aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--proposals/340-packed-and-fragmented.md19
-rw-r--r--spec/param-spec.md37
2 files changed, 54 insertions, 2 deletions
diff --git a/proposals/340-packed-and-fragmented.md b/proposals/340-packed-and-fragmented.md
index f760e0e..cd98cfd 100644
--- a/proposals/340-packed-and-fragmented.md
+++ b/proposals/340-packed-and-fragmented.md
@@ -269,8 +269,23 @@ conflux bundle.
### An exception for `DATA`.
-Data messages may not be fragmented. (There is never a reason to do
-this.)
+Data messages may not be fragmented. When packing data into a cell containing
+other messages is desired, the application can instead construct a DATA message
+of an appropriate size to fit into the remaining space.
+
+While relaxing this could simplify the implementation of opportunistic packing
+somewhat (by allowing code that constructs `DATA` messages not to have to know
+about packing or fragmentation), doing so would have several downsides.
+
+First, on the receiver side a naive implementation that receives the first cell
+of a fragmented `DATA` message would not be able to pass the data in that
+fragment on to the application until the remaining cells of that message are
+received. An optimized implementation might choose to do so, but that
+complexity seems worse than the complexity we'd be avoiding by allowing `DATA`
+fragmentation in the first place.
+
+Second, as with any sort of flexibility permitted to implementations, allowing
+flexibility here adds opportunities for fingerprinting and covert channels.
### Extending message-length maxima
diff --git a/spec/param-spec.md b/spec/param-spec.md
index cd0af5e..daa70f9 100644
--- a/spec/param-spec.md
+++ b/spec/param-spec.md
@@ -340,6 +340,43 @@ First appeared: 0.4.2.1-alpha.
<a id="param-spec.txt-9"></a>
+## Vanguard parameters {#vanguards}
+
+```text
+ "vanguards-enabled" -- The type of vanguards to use by default when
+ building onion service circuits
+ 0: No vanguards.
+ 1: Lite vanguards.
+ 2: Full vanguards.
+```
+
+```text
+ "vanguards-hs-service" -- If higher than vanguards-enabled, and we are
+ running an onion service, we use this level for all our onion service
+ circuits
+ 0: No vanguards.
+ 1: Lite vanguards.
+ 2: Full vanguards.
+```
+
+"guard-hs-l2-number" -- The number of guards in the L2 guardset
+Min: 1. Max: INT32_MAX. Default: 4
+
+"guard-hs-l2-lifetime-min" -- The minimum lifetime of L2 guards
+Min: 1. Max: INT32_MAX. Default: 86400 (1 day)
+
+"guard-hs-l2-lifetime-max" -- The maximum lifetime of L2 guards
+Min: 1. Max: INT32_MAX. Default: 1036800 (12 days)
+
+"guard-hs-l3-number" -- The number of guards in the L3 guardset
+Min: 1. Max: INT32_MAX. Default: 8
+
+"guard-hs-l3-lifetime-min" -- The minimum lifetime of L3 guards
+Min: 1. Max: INT32_MAX. Default: 3600 (1 hour)
+
+"guard-hs-l3-lifetime-max" -- The maximum lifetime of L3 guards
+Min: 1. Max: INT32_MAX. Default: 172800 (48 hours)
+
## Denial-of-service parameters {#dos}
Denial of Service mitigation parameters. Introduced in 0.3.3.2-alpha: