author: Nick Mathewson
@@ -52,3 +53,4 @@ Open questions and notes:
+```
diff --git a/proposals/208-ipv6-exits-redux.txt b/proposals/208-ipv6-exits-redux.txt
index 32fb09c..fd0adfa 100644
--- a/proposals/208-ipv6-exits-redux.txt
+++ b/proposals/208-ipv6-exits-redux.txt
@@ -1,3 +1,4 @@
+```
Filename: 208-ipv6-exits-redux.txt
Title: IPv6 Exits Redux
Author: Nick Mathewson
@@ -125,3 +126,4 @@ Implemented-In: 0.2.4.7-alpha
This makes proposal 205 especially necessary here.
+```
diff --git a/proposals/209-path-bias-tuning.txt b/proposals/209-path-bias-tuning.txt
index 7d02422..fcdaf78 100644
--- a/proposals/209-path-bias-tuning.txt
+++ b/proposals/209-path-bias-tuning.txt
@@ -1,3 +1,4 @@
+```
Filename: 209-path-bias-tuning.txt
Title: Tuning the Parameters for the Path Bias Defense
Author: Mike Perry
@@ -286,3 +287,4 @@ Implementation Notes: Differences between proposal and current source
3. https://gitweb.torproject.org/torflow.git/tree/HEAD:/CircuitAnalysis/PathBias
4. https://github.com/meejah/txtorcon/blob/exit_scanner/apps/exit_scanner/failure-rate-scanner.py
5. See 2.4.1 of path-spec.txt for further details on circuit timeout calculations.
+```
diff --git a/proposals/210-faster-headless-consensus-bootstrap.txt b/proposals/210-faster-headless-consensus-bootstrap.txt
index 380a9ac..3bf8760 100644
--- a/proposals/210-faster-headless-consensus-bootstrap.txt
+++ b/proposals/210-faster-headless-consensus-bootstrap.txt
@@ -1,3 +1,4 @@
+```
Filename: 210-faster-headless-consensus-bootstrap.txt
Title: Faster Headless Consensus Bootstrapping
Author: Mike Perry, Tim Wilson-Brown, Peter Palfrader
@@ -236,3 +237,4 @@ Reliability Analysis
among a larger number of directory mirrors. In addition, if all the
authorities are blocked, current clients will inevitably fail, as they
do not have a list of directory mirrors.
+```
diff --git a/proposals/211-mapaddress-tor-status.txt b/proposals/211-mapaddress-tor-status.txt
index 28be3bb..5dbe445 100644
--- a/proposals/211-mapaddress-tor-status.txt
+++ b/proposals/211-mapaddress-tor-status.txt
@@ -1,3 +1,4 @@
+```
Filename: 211-mapaddress-tor-status.txt
Title: Internal Mapaddress for Tor Configuration Testing
Author: Mike Perry
@@ -143,3 +144,4 @@ Security Considerations
1. http://www.hpenterprisesecurity.com/vulncat/en/vulncat/dotnet/javascript_hijacking_vulnerable_framework.html
+```
diff --git a/proposals/212-using-old-consensus.txt b/proposals/212-using-old-consensus.txt
index 3fd9839..621466e 100644
--- a/proposals/212-using-old-consensus.txt
+++ b/proposals/212-using-old-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 212-using-old-consensus.txt
Title: Increase Acceptable Consensus Age
Author: Mike Perry
@@ -107,3 +108,4 @@ Implementation Notes
still attempting to fetch new ones.
1. https://trac.torproject.org/projects/tor/ticket/7126
+```
diff --git a/proposals/213-remove-stream-sendmes.txt b/proposals/213-remove-stream-sendmes.txt
index f2b8b34..18b51f3 100644
--- a/proposals/213-remove-stream-sendmes.txt
+++ b/proposals/213-remove-stream-sendmes.txt
@@ -1,3 +1,4 @@
+```
Filename: 213-remove-stream-sendmes.txt
Title: Remove stream-level sendmes from the design
Author: Roger Dingledine
@@ -150,3 +151,4 @@ Status: Dead
since it lacks any stream-level pushback for streams that are blocking
on writes. Nicely done!
+```
diff --git a/proposals/214-longer-circids.txt b/proposals/214-longer-circids.txt
index b5bd88a..54675ac 100644
--- a/proposals/214-longer-circids.txt
+++ b/proposals/214-longer-circids.txt
@@ -1,3 +1,4 @@
+```
Filename: 214-longer-circids.txt
Title: Allow 4-byte circuit IDs in a new link protocol
Author: Nick Mathewson
@@ -92,3 +93,4 @@ Implemented-In: 0.2.4.11-alpha
implementation in branch "wide_circ_ids" in my public repository.
Be afraid! More testing is needed!
+```
diff --git a/proposals/215-update-min-consensus-ver.txt b/proposals/215-update-min-consensus-ver.txt
index 899a943..c6fba59 100644
--- a/proposals/215-update-min-consensus-ver.txt
+++ b/proposals/215-update-min-consensus-ver.txt
@@ -1,3 +1,4 @@
+```
Filename: 215-update-min-consensus-ver.txt
Title: Let the minimum consensus method change with time
Author: Nick Mathewson
@@ -93,3 +94,4 @@ Implemented-In: 0.2.6.1-alpha
at all." That's harder to program, though.
+```
diff --git a/proposals/216-ntor-handshake.txt b/proposals/216-ntor-handshake.txt
index f76e81c..a96dd83 100644
--- a/proposals/216-ntor-handshake.txt
+++ b/proposals/216-ntor-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 216-ntor-handshake.txt
Title: Improved circuit-creation key exchange
Author: Nick Mathewson
@@ -211,3 +212,4 @@ Test vectors for HKDF-SHA256:
b4dc21d69363e2895321c06184879d94b18f0784
11be70b767c7fc40679a9440a0c95ea83a23efbf
+```
diff --git a/proposals/217-ext-orport-auth.txt b/proposals/217-ext-orport-auth.txt
index 3734924..6a61a65 100644
--- a/proposals/217-ext-orport-auth.txt
+++ b/proposals/217-ext-orport-auth.txt
@@ -1,3 +1,4 @@
+```
Filename: 217-ext-orport-auth.txt
Title: Tor Extended ORPort Authentication
Author: George Kadianakis
@@ -175,3 +176,4 @@ http://archives.seul.org/or/announce/Sep-2007/msg00000.html
[1]:
https://gitweb.torproject.org/torspec.git/blob/79f488c32c43562522e5592f2c19952dc7681a65:/control-spec.txt#l1069
+```
diff --git a/proposals/218-usage-controller-events.txt b/proposals/218-usage-controller-events.txt
index 76c64cd..f709550 100644
--- a/proposals/218-usage-controller-events.txt
+++ b/proposals/218-usage-controller-events.txt
@@ -1,3 +1,4 @@
+```
Filename: 218-usage-controller-events.txt
Title: Controller events to better understand connection/circuit usage
Author: Rob Jansen, Karsten Loesing
@@ -219,3 +220,4 @@ Implemented-In: 0.2.5.2-alpha
as small as possible. Still, we should make sure that memory
requirements won't grow significantly on busy relays.
+```
diff --git a/proposals/219-expanded-dns.txt b/proposals/219-expanded-dns.txt
index 7298b78..86b3f1a 100644
--- a/proposals/219-expanded-dns.txt
+++ b/proposals/219-expanded-dns.txt
@@ -1,3 +1,4 @@
+```
Filename: 219-expanded-dns.txt
Title: Support for full DNS and DNSSEC resolution in Tor
Authors: Ondrej Mikle
@@ -346,3 +347,4 @@ Status: Needs-Revision
References:
[1] https://www.ietf.org/mail-archive/web/dane/current/msg02823.html
+```
diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt
index 21b6dac..a6e6b54 100644
--- a/proposals/220-ecc-id-keys.txt
+++ b/proposals/220-ecc-id-keys.txt
@@ -1,3 +1,4 @@
+```
Filename: 220-ecc-id-keys.txt
Title: Migrate server identity keys to Ed25519
Authors: Nick Mathewson
@@ -683,3 +684,4 @@ A.6. Related changes
keys. This will improve link security, and deliver better
fingerprinting resistence. See proposal 179 for an older discussion
of this issue.
+```
diff --git a/proposals/221-stop-using-create-fast.txt b/proposals/221-stop-using-create-fast.txt
index 7903a39..2fa2209 100644
--- a/proposals/221-stop-using-create-fast.txt
+++ b/proposals/221-stop-using-create-fast.txt
@@ -1,3 +1,4 @@
+```
Filename: 221-stop-using-create-fast.txt
Title: Stop using CREATE_FAST
Authors: Nick Mathewson
@@ -88,3 +89,4 @@ Status: Closed
reliable signal, since "FastFirstHopPK 0" is easy enough to type, and
the source code is easy enough to edit. Proposal 163 and its
successors have better ideas here anyway.
+```
diff --git a/proposals/222-remove-client-timestamps.txt b/proposals/222-remove-client-timestamps.txt
index b2a2ae9..3af19d1 100644
--- a/proposals/222-remove-client-timestamps.txt
+++ b/proposals/222-remove-client-timestamps.txt
@@ -1,3 +1,4 @@
+```
Filename: 222-remove-client-timestamps.txt
Title: Stop sending client timestamps
Authors: Nick Mathewson
@@ -248,3 +249,4 @@ Implementors might want to make this feature optional and
on-by-default, just in case some higher-level application protocol
really does depend on it.
==================================================================
+```
diff --git a/proposals/223-ace-handshake.txt b/proposals/223-ace-handshake.txt
index 5e333bb..70d34f4 100644
--- a/proposals/223-ace-handshake.txt
+++ b/proposals/223-ace-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 223-ace-handshake.txt
Title: Ace: Improved circuit-creation key exchange
Author: Esfandiar Mohammadi, Aniket Kate, Michael Backes
@@ -110,3 +111,4 @@ See also:
http://www.infsec.cs.uni-saarland.de/~mohammadi/ace/ace.html
for implementations, academic paper, and benchmarking code.
+```
diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt
index 1dfe87b..e1cba7f 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -1,3 +1,4 @@
+```
Filename: 224-rend-spec-ng.txt
Title: Next-Generation Hidden Services in Tor
Author: David Goulet, George Kadianakis, Nick Mathewson
@@ -2368,3 +2369,4 @@ Appendix E. Managing authorized client data [CLIENT-AUTH-MGMT]
[XXX what happens when people use both the control port interface and the
filesystem interface?]
+```
diff --git a/proposals/225-strawman-shared-rand.txt b/proposals/225-strawman-shared-rand.txt
index f124174..6d71327 100644
--- a/proposals/225-strawman-shared-rand.txt
+++ b/proposals/225-strawman-shared-rand.txt
@@ -1,3 +1,4 @@
+```
Filename: 225-strawman-shared-rand.txt
Title: Strawman proposal: commit-and-reveal shared rng
Author: Nick Mathewson
@@ -112,3 +113,4 @@ Superseded-by: 250
(TODO: should this be its own spec? If so, does it have to use our
regular metaformat or can it use something less sucky?)
+```
diff --git a/proposals/226-bridgedb-database-improvements.txt b/proposals/226-bridgedb-database-improvements.txt
index dd52ae6..d239a4a 100644
--- a/proposals/226-bridgedb-database-improvements.txt
+++ b/proposals/226-bridgedb-database-improvements.txt
@@ -1,3 +1,4 @@
+```
Filename: 226-bridgedb-database-improvements.txt
Title: "Scalability and Stability Improvements to BridgeDB: Switching to a
Distributed Database System and RDBMS"
@@ -256,3 +257,4 @@ Status: Reserve
[15]: http://redis.io/commands/evalsha
[16]: http://www.restmq.com/
[17]: https://www.mediawiki.org/wiki/Redis
+```
diff --git a/proposals/227-vote-on-package-fingerprints.txt b/proposals/227-vote-on-package-fingerprints.txt
index 8839941..8b0b472 100644
--- a/proposals/227-vote-on-package-fingerprints.txt
+++ b/proposals/227-vote-on-package-fingerprints.txt
@@ -1,3 +1,4 @@
+```
Filename: 227-vote-on-package-fingerprints.txt
Title: Include package fingerprints in consensus documents
Author: Nick Mathewson, Mike Perry
@@ -145,3 +146,4 @@ Implemented-In: 0.2.6.3-alpha
tool.
+```
diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt
index 64fe5f6..50413d3 100644
--- a/proposals/228-cross-certification-onionkeys.txt
+++ b/proposals/228-cross-certification-onionkeys.txt
@@ -1,3 +1,4 @@
+```
Filename: 228-cross-certification-onionkeys.txt
Title: Cross-certifying identity keys with onion keys
Author: Nick Mathewson
@@ -166,3 +167,4 @@ C. Implementation notes
* An ntor onion key.
+```
diff --git a/proposals/229-further-socks5-extensions.txt b/proposals/229-further-socks5-extensions.txt
index 5661536..390750f 100644
--- a/proposals/229-further-socks5-extensions.txt
+++ b/proposals/229-further-socks5-extensions.txt
@@ -1,3 +1,4 @@
+```
Filename: 229-further-socks5-extensions.txt
Title: Further SOCKS5 extensions
Author: Yawning Angel
@@ -252,3 +253,4 @@ Note: These are good ideas, but it's better not to hack SOCKS any further
* check it into git
* clean text a little, fix redundancy
* ask some questions
+```
diff --git a/proposals/230-rsa1024-relay-id-migration.txt b/proposals/230-rsa1024-relay-id-migration.txt
index 3a997fe..92e72d8 100644
--- a/proposals/230-rsa1024-relay-id-migration.txt
+++ b/proposals/230-rsa1024-relay-id-migration.txt
@@ -1,3 +1,4 @@
+```
Filename: 230-rsa1024-relay-id-migration.txt
Title: How to change RSA1024 relay identity keys
Authors: Nick Mathewson
@@ -83,3 +84,4 @@ Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256.
the descriptor.
+```
diff --git a/proposals/231-migrate-authority-rsa1024-ids.txt b/proposals/231-migrate-authority-rsa1024-ids.txt
index 0388cf0..af5c6af 100644
--- a/proposals/231-migrate-authority-rsa1024-ids.txt
+++ b/proposals/231-migrate-authority-rsa1024-ids.txt
@@ -1,3 +1,4 @@
+```
Filename: 231-migrate-authority-rsa1024-ids.txt
Title: Migrating authority RSA1024 identity keys
Authors: Nick Mathewson
@@ -68,3 +69,4 @@ Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256.
but not include them in votes or the consensus; or if they are
included, don't assign them flags that will get them used.
+```
diff --git a/proposals/232-pluggable-transports-through-proxy.txt b/proposals/232-pluggable-transports-through-proxy.txt
index 03cee07..53b1524 100644
--- a/proposals/232-pluggable-transports-through-proxy.txt
+++ b/proposals/232-pluggable-transports-through-proxy.txt
@@ -1,3 +1,4 @@
+```
Filename: 232-pluggable-transports-through-proxy.txt
Title: Pluggable Transport through SOCKS proxy
Author: Arturo Filastò
@@ -77,3 +78,4 @@ Specifications: Tor Pluggable Transport communication
from its stdout and it is configured to use both a normal proxy and
a pluggable transport it should kill the transport proxy.
+```
diff --git a/proposals/233-quicken-tor2web-mode.txt b/proposals/233-quicken-tor2web-mode.txt
index fd002c0..2821f36 100644
--- a/proposals/233-quicken-tor2web-mode.txt
+++ b/proposals/233-quicken-tor2web-mode.txt
@@ -1,3 +1,4 @@
+```
Filename: 233-quicken-tor2web-mode.txt
Title: Making Tor2Web mode faster
Author: Virgil Griffith, Fabio Pietrosanti, Giovanni Pellerano
@@ -33,3 +34,4 @@ Status: Rejected
[1] Tor2web mode: https://trac.torproject.org/projects/tor/ticket/2553
[2] Self-rendezvous: https://trac.torproject.org/projects/tor/ticket/9685
+```
diff --git a/proposals/234-remittance-addresses.txt b/proposals/234-remittance-addresses.txt
index 712c1ed..e49830d 100644
--- a/proposals/234-remittance-addresses.txt
+++ b/proposals/234-remittance-addresses.txt
@@ -1,3 +1,4 @@
+```
Filename: 234-remittance-addresses.txt
Title: Adding remittance field to directory specification
Author: Virgil Griffith, Leif Ryge, Rob Jansen
@@ -38,3 +39,4 @@ Note: Rejected. People are doing this with ContactInfo lines.
(left-most) one of each currency is published in the directory
consensus.
+```
diff --git a/proposals/235-kill-named-flag.txt b/proposals/235-kill-named-flag.txt
index 238315a..17688ed 100644
--- a/proposals/235-kill-named-flag.txt
+++ b/proposals/235-kill-named-flag.txt
@@ -1,3 +1,4 @@
+```
Filename: 235-kill-named-flag.txt
Title: Stop assigning (and eventually supporting) the Named flag
Authors: Sebastian Hahn
@@ -51,3 +52,4 @@ Status: Closed
4. Open questions
None.
+```
diff --git a/proposals/236-single-guard-node.txt b/proposals/236-single-guard-node.txt
index 7db8a67..50c734b 100644
--- a/proposals/236-single-guard-node.txt
+++ b/proposals/236-single-guard-node.txt
@@ -1,3 +1,4 @@
+```
Filename: 236-single-guard-node.txt
Title: The move to a single guard node
Author: George Kadianakis, Nicholas Hopper
@@ -304,3 +305,4 @@ References:
[6]: https://trac.torproject.org/projects/tor/ticket/9001
[7]: https://trac.torproject.org/projects/tor/ticket/10969
+```
diff --git a/proposals/237-directory-servers-for-all.txt b/proposals/237-directory-servers-for-all.txt
index 130bd32..a25352f 100644
--- a/proposals/237-directory-servers-for-all.txt
+++ b/proposals/237-directory-servers-for-all.txt
@@ -1,3 +1,4 @@
+```
Filename: 237-directory-servers-for-all.txt
Title: All relays are directory servers
Author: Matthew Finkel
@@ -131,3 +132,4 @@ Future Considerations:
Is V2Dir a good name for this? It's the name we currently use, but
that's a silly reason to continue using it.
+```
diff --git a/proposals/238-hs-relay-stats.txt b/proposals/238-hs-relay-stats.txt
index 9134003..7b263bd 100644
--- a/proposals/238-hs-relay-stats.txt
+++ b/proposals/238-hs-relay-stats.txt
@@ -1,3 +1,4 @@
+```
Filename: 238-hs-relay-stats.txt
Title: Better hidden service stats from Tor relays
Author: George Kadianakis, David Goulet, Karsten Loesing, Aaron Johnson
@@ -291,3 +292,4 @@ Status: Closed
[ONIONS-LAPLACE-GRAPH]: https://raw.githubusercontent.com/corcra/pioton/master/vis/laplacePDF_mu0.0_b26.67.png
https://raw.githubusercontent.com/corcra/pioton/master/vis/laplaceCDF_mu0.0_b26.67.png
+```
diff --git a/proposals/239-consensus-hash-chaining.txt b/proposals/239-consensus-hash-chaining.txt
index 0c259dd..72738a2 100644
--- a/proposals/239-consensus-hash-chaining.txt
+++ b/proposals/239-consensus-hash-chaining.txt
@@ -1,3 +1,4 @@
+```
Filename: 239-consensus-hash-chaining.txt
Title: Consensus Hash Chaining
Author: Nick Mathewson, Andrea Shepard
@@ -97,3 +98,4 @@ Status: Open
* Clients MAY offer the option to retain previous consensuses in
memory only to allow for validation without the potential disk
leak.
+```
diff --git a/proposals/240-auth-cert-revocation.txt b/proposals/240-auth-cert-revocation.txt
index ae7d4b8..1128671 100644
--- a/proposals/240-auth-cert-revocation.txt
+++ b/proposals/240-auth-cert-revocation.txt
@@ -1,3 +1,4 @@
+```
Filename: 240-auth-cert-revocation.txt
Title: Early signing key revocation for directory authorities
Author: Nick Mathewson
@@ -46,3 +47,4 @@ Status: Open
of certificate B, and certificate B revokes the key of certificate A.
Instead, I am inclined to say that this is a MUST NOT.
+```
diff --git a/proposals/241-suspicious-guard-turnover.txt b/proposals/241-suspicious-guard-turnover.txt
index 004feb1..16ccfb4 100644
--- a/proposals/241-suspicious-guard-turnover.txt
+++ b/proposals/241-suspicious-guard-turnover.txt
@@ -1,3 +1,4 @@
+```
Filename: 241-suspicious-guard-turnover.txt
Title: Resisting guard-turnover attacks
Author: Aaron Johnson, Nick Mathewson
@@ -180,3 +181,4 @@ Appendix B. Acknowledgements
Appendix C. Desirable revisions
Incorporate ideas from proposal 156.
+```
diff --git a/proposals/242-better-families.txt b/proposals/242-better-families.txt
index 5f4ac47..c2edb54 100644
--- a/proposals/242-better-families.txt
+++ b/proposals/242-better-families.txt
@@ -1,3 +1,4 @@
+```
Filename: 242-better-families.txt
Title: Better performance and usability for the MyFamily option
Author: Nick Mathewson
@@ -95,3 +96,4 @@ Superseded-by: 321-happy-families.md
It's possible that families are a bad idea entirely; see ticket
#6676.
+```
diff --git a/proposals/243-hsdir-flag-need-stable.txt b/proposals/243-hsdir-flag-need-stable.txt
index 035550b..1ed0245 100644
--- a/proposals/243-hsdir-flag-need-stable.txt
+++ b/proposals/243-hsdir-flag-need-stable.txt
@@ -1,3 +1,4 @@
+```
Filename: 243-hsdir-flag-need-stable.txt
Title: Give out HSDir flag only to relays with Stable flag
Author: George Kadianakis
@@ -82,3 +83,4 @@ Implemented-in: 0.2.7
With the upcoming keyblinding scheme (#8106) and non-deterministic
HSDir selection (#8244), are there any other criteria that we
should use when assigning HSDir flags?
+```
diff --git a/proposals/244-use-rfc5705-for-tls-binding.txt b/proposals/244-use-rfc5705-for-tls-binding.txt
index 41ebfc1..faa148c 100644
--- a/proposals/244-use-rfc5705-for-tls-binding.txt
+++ b/proposals/244-use-rfc5705-for-tls-binding.txt
@@ -1,3 +1,4 @@
+```
Filename: 244-use-rfc5705-for-tls-binding.txt
Title: Use RFC5705 Key Exporting in our AUTHENTICATE calls
Author: Nick Mathewson
@@ -44,3 +45,4 @@ Implemented-In: 0.3.0.1-alpha
* The label string "EXPORTER FOR TOR TLS CLIENT BINDING " + TYPE
* The context value equal to the client's Ed25519 identity key
* The length 32.
+```
diff --git a/proposals/245-tap-out.txt b/proposals/245-tap-out.txt
index 4a9afd8..6edc3f9 100644
--- a/proposals/245-tap-out.txt
+++ b/proposals/245-tap-out.txt
@@ -1,3 +1,4 @@
+```
Filename: 245-tap-out.txt
Title: Deprecating and removing the TAP circuit extension protocol
Author: Nick Mathewson
@@ -94,3 +95,4 @@ Status: Needs-Revision
(For reference, the functions to patch would be
rend_client_get_random_intro_impl and find_rp_for_intro.)
+```
diff --git a/proposals/246-merge-hsdir-and-intro.txt b/proposals/246-merge-hsdir-and-intro.txt
index 0a70aea..e9aa780 100644
--- a/proposals/246-merge-hsdir-and-intro.txt
+++ b/proposals/246-merge-hsdir-and-intro.txt
@@ -1,3 +1,4 @@
+```
Filename: 246-merge-hsdir-and-intro.txt
Title: Merging Hidden Service Directories and Introduction Points
Author: John Brooks, George Kadianakis
@@ -302,3 +303,4 @@ Change history:
References:
[1] : https://lists.torproject.org/pipermail/tor-dev/2016-January/010203.html
+```
diff --git a/proposals/247-hs-guard-discovery.txt b/proposals/247-hs-guard-discovery.txt
index a41e025..a42161b 100644
--- a/proposals/247-hs-guard-discovery.txt
+++ b/proposals/247-hs-guard-discovery.txt
@@ -1,3 +1,4 @@
+```
Filename: 247-hs-guard-discovery.txt
Title: Defending Against Guard Discovery Attacks using Vanguards
Authors: George Kadianakis and Mike Perry
@@ -757,3 +758,4 @@ CDF_table_323()
----------------------
1. https://onionbalance.readthedocs.org/en/latest/design.html#overview
+```
diff --git a/proposals/248-removing-rsa-identities.txt b/proposals/248-removing-rsa-identities.txt
index eaabe41..3f05df3 100644
--- a/proposals/248-removing-rsa-identities.txt
+++ b/proposals/248-removing-rsa-identities.txt
@@ -1,3 +1,4 @@
+```
Filename: 248-removing-rsa-identities.txt
Title: Remove all RSA identity keys
Authors: Nick Mathewson
@@ -86,3 +87,4 @@ Status: Needs-Revision
make the phase 2 and phase 3 changes.
+```
diff --git a/proposals/249-large-create-cells.txt b/proposals/249-large-create-cells.txt
index 4be3e26..fdc80e2 100644
--- a/proposals/249-large-create-cells.txt
+++ b/proposals/249-large-create-cells.txt
@@ -1,3 +1,4 @@
+```
Filename: 249-large-create-cells.txt
Title: Allow CREATE cells with >505 bytes of handshake data
Authors: Nick Mathewson, Isis Lovecruft
@@ -276,3 +277,4 @@ Appendix B. Acknowledgements
This research was supported in part by NSF grants CNS-1111539,
CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548.
+```
diff --git a/proposals/250-commit-reveal-consensus.txt b/proposals/250-commit-reveal-consensus.txt
index c9711aa..f9821e9 100644
--- a/proposals/250-commit-reveal-consensus.txt
+++ b/proposals/250-commit-reveal-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 250-commit-reveal-consensus.txt
Title: Random Number Generation During Tor Voting
Authors: David Goulet, George Kadianakis
@@ -640,3 +641,4 @@ References:
[RNGMESSAGING]:
https://moderncrypto.org/mail-archive/messaging/2015/002032.html
+```
diff --git a/proposals/251-netflow-padding.txt b/proposals/251-netflow-padding.txt
index 39cc795..c7a2ef4 100644
--- a/proposals/251-netflow-padding.txt
+++ b/proposals/251-netflow-padding.txt
@@ -1,3 +1,4 @@
+```
Filename: 251-netflow-padding.txt
Title: Padding for netflow record resolution reduction
Authors: Mike Perry
@@ -363,3 +364,4 @@ Appendix A: Padding Cell Timeout Distribution Statistics
13. https://gitweb.torproject.org/torspec.git/tree/proposals/188-bridge-guards.txt
14. http://www.ntop.org/wp-content/uploads/2013/03/nProbe_UserGuide.pdf
15. http://infodoc.alcatel-lucent.com/html/0_add-h-f/93-0073-10-01/7750_SR_OS_Router_Configuration_Guide/Cflowd-CLI.html
+```
diff --git a/proposals/252-single-onion.txt b/proposals/252-single-onion.txt
index ddd78ea..c9b4c24 100644
--- a/proposals/252-single-onion.txt
+++ b/proposals/252-single-onion.txt
@@ -1,3 +1,4 @@
+```
Filename: 252-single-onion.txt
Title: Single Onion Services
Author: John Brooks, Paul Syverson, Roger Dingledine
@@ -257,3 +258,4 @@ Superseded-by: 260
Tor circuit. In speech we sometimes use the even briefer, 'two-nion' and
'one-ion' respectively.
+```
diff --git a/proposals/253-oob-hmac.txt b/proposals/253-oob-hmac.txt
index 9e9e1d7..c7abbd9 100644
--- a/proposals/253-oob-hmac.txt
+++ b/proposals/253-oob-hmac.txt
@@ -1,3 +1,4 @@
+```
Filename: 253-oob-hmac.txt
Title: Out of Band Circuit HMACs
Authors: Mike Perry
@@ -270,3 +271,4 @@ AES-NI[2].
1. https://lists.torproject.org/pipermail/tor-dev/2012-March/003347.html
2. http://archives.seul.org/tor/dev/Mar-2015/msg00137.html
+```
diff --git a/proposals/254-padding-negotiation.txt b/proposals/254-padding-negotiation.txt
index 5ab5341..84b1d1b 100644
--- a/proposals/254-padding-negotiation.txt
+++ b/proposals/254-padding-negotiation.txt
@@ -1,3 +1,4 @@
+```
Filename: 254-padding-negotiation.txt
Title: Padding Negotiation
Authors: Mike Perry
@@ -416,3 +417,4 @@ close the circuit upon detecting this activity.
1. https://gitweb.torproject.org/torspec.git/tree/proposals/251-netflow-padding.txt
2. https://www.cs.kau.se/pulls/hot/thebasketcase-wtfpad/
3. https://www.cs.kau.se/pulls/hot/thebasketcase-ape/
+```
diff --git a/proposals/255-hs-load-balancing.txt b/proposals/255-hs-load-balancing.txt
index 16657d0..136969d 100644
--- a/proposals/255-hs-load-balancing.txt
+++ b/proposals/255-hs-load-balancing.txt
@@ -1,3 +1,4 @@
+```
Filename: 255-hs-load-balancing.txt
Title: Controller features to allow for load-balancing hidden services
Author: Tom van der Woerdt
@@ -156,3 +157,4 @@ the controller. The developer of the tor implementation should not
have to choose between a round-robin algorithm and something that could
pull CPU load averages from a centralized monitoring system.
+```
diff --git a/proposals/256-key-revocation.txt b/proposals/256-key-revocation.txt
index bbccaf9..e512471 100644
--- a/proposals/256-key-revocation.txt
+++ b/proposals/256-key-revocation.txt
@@ -1,3 +1,4 @@
+```
Filename: 256-key-revocation.txt
Title: Key revocation for relays and authorities
Authors: Nick Mathewson
@@ -240,3 +241,4 @@ Status: Reserve
NOT trust any signing key certificate with a matching key.
+```
diff --git a/proposals/257-hiding-authorities.txt b/proposals/257-hiding-authorities.txt
index 9c32f90..cdb49d9 100644
--- a/proposals/257-hiding-authorities.txt
+++ b/proposals/257-hiding-authorities.txt
@@ -1,3 +1,4 @@
+```
Filename: 257-hiding-authorities.txt
Title: Refactoring authorities and making them more isolated from the net
Authors: Nick Mathewson, Andrea Shepard
@@ -211,3 +212,4 @@ A.1. Check-then-start TLS
(We shouldn't do this for all the TLS in Tor: only for the cases
where we want to restrict the users of a given TLS server.)
+```
diff --git a/proposals/258-dirauth-dos.txt b/proposals/258-dirauth-dos.txt
index 91ffd37..aa65d79 100644
--- a/proposals/258-dirauth-dos.txt
+++ b/proposals/258-dirauth-dos.txt
@@ -1,3 +1,4 @@
+```
Filename: 258-dirauth-dos.txt
Title: Denial-of-service resistance for directory authorities
Author: Andrea Shepard
@@ -109,3 +110,4 @@ Status: Dead
Widely distributed DoS attacks with many source IPs may still be
able to avoid raising any single DIRIND_ONEHOP or
DIRIND_DIRECT_CONN counter above threshold.
+```
diff --git a/proposals/259-guard-selection.txt b/proposals/259-guard-selection.txt
index 30bdcfa..76ee9b5 100644
--- a/proposals/259-guard-selection.txt
+++ b/proposals/259-guard-selection.txt
@@ -1,3 +1,4 @@
+```
Filename: 259-guard-selection.txt
Title: New Guard Selection Behaviour
Author: Isis Lovecruft, George Kadianakis
@@ -302,3 +303,4 @@ This proposal was made obsolete by proposal #271.
-*- coding: utf-8 -*-
+```
diff --git a/proposals/260-rend-single-onion.txt b/proposals/260-rend-single-onion.txt
index c4f2617..08ca33a 100644
--- a/proposals/260-rend-single-onion.txt
+++ b/proposals/260-rend-single-onion.txt
@@ -1,3 +1,4 @@
+```
Filename: 260-rend-single-onion.txt
Title: Rendezvous Single Onion Services
Author: Tim Wilson-Brown, John Brooks, Aaron Johnson, Rob Jansen, George Kadianakis, Paul Syverson, Roger Dingledine
@@ -460,3 +461,4 @@ splitting described in section 8. Here are some initial ideas.
be more comfortable enabling submission over an onion service, due to the
additional security benefits.
+```
diff --git a/proposals/261-aez-crypto.txt b/proposals/261-aez-crypto.txt
index f9c652e..1a6c108 100644
--- a/proposals/261-aez-crypto.txt
+++ b/proposals/261-aez-crypto.txt
@@ -1,3 +1,4 @@
+```
Filename: 261-aez-crypto.txt
Title: AEZ for relay cryptography
Author: Nick Mathewson
@@ -280,3 +281,4 @@ A.3. Performance notes: what if we don't have AESNI?
Preliminary results are a bit disappointing, though, so I'll
need to invetigate alternatives as well.]
+```
diff --git a/proposals/262-rekey-circuits.txt b/proposals/262-rekey-circuits.txt
index f639d1d..9f933f0 100644
--- a/proposals/262-rekey-circuits.txt
+++ b/proposals/262-rekey-circuits.txt
@@ -1,3 +1,4 @@
+```
Filename: 262-rekey-circuits.txt
Title: Re-keying live circuits with new cryptographic material
Author: Nick Mathewson
@@ -132,3 +133,4 @@ Status: Reserve
in the presence of traffic analysis.
+```
diff --git a/proposals/263-ntru-for-pq-handshake.txt b/proposals/263-ntru-for-pq-handshake.txt
index 6a3353e..f4d97d4 100644
--- a/proposals/263-ntru-for-pq-handshake.txt
+++ b/proposals/263-ntru-for-pq-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 263-ntru-for-pq-handshake.txt
Title: Request to change key exchange protocol for handshake v1.2
Author: John SCHANCK, William WHYTE and Zhenfei ZHANG
@@ -313,3 +314,4 @@ This proposal was made obsolete by proposal #269.
+```
diff --git a/proposals/264-subprotocol-versions.txt b/proposals/264-subprotocol-versions.txt
index bd58125..9ccb803 100644
--- a/proposals/264-subprotocol-versions.txt
+++ b/proposals/264-subprotocol-versions.txt
@@ -1,3 +1,4 @@
+```
Filename: 264-subprotocol-versions.txt
Title: Putting version numbers on the Tor subprotocols
Author: Nick Mathewson
@@ -547,3 +548,4 @@ A.3. Example integration with other open proposals
New Relay protocol version.
+```
diff --git a/proposals/265-load-balancing-with-overhead.txt b/proposals/265-load-balancing-with-overhead.txt
index 731a5b0..43110ba 100644
--- a/proposals/265-load-balancing-with-overhead.txt
+++ b/proposals/265-load-balancing-with-overhead.txt
@@ -1,3 +1,4 @@
+```
Filename: 265-load-balancing-with-overhead.txt
Title: Load Balancing with Overhead Parameters
Authors: Mike Perry
@@ -359,3 +360,4 @@ combined = solve(
Wme, Wmg, Wgg, Wee)
pprint(combined)
+```
diff --git a/proposals/266-removing-current-obsolete-clients.txt b/proposals/266-removing-current-obsolete-clients.txt
index a4cc75c..c266ce1 100644
--- a/proposals/266-removing-current-obsolete-clients.txt
+++ b/proposals/266-removing-current-obsolete-clients.txt
@@ -1,3 +1,4 @@
+```
Filename: 266-removing-current-obsolete-clients.txt
Title: Removing current obsolete clients from the Tor network
Author: Nick Mathewson
@@ -259,3 +260,4 @@ B. Next steps.
http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-02-12-15.01.log.html
has a more full discussion of the above ideas.
+```
diff --git a/proposals/267-tor-consensus-transparency.txt b/proposals/267-tor-consensus-transparency.txt
index 117b76a..f5ea26e 100644
--- a/proposals/267-tor-consensus-transparency.txt
+++ b/proposals/267-tor-consensus-transparency.txt
@@ -1,3 +1,4 @@
+```
Filename: 267-tor-consensus-transparency.txt
Title: Tor Consensus Transparency
Author: Linus Nordberg
@@ -361,3 +362,4 @@ C. References
[RFC4627] https://tools.ietf.org/html/rfc4627
[rfc6962-bis-12] https://datatracker.ietf.org/doc/draft-ietf-trans-rfc6962-bis/12
[CT] https://https://www.certificate-transparency.org/
+```
diff --git a/proposals/268-guard-selection.txt b/proposals/268-guard-selection.txt
index 3417b54..2d50790 100644
--- a/proposals/268-guard-selection.txt
+++ b/proposals/268-guard-selection.txt
@@ -1,3 +1,4 @@
+```
Filename: 268-guard-selection.txt
Title: New Guard Selection Behaviour
Author: Isis Lovecruft, George Kadianakis, [Ola Bini]
@@ -507,3 +508,4 @@ Status: Obsolete
version we can't recognize or it was chosen more than GUARD_LIFETIME ago.
-*- coding: utf-8 -*-
+```
diff --git a/proposals/269-hybrid-handshake.txt b/proposals/269-hybrid-handshake.txt
index 4ab7e19..0f32944 100644
--- a/proposals/269-hybrid-handshake.txt
+++ b/proposals/269-hybrid-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 269-hybrid-handshake.txt
Title: Transitionally secure hybrid handshakes
Author: John Schanck, William Whyte, Zhenfei Zhang,
@@ -420,3 +421,4 @@ A2. Instantiation with NewHope
PK := B | A_SEED
KEM_ENC(PK) -> NEWHOPE_ENCAPS(PK)
KEM_DEC(C, sk) -> NEWHOPE_DECAPS(C, sk)
+```
diff --git a/proposals/270-newhope-hybrid-handshake.txt b/proposals/270-newhope-hybrid-handshake.txt
index 52f6b50..6ad2e18 100644
--- a/proposals/270-newhope-hybrid-handshake.txt
+++ b/proposals/270-newhope-hybrid-handshake.txt
@@ -1,3 +1,4 @@
+```
Filename: 270-newhope-hybrid-handshake.txt
Title: RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
Author: Isis Lovecruft, Peter Schwabe
@@ -762,3 +763,4 @@ Depends: prop#220 prop#249 prop#264 prop#270
§C. Test Vectors
+```
diff --git a/proposals/271-another-guard-selection.txt b/proposals/271-another-guard-selection.txt
index 38da000..dc6ec46 100644
--- a/proposals/271-another-guard-selection.txt
+++ b/proposals/271-another-guard-selection.txt
@@ -1,3 +1,4 @@
+```
Filename: 271-another-guard-selection.txt
Title: Another algorithm for guard selection
Author: Isis Lovecruft, George Kadianakis, Ola Bini, Nick Mathewson
@@ -887,3 +888,4 @@ TODO. Still non-addressed issues [Section:TODO]
Suggestion: Treat it as a preference when adding to
{CONFIRMED_GUARDS}, but not otherwise.
+```
diff --git a/proposals/272-valid-and-running-by-default.txt b/proposals/272-valid-and-running-by-default.txt
index 210a631..4ec056b 100644
--- a/proposals/272-valid-and-running-by-default.txt
+++ b/proposals/272-valid-and-running-by-default.txt
@@ -1,3 +1,4 @@
+```
Filename: 272-valid-and-running-by-default.txt
Title: Listed routers should be Valid, Running, and treated as such
Created: 26 Aug 2016
@@ -58,3 +59,4 @@ B. Does this solve the zombie problem?
most ancient consensus-understanding Tors stop fetching descriptors
and using the network. More testing needed though.
+```
diff --git a/proposals/273-exit-relay-pinning.txt b/proposals/273-exit-relay-pinning.txt
index 4a83a00..40e5abf 100644
--- a/proposals/273-exit-relay-pinning.txt
+++ b/proposals/273-exit-relay-pinning.txt
@@ -1,3 +1,4 @@
+```
Filename: 273-exit-relay-pinning.txt
Title: Exit relay pinning for web services
Author: Philipp Winter, Tobias Pulls, Roya Ensafi, and Nick Feamster
@@ -221,3 +222,4 @@ Target: n/a
policy over several exit relays, spread over time. In doing so, we
are making assumptions on the number of visits the website sees.
Is there a better solution that isn't significantly more complex?
+```
diff --git a/proposals/274-rotate-onion-keys-less.txt b/proposals/274-rotate-onion-keys-less.txt
index 09f5ea5..5625eb3 100644
--- a/proposals/274-rotate-onion-keys-less.txt
+++ b/proposals/274-rotate-onion-keys-less.txt
@@ -1,3 +1,4 @@
+```
Filename: 274-rotate-onion-keys-less.txt
Title: Rotate onion keys less frequently
Author: Nick Mathewson
@@ -111,3 +112,4 @@ Implemented-In: 0.3.1.1-alpha
previous onion key for an additional onion-key-grace-period-days
days after it is replaced.
+```
diff --git a/proposals/275-md-published-time-is-silly.txt b/proposals/275-md-published-time-is-silly.txt
index e08e9a8..1cff90d 100644
--- a/proposals/275-md-published-time-is-silly.txt
+++ b/proposals/275-md-published-time-is-silly.txt
@@ -1,3 +1,4 @@
+```
Filename: 275-md-published-time-is-silly.txt
Title: Stop including meaningful "published" time in microdescriptor consensus
Author: Nick Mathewson
@@ -126,3 +127,4 @@ Implemented-In: 0.4.8.1-alpha
+```
diff --git a/proposals/276-lower-bw-granularity.txt b/proposals/276-lower-bw-granularity.txt
index 156639e..bcd80c0 100644
--- a/proposals/276-lower-bw-granularity.txt
+++ b/proposals/276-lower-bw-granularity.txt
@@ -1,3 +1,4 @@
+```
Filename: 276-lower-bw-granularity.txt
Title: Report bandwidth with lower granularity in consensus documents
Author: Nick Mathewson
@@ -77,3 +78,4 @@ Target: 0.3.1.x-alpha
be safe?
Would a time-aware smoothing mechanism work better?
+```
diff --git a/proposals/277-detect-id-sharing.txt b/proposals/277-detect-id-sharing.txt
index 7837615..e19f7ee 100644
--- a/proposals/277-detect-id-sharing.txt
+++ b/proposals/277-detect-id-sharing.txt
@@ -1,3 +1,4 @@
+```
Filename: 277-detect-id-sharing.txt
Title: Detect multiple relay instances running with same ID
Author: Nick Mathewson
@@ -57,3 +58,4 @@ Target: 0.3.??
+```
diff --git a/proposals/278-directory-compression-scheme-negotiation.txt b/proposals/278-directory-compression-scheme-negotiation.txt
index 6f509fc..6d80d39 100644
--- a/proposals/278-directory-compression-scheme-negotiation.txt
+++ b/proposals/278-directory-compression-scheme-negotiation.txt
@@ -1,3 +1,4 @@
+```
Filename: 278-directory-compression-scheme-negotiation.txt
Title: Directory Compression Scheme Negotiation
Author: Alexander Færøy
@@ -207,3 +208,4 @@ Implemented-In: 0.3.1.1-alpha
This research was supported in part by NSF grants CNS-1111539,
CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548.
+```
diff --git a/proposals/279-naming-layer-api.txt b/proposals/279-naming-layer-api.txt
index 1a56ecd..1d22662 100644
--- a/proposals/279-naming-layer-api.txt
+++ b/proposals/279-naming-layer-api.txt
@@ -1,3 +1,4 @@
+```
Filename: 279-naming-layer-api.txt
Title: A Name System API for Tor Onion Services
Author: George Kadianakis, Yawning Angel, David Goulet
@@ -522,3 +523,4 @@ Appendix A.2: Example plugins [PLUGINEXAMPLES]
f) OnioNS
g) Namecoin/Blockstart
+```
diff --git a/proposals/280-privcount-in-tor.txt b/proposals/280-privcount-in-tor.txt
index fd5a011..2944419 100644
--- a/proposals/280-privcount-in-tor.txt
+++ b/proposals/280-privcount-in-tor.txt
@@ -1,3 +1,4 @@
+```
Filename: 280-privcount-in-tor.txt
Title: Privacy-Preserving Statistics with Privcount in Tor
Author: Nick Mathewson, Tim Wilson-Brown
@@ -335,3 +336,4 @@ Superseded-By: 288
want to expand this scheme to work with anonymous data collectors,
such as Tor clients.
+```
diff --git a/proposals/281-bulk-md-download.txt b/proposals/281-bulk-md-download.txt
index c561aa0..8f624d9 100644
--- a/proposals/281-bulk-md-download.txt
+++ b/proposals/281-bulk-md-download.txt
@@ -1,3 +1,4 @@
+```
Filename: 281-bulk-md-download.txt
Title: Downloading microdescriptors in bulk
Author: Nick Mathewson
@@ -98,3 +99,4 @@ Status: Reserve
Caches supporting this download protocol need to advertise
support of a new DirCache subprotocol version.
+```
diff --git a/proposals/282-remove-named-from-consensus.txt b/proposals/282-remove-named-from-consensus.txt
index eeef519..b37e855 100644
--- a/proposals/282-remove-named-from-consensus.txt
+++ b/proposals/282-remove-named-from-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 282-remove-named-from-consensus.txt
Title: Remove "Named" and "Unnamed" handling from consensus voting
Author: Nick Mathewson
@@ -22,3 +23,4 @@ Target: arti-dirauth
the negotiated method is M or later, then the Named and Unnamed
flags are handled as if any they were any other consensus flags.
+```
diff --git a/proposals/283-ipv6-in-micro-consensus.txt b/proposals/283-ipv6-in-micro-consensus.txt
index 1d29f78..f5846ef 100644
--- a/proposals/283-ipv6-in-micro-consensus.txt
+++ b/proposals/283-ipv6-in-micro-consensus.txt
@@ -1,3 +1,4 @@
+```
Filename: 283-ipv6-in-micro-consensus.txt
Title: Move IPv6 ORPorts from microdescriptors to the microdesc consensus
Author: Tim Wilson-Brown (teor), Nick Mathewson
@@ -186,3 +187,4 @@ Ticket: #20916
Consensus-health implements a ReachableIPv6 pseudo-flag for authorities
and relays:
https://consensus-health.torproject.org/
+```
diff --git a/proposals/284-hsv3-control-port.txt b/proposals/284-hsv3-control-port.txt
index 1ff20bb..6bef07a 100644
--- a/proposals/284-hsv3-control-port.txt
+++ b/proposals/284-hsv3-control-port.txt
@@ -1,3 +1,4 @@
+```
Filename: 284-hsv3-control-port.txt
Title: Hidden Service v3 Control Port
Author: David Goulet
@@ -191,3 +192,4 @@ Status: Closed
an "HSAddress". This field is extended to support v3 address:
HSAddress = 16*Base32Character / 56*Base32Character / "UNKNOWN"
+```
diff --git a/proposals/285-utf-8.txt b/proposals/285-utf-8.txt
index cb7bab4..453a8db 100644
--- a/proposals/285-utf-8.txt
+++ b/proposals/285-utf-8.txt
@@ -1,3 +1,4 @@
+```
Filename: 285-utf-8.txt
Title: Directory documents should be standardized as UTF-8
Author: Nick Mathewson
@@ -115,3 +116,4 @@ Ticket: https://gitlab.torproject.org/tpo/core/tor/-/issues/40131
* Well-Formed UTF-8 Byte Sequences: Table 3-7, page 126.
* Byte order mark: C11, page 83; D94, page 130.
* UTF-8 encoding scheme: D96, pages 130.
+```
diff --git a/proposals/286-hibernation-api.txt b/proposals/286-hibernation-api.txt
index 796cfa8..e76773e 100644
--- a/proposals/286-hibernation-api.txt
+++ b/proposals/286-hibernation-api.txt
@@ -1,3 +1,4 @@
+```
Filename: 286-hibernation-api.txt
Title: Controller APIs for hibernation access on mobile
Author: Nick Mathewson
@@ -195,3 +196,4 @@ Notes: This proposal was useful for our early thinking, but a simpler
StartIdle -- Boolean. If set to 1, Tor begins in IDLE mode.
+```
diff --git a/proposals/287-reduce-lifetime.txt b/proposals/287-reduce-lifetime.txt
index 06e87d0..e37ead9 100644
--- a/proposals/287-reduce-lifetime.txt
+++ b/proposals/287-reduce-lifetime.txt
@@ -1,3 +1,4 @@
+```
Filename: 287-reduce-lifetime.txt
Title: Reduce circuit lifetime without overloading the network
Author: Fernando Fernandez Mancera
@@ -103,3 +104,4 @@ Enhancing Tor's Performance using Real-time Traffic Classification
[https://www.cypherpunks.ca/~iang/pubs/difftor-ccs.pdf] (It's not exactly about
that, but they talk about circuit lifetime and the ten minutes problem a few
times. Also it's an interesting paper.)
+```
diff --git a/proposals/288-privcount-with-shamir.txt b/proposals/288-privcount-with-shamir.txt
index 109c743..7315d4c 100644
--- a/proposals/288-privcount-with-shamir.txt
+++ b/proposals/288-privcount-with-shamir.txt
@@ -1,3 +1,4 @@
+```
Filename: 288-privcount-with-shamir.txt
Title: Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
Author: Nick Mathewson, Tim Wilson-Brown, Aaron Johnson
@@ -565,3 +566,4 @@ Appendix Z. Remaining client-side uncertainties
How data is uploaded to DCs?
What to say about persistence on the DC side?
+```
diff --git a/proposals/289-authenticated-sendmes.txt b/proposals/289-authenticated-sendmes.txt
index e09b882..ebb1e3c 100644
--- a/proposals/289-authenticated-sendmes.txt
+++ b/proposals/289-authenticated-sendmes.txt
@@ -1,3 +1,4 @@
+```
Filename: 289-authenticated-sendmes.txt
Title: Authenticating sendme cells to mitigate bandwidth attacks
Author: Rob Jansen, Roger Dingledine, David Goulet
@@ -493,3 +494,4 @@ Implemented-In: 0.4.1.1-alpha
This research was supported in part by NSF grants CNS-1111539,
CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548.
+```
diff --git a/proposals/290-deprecate-consensus-methods.txt b/proposals/290-deprecate-consensus-methods.txt
index 979559c..832426e 100644
--- a/proposals/290-deprecate-consensus-methods.txt
+++ b/proposals/290-deprecate-consensus-methods.txt
@@ -1,3 +1,4 @@
+```
Filename: 290-deprecate-consensus-methods.txt
Title: Continuously update consensus methods
Author: Nick Mathewson
@@ -75,3 +76,4 @@ B. Client and relay compatibility notes
not represent backward-incompatible changes in how they generate
their consensuses.
+```
diff --git a/proposals/291-two-guard-nodes.txt b/proposals/291-two-guard-nodes.txt
index 56424cc..9b89eae 100644
--- a/proposals/291-two-guard-nodes.txt
+++ b/proposals/291-two-guard-nodes.txt
@@ -1,3 +1,4 @@
+```
Filename: 291-two-guard-nodes.txt
Title: The move to two guard nodes
Author: Mike Perry
@@ -254,3 +255,4 @@ References:
12. https://trac.torproject.org/projects/tor/ticket/10969
13. https://www.freehaven.net/anonbib/cache/wpes12-cogs.pdf
14. https://gitweb.torproject.org/torspec.git/tree/proposals/247-hs-guard-discovery.txt
+```
diff --git a/proposals/292-mesh-vanguards.txt b/proposals/292-mesh-vanguards.txt
index 5341213..e0dc6e8 100644
--- a/proposals/292-mesh-vanguards.txt
+++ b/proposals/292-mesh-vanguards.txt
@@ -1,3 +1,4 @@
+```
Filename: 292-mesh-vanguards.txt
Title: Mesh-based vanguards
Authors: George Kadianakis and Mike Perry
@@ -534,3 +535,4 @@ CDF_table_33()
----------------------
1. https://onionbalance.readthedocs.org/en/latest/design.html#overview
+```
diff --git a/proposals/293-know-when-to-publish.txt b/proposals/293-know-when-to-publish.txt
index c6fd1aa..2ca4222 100644
--- a/proposals/293-know-when-to-publish.txt
+++ b/proposals/293-know-when-to-publish.txt
@@ -1,3 +1,4 @@
+```
Filename: 293-know-when-to-publish.txt
Title: Other ways for relays to know when to publish
Author: Nick Mathewson
@@ -59,3 +60,4 @@ Implemented-In: 0.4.0.1-alpha
published time in consensus documents accurate -- we can start
setting it to some time in the distant future, per proposal 275.
+```
diff --git a/proposals/294-tls-1.3.txt b/proposals/294-tls-1.3.txt
index c9bae79..e195b2f 100644
--- a/proposals/294-tls-1.3.txt
+++ b/proposals/294-tls-1.3.txt
@@ -1,3 +1,4 @@
+```
Filename: 294-tls-1.3.txt
Title: TLS 1.3 Migration
Authors: Isis Lovecruft
@@ -338,3 +339,4 @@ A. References
https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set1_groups.html
[TLS-1.3_SIGNATURE_ALGOS]:
https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#signature-algorithms
+```
diff --git a/proposals/295-relay-crypto-with-adl.txt b/proposals/295-relay-crypto-with-adl.txt
index 7f8fc42..bf8fd77 100644
--- a/proposals/295-relay-crypto-with-adl.txt
+++ b/proposals/295-relay-crypto-with-adl.txt
@@ -1,3 +1,4 @@
+```
Filename: 295-relay-crypto-with-adl.txt
Title: Using ADL for relay cryptography (solving the crypto-tagging attack)
Author: Tomer Ashur, Orr Dunkelman, Atul Luykx
@@ -561,3 +562,4 @@ Status: Open
No changes are required to the authentication process when the relay
cell is sent backwards.
+```
diff --git a/proposals/296-expose-bandwidth-files.txt b/proposals/296-expose-bandwidth-files.txt
index 908a9ad..c61dc68 100644
--- a/proposals/296-expose-bandwidth-files.txt
+++ b/proposals/296-expose-bandwidth-files.txt
@@ -1,3 +1,4 @@
+```
Filename: 296-expose-bandwidth-files.txt
Title: Have Directory Authorities expose raw bandwidth list files
Author: Tom Ritter
@@ -84,3 +85,4 @@ Applications that parse the document should follow the bandwidth list file
specification in bandwidth-file-spec.txt.
If a new bandwidth list format version is added, the applications MAY need
to upgrade to that version.
+```
diff --git a/proposals/297-safer-protover-shutdowns.txt b/proposals/297-safer-protover-shutdowns.txt
index 59fbac1..96d6f62 100644
--- a/proposals/297-safer-protover-shutdowns.txt
+++ b/proposals/297-safer-protover-shutdowns.txt
@@ -1,3 +1,4 @@
+```
Filename: 297-safer-protover-shutdowns.txt
Title: Relaxing the protover-based shutdown rules
Author: Nick Mathewson
@@ -104,3 +105,4 @@ IMPLEMENTATION NOTE:
+```
diff --git a/proposals/298-canonical-families.txt b/proposals/298-canonical-families.txt
index a96ab8d..4576d63 100644
--- a/proposals/298-canonical-families.txt
+++ b/proposals/298-canonical-families.txt
@@ -1,3 +1,4 @@
+```
Filename: 298-canonical-families.txt
Title: Putting family lines in canonical form
Author: Nick Mathewson
@@ -61,3 +62,4 @@ Implemented-In: 0.4.0.1-alpha
+```
diff --git a/proposals/299-ip-failure-count.txt b/proposals/299-ip-failure-count.txt
index 8c2319f..1078e6d 100644
--- a/proposals/299-ip-failure-count.txt
+++ b/proposals/299-ip-failure-count.txt
@@ -1,3 +1,4 @@
+```
Filename: 299-ip-failure-count.txt
Title: Preferring IPv4 or IPv6 based on IP Version Failure Count
Author: Neel Chauhan
@@ -222,3 +223,4 @@ Ticket: https://trac.torproject.org/projects/tor/ticket/27491
Thank you teor for aiding me with the implementation of Happy Eyeballs in
Tor. This would not have been possible if it weren't for you.
+```
diff --git a/proposals/300-walking-onions.txt b/proposals/300-walking-onions.txt
index 3df9f44..5ab3a7a 100644
--- a/proposals/300-walking-onions.txt
+++ b/proposals/300-walking-onions.txt
@@ -1,3 +1,4 @@
+```
Filename: 300-walking-onions.txt
Title: Walking Onions: Scaling and Saving Bandwidth
Author: Nick Mathewson
@@ -511,3 +512,4 @@ A.2. Additional ideas
but it might be worth looking at harder.
+```
diff --git a/proposals/301-dont-vote-on-package-fingerprints.txt b/proposals/301-dont-vote-on-package-fingerprints.txt
index cabf4f7..e4f5c03 100644
--- a/proposals/301-dont-vote-on-package-fingerprints.txt
+++ b/proposals/301-dont-vote-on-package-fingerprints.txt
@@ -1,3 +1,4 @@
+```
Filename: 301-dont-vote-on-package-fingerprints.txt
Title: Don't include package fingerprints in consensus documents
Author: Iain R. Learmonth
@@ -71,3 +72,4 @@ B. Acknowledgements
Thanks to teor and Nick Mathewson for their comments and
suggestions on this proposal.
+```
diff --git a/proposals/302-padding-machines-for-onion-clients.txt b/proposals/302-padding-machines-for-onion-clients.txt
index cd24298..52710b0 100644
--- a/proposals/302-padding-machines-for-onion-clients.txt
+++ b/proposals/302-padding-machines-for-onion-clients.txt
@@ -1,3 +1,4 @@
+```
Filename: 302-padding-machines-for-onion-clients.txt
Title: Hiding onion service clients using padding
Author: George Kadianakis, Mike Perry
@@ -303,3 +304,4 @@ A. Acknowledgements
[1]: "Understanding Tor Usage with Privacy-Preserving Measurement"
by Akshaya Mani, T Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr
In Proceedings of the Internet Measurement Conference 2018 (IMC 2018).
+```
diff --git a/proposals/303-protover-removal-policy.txt b/proposals/303-protover-removal-policy.txt
index 54fcead..c2d5697 100644
--- a/proposals/303-protover-removal-policy.txt
+++ b/proposals/303-protover-removal-policy.txt
@@ -1,3 +1,4 @@
+```
Filename: 303-protover-removal-policy.txt
Title: When and how to remove support for protocol versions
Author: Nick Mathewson
@@ -60,3 +61,4 @@ Status: Open
_recommended_ for clients for at least 18 months.
+```
diff --git a/proposals/304-socks5-extending-hs-error-codes.txt b/proposals/304-socks5-extending-hs-error-codes.txt
index d8ff7d5..8866fa1 100644
--- a/proposals/304-socks5-extending-hs-error-codes.txt
+++ b/proposals/304-socks5-extending-hs-error-codes.txt
@@ -1,3 +1,4 @@
+```
Filename: 304-socks5-extending-hs-error-codes.txt
Title: Extending SOCKS5 Onion Service Error Codes
Author: David Goulet, George Kadianakis
@@ -107,3 +108,4 @@ References:
[PROP229] https://gitweb.torproject.org/torspec.git/tree/proposals/229-further-socks5-extensions.txt
[RFC1928] https://www.ietf.org/rfc/rfc1928.txt
+```
diff --git a/proposals/305-establish-intro-dos-defense-extention.txt b/proposals/305-establish-intro-dos-defense-extention.txt
index e377f3e..e1b0256 100644
--- a/proposals/305-establish-intro-dos-defense-extention.txt
+++ b/proposals/305-establish-intro-dos-defense-extention.txt
@@ -1,3 +1,4 @@
+```
Filename: 305-establish-intro-dos-defense-extention.txt
Title: ESTABLISH_INTRO Cell DoS Defense Extension
Author: David Goulet, George Kadianakis
@@ -199,3 +200,4 @@ References:
[1] https://lists.torproject.org/pipermail/tor-dev/2019-May/013837.html
[2] https://trac.torproject.org/15516
+```
diff --git a/proposals/306-ipv6-happy-eyeballs.txt b/proposals/306-ipv6-happy-eyeballs.txt
index c5c9ddf..86a1445 100644
--- a/proposals/306-ipv6-happy-eyeballs.txt
+++ b/proposals/306-ipv6-happy-eyeballs.txt
@@ -1,3 +1,4 @@
+```
Filename: 306-ipv6-happy-eyeballs.txt
Title: A Tor Implementation of IPv6 Happy Eyeballs
Author: Neel Chauhan
@@ -344,3 +345,4 @@ Ticket: https://trac.torproject.org/projects/tor/ticket/29801
[P299-TRAC]: https://trac.torproject.org/projects/tor/ticket/29801
[TEOR-P306-REP]: https://lists.torproject.org/pipermail/tor-dev/2019-July/013919.html
+```
diff --git a/proposals/307-onionbalance-v3.txt b/proposals/307-onionbalance-v3.txt
index baaa717..fb44cb3 100644
--- a/proposals/307-onionbalance-v3.txt
+++ b/proposals/307-onionbalance-v3.txt
@@ -1,3 +1,4 @@
+```
Filename: 307-onionbalance-v3.txt
Title: Onion Balance Support for Onion Service v3
Author: Nick Mathewson
@@ -183,3 +184,4 @@ A. Acknowledgments
in this problem space.
This research was supported by NSF grants CNS-1526306 and CNS-1619454.
+```
diff --git a/proposals/308-counter-galois-onion.txt b/proposals/308-counter-galois-onion.txt
index a57a38e..4714e8d 100644
--- a/proposals/308-counter-galois-onion.txt
+++ b/proposals/308-counter-galois-onion.txt
@@ -1,3 +1,4 @@
+```
Filename: 308-counter-galois-onion.txt
Title: Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
Authors: Jean Paul Degabriele, Alessandro Melloni, Martijn Stam
@@ -556,3 +557,4 @@ Misuse-Resistant Authenticated Encryption", RFC 8452, April 2019.
[ST13] Thomas Shrimpton, R. Seth Terashima, "A Modular Framework for
Building Variable-Input Length Tweakable Ciphers", ASIACRYPT 2013.
+```
diff --git a/proposals/309-optimistic-socks-in-tor.txt b/proposals/309-optimistic-socks-in-tor.txt
index d22a1a0..7f9272d 100644
--- a/proposals/309-optimistic-socks-in-tor.txt
+++ b/proposals/309-optimistic-socks-in-tor.txt
@@ -1,3 +1,4 @@
+```
Filename: 309-optimistic-socks-in-tor.txt
Title: Optimistic SOCKS Data
Author: Tom Ritter
@@ -76,3 +77,4 @@ Ticket: #5915
References:
[RFC1928] https://www.ietf.org/rfc/rfc1928.txt
+```
diff --git a/proposals/310-bandaid-on-guard-selection.txt b/proposals/310-bandaid-on-guard-selection.txt
index 2001994..94477a1 100644
--- a/proposals/310-bandaid-on-guard-selection.txt
+++ b/proposals/310-bandaid-on-guard-selection.txt
@@ -1,3 +1,4 @@
+```
Filename: 310-bandaid-on-guard-selection.txt
Title: Towards load-balancing in Prop 271
Author: Florentin Rochet, Aaron Johnson et al.
@@ -93,3 +94,4 @@ Status: Closed
force clients onto compromised guards, using relays that are part of the
history if they're still available (in sampled order), and by tracking its
size. This should maintain the initial goals of Prop 271.
+```
diff --git a/proposals/311-relay-ipv6-reachability.txt b/proposals/311-relay-ipv6-reachability.txt
index 11282c3..2ad7f46 100644
--- a/proposals/311-relay-ipv6-reachability.txt
+++ b/proposals/311-relay-ipv6-reachability.txt
@@ -1,3 +1,4 @@
+```
Filename: 311-relay-ipv6-reachability.txt
Title: Tor Relay IPv6 Reachability
Author: teor, Nick Mathewson
@@ -836,3 +837,4 @@ References:
[Tor Specification]:
https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt
+```
diff --git a/proposals/312-relay-auto-ipv6-addr.txt b/proposals/312-relay-auto-ipv6-addr.txt
index 712175e..a82e239 100644
--- a/proposals/312-relay-auto-ipv6-addr.txt
+++ b/proposals/312-relay-auto-ipv6-addr.txt
@@ -1,3 +1,4 @@
+```
Filename: 312-relay-auto-ipv6-addr.txt
Title: Tor Relay Automatic IPv6 Address Discovery
Author: teor, Nick Mathewson, s7r
@@ -1563,3 +1564,4 @@ References:
[Tor Supported Platforms]:
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/SupportedPlatforms#OSSupportlevels
+```
diff --git a/proposals/313-relay-ipv6-stats.txt b/proposals/313-relay-ipv6-stats.txt
index ae02a33..c637dad 100644
--- a/proposals/313-relay-ipv6-stats.txt
+++ b/proposals/313-relay-ipv6-stats.txt
@@ -1,3 +1,4 @@
+```
Filename: 313-relay-ipv6-stats.txt
Title: Tor Relay IPv6 Statistics
Author: teor, Karsten Loesing, Nick Mathewson
@@ -405,3 +406,4 @@ References:
[Tor Specification]:
https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt
+```
diff --git a/proposals/315-update-dir-required-fields.txt b/proposals/315-update-dir-required-fields.txt
index 1761a03..875d8a0 100644
--- a/proposals/315-update-dir-required-fields.txt
+++ b/proposals/315-update-dir-required-fields.txt
@@ -1,3 +1,4 @@
+```
Filename: 315-update-dir-required-fields.txt
Title: Updating the list of fields required in directory documents
Author: Nick Mathewson
@@ -129,3 +130,4 @@ Notes:
become required:
* pr
+```
diff --git a/proposals/317-secure-dns-name-resolution.txt b/proposals/317-secure-dns-name-resolution.txt
index ad2b7e6..55db19f 100644
--- a/proposals/317-secure-dns-name-resolution.txt
+++ b/proposals/317-secure-dns-name-resolution.txt
@@ -1,3 +1,4 @@
+```
Filename: 317-secure-dns-name-resolution.txt
Title: Improve security aspects of DNS name resolution
Author: Christian Hofer
@@ -218,3 +219,4 @@ Performance and scalability:
onion service in a performant manner it is always possible to fallback to
clearweb nameservers by changing a configuration setting.
+```
diff --git a/proposals/324-rtt-congestion-control.txt b/proposals/324-rtt-congestion-control.txt
index 4235be8..c601980 100644
--- a/proposals/324-rtt-congestion-control.txt
+++ b/proposals/324-rtt-congestion-control.txt
@@ -1,3 +1,4 @@
+```
Filename: 324-rtt-congestion-control.txt
Title: RTT-based Congestion Control for Tor
Author: Mike Perry
@@ -2313,3 +2314,4 @@ receive more data. It is sent to tell the sender to resume sending.
34. https://gitlab.torproject.org/tpo/core/tor/-/issues/40642
35. https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/49
+```
diff --git a/proposals/327-pow-over-intro.txt b/proposals/327-pow-over-intro.txt
index bcaf6f3..3abffc4 100644
--- a/proposals/327-pow-over-intro.txt
+++ b/proposals/327-pow-over-intro.txt
@@ -1,3 +1,4 @@
+```
Filename: 327-pow-over-intro.txt
Title: A First Take at PoW Over Introduction Circuits
Author: George Kadianakis, Mike Perry, David Goulet, tevador
@@ -1213,3 +1214,4 @@ A.2. References
[REF_TEVADOR_1]: https://lists.torproject.org/pipermail/tor-dev/2020-May/014268.html
[REF_TEVADOR_2]: https://lists.torproject.org/pipermail/tor-dev/2020-June/014358.html
[REF_TEVADOR_SIM]: https://github.com/mikeperry-tor/scratchpad/blob/master/tor-pow/effort_sim.py#L57
+```
diff --git a/proposals/329-traffic-splitting.txt b/proposals/329-traffic-splitting.txt
index 2a24f1f..e03d3aa 100644
--- a/proposals/329-traffic-splitting.txt
+++ b/proposals/329-traffic-splitting.txt
@@ -1,3 +1,4 @@
+```
Filename: 329-traffic-splitting.txt
Title: Overcoming Tor's Bottlenecks with Traffic Splitting
Author: David Goulet, Mike Perry
@@ -1051,3 +1052,4 @@ References:
[PROP308]
https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/proposals/308-counter-galois-onion.txt
+```
diff --git a/proposals/334-middle-only-flag.txt b/proposals/334-middle-only-flag.txt
index 823e927..c011b6c 100644
--- a/proposals/334-middle-only-flag.txt
+++ b/proposals/334-middle-only-flag.txt
@@ -1,3 +1,4 @@
+```
Filename: 334-middle-only-flag.txt
Title: A Directory Authority Flag To Mark Relays As Middle-only
Author: Neel Chauhan
@@ -114,3 +115,4 @@ Superseded-by: 335-middle-only-redux.md
[2] - https://lists.torproject.org/pipermail/tor-dev/2021-September/014627.html
[3] - https://lists.torproject.org/pipermail/tor-dev/2021-September/014630.html
+```
diff --git a/proposals/343-rend-caa.txt b/proposals/343-rend-caa.txt
index 0859690..1de1355 100644
--- a/proposals/343-rend-caa.txt
+++ b/proposals/343-rend-caa.txt
@@ -1,3 +1,4 @@
+```
Filename: 343-rend-caa.txt
Title: CAA Extensions for the Tor Rendezvous Specification
Author: Q Misell <q@as207960.net>
@@ -108,4 +109,4 @@ References:
[tor-rend-spec-v3]
The Tor Project, "Tor Rendezvous Specification - Version 3",
- <https://spec.torproject.org/rend-spec-v3>. \ No newline at end of file
+ <https://spec.torproject.org/rend-spec-v3>.```
diff --git a/proposals/344-protocol-info-leaks.txt b/proposals/344-protocol-info-leaks.txt
index abae2a7..f20ebca 100644
--- a/proposals/344-protocol-info-leaks.txt
+++ b/proposals/344-protocol-info-leaks.txt
@@ -1,3 +1,4 @@
+```
Filename: 344-protocol-info-leaks.txt
Title: Prioritizing Protocol Information Leaks in Tor
Author: Mike Perry
@@ -1184,3 +1185,4 @@ References:
[WFNETSIM]
https://petsymposium.org/2023/files/papers/issue4/popets-2023-0125.pdf
+```
diff --git a/proposals/proposal-status.txt b/proposals/proposal-status.txt
index 8a709bc..af522d1 100644
--- a/proposals/proposal-status.txt
+++ b/proposals/proposal-status.txt
@@ -1,3 +1,4 @@
+```
[Last updated 9 Sep 2015]
This is an update to the Tor proposal status overview. I last sent one
@@ -553,3 +554,4 @@ again to remind me!
this writing) and which parts of our current, more idiosyncratic,
uses of TLS can be removed.
+```