aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-07-07Document channel padding stop timeout field valuespadding-zero-time-fieldsIan Jackson
I UTSL C-tor and it memsets the thing to zero and then fails to write these timeout fields. We should recommend that other implementations do the same.
2022-06-29prop327: Change cell extension type valueDavid Goulet
Congestion control is 0x01 at this moment. Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-29prop327: Missing field due to typoDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-10Merge remote-tracking branch 'tor-gitlab/mr/72'Nick Mathewson
2022-06-06proof-reading on prop 266Roger Dingledine
2022-06-06fix a trivial typoRoger Dingledine
2022-06-01add info on where to find hashed bridge fingerprinnusenu
as suggested by meskio make clear that the ed25519 file is not relevant for bridges
2022-05-31Reindex for prop340.Nick Mathewson
2022-05-31Merge branch 'packed_and_fragmented'Nick Mathewson
2022-05-31Updates based on feedback from dgouletNick Mathewson
2022-05-31prop339: Remove header from CONNECTED_UDP cellDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-31tor-spec: Reserve relay command and protover for prop339David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-31prop339: Move to Accepted stateDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-29add hashed-bridge-rsa-fingerprint.txt nusenu
since contactinfo for bridges is also public now, we add support for bridges
2022-05-27Merge branch 'netflow_clarification'Nick Mathewson
2022-05-27Describe a potential (rare) distringuisher in idle circuits.Mike Perry
In the rare event that a user resumes activity after a period between the "reduced connection timeout" and the full value, and that user has not set reduced padding, this is a distinguisher on circuits that have been held idle and open for that long.
2022-05-27Padding spec: describe behavior with queues.Nick Mathewson
(Briefly: "Sent" is sometimes unobservable, so we should use "queued" as a reasonable proxy.)
2022-05-27Try to document the many uses of nf_conntimeout_clients.Nick Mathewson
(This is largely determined by reverse-engineering tor's current behavior.)
2022-05-27Clarify who sends padding negotiation and when.Nick Mathewson
Also explain what should happen if those assumptions are violated.
2022-05-27netflow padding: clarify directionality and padding behavior.Nick Mathewson
The main points here are: * We assume that flow measurements are unidirectional, so each side must make sure to send traffic. * So we restart our timer when sending, only. * We restart the timer whether we're sending real traffic or padding traffic. * The logic for `max(X,X)` timing applies even though we aren't using a bidirectional trigger for timing.
2022-05-18New proposal for packed and fragmented cells.Nick Mathewson
2022-05-16prop275: Merged in 048 nowDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-09prop339: Rename relay command and minor fixesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-05attic: Move onion service v2 spec to atticDavid Goulet
Deprecated. Not supported by the network anymore. Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-05tor-spec: Add relay command values of flow control cellsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04tor-spec: Add FlowCtrl=2 for congestion controlDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04tor-spec: Add Relay=4, ntorv3 handshake supportDavid Goulet
See proposal 332 for more details. Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04prop339: Fix couple typosDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04Draft proposal for UDP over Tor.Nick Mathewson
This has already been discussed somewhat on a pad; now we can move to an MR and fill in the missing parts.
2022-04-29Update the status of several proposalsNick Mathewson
(Based on network team discussion, 28 April 2022)
2022-04-26fix typo in ADD_ONION V3Key definition (ed25519 -> x25519)Richard Pospesel
resolves #116
2022-04-22prop328: Update proposal to reflect implementationDavid Goulet
Closes #113 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-24Merge remote-tracking branch 'nickm/prop275'Alexander Færøy
2022-03-16DNS timeouts are not causing overload anymoreGeorg Koppen
Closes: #81.
2022-03-16param: Changes from nickm's suggestionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15param: Exit DNS parameters from tor#40312David Goulet
Related to #40312 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15param: Merge duplicate sectionsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15Merge branch 'tor-gitlab/mr/65'David Goulet
2022-03-15param: Add overload onionskin ntor parametersDavid Goulet
Related to https://gitlab.torproject.org/tpo/core/tor/-/issues/40560 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-14Merge branch 'tor-gitlab/mr/66'David Goulet
2022-03-14Merge branch 'tor-gitlab/mr/64'David Goulet
2022-03-14Add XON/XOFF status fields to STREAM event.Mike Perry
2022-03-14Add congestion control fields to CIRC_BWMike Perry
2022-03-14Proposal 338: Use an 8-byte timestamp in NETINFO cellsNick Mathewson
2022-02-28Remove comma from STATUS format specification.David Fifield
2022-02-24Merge remote-tracking branch 'tor-gitlab/mr/60'Nick Mathewson
2022-02-22Prop 324: Updates for Negotiation and Simulation TestingMike Perry
Changes: - Rework exit negotiation logic a bit - Specify using ntorv3 with extension fields for negotiation - Clients only request congestion control; exits and services control sendme_inc - Rework onion service negotiation for descriptor-controlled FlowCtrl protover and sendme_inc value - Add bounds checks on sendme_inc for clients - Update parameter values based on Shadow results - Improvements to TOR_VEGAS algorithm based on simulation testing - Additional consensus parameters for RTT N-EWMA smoothing and TOR_VEGAS queue use caps - Clarify N_EWMA smoothing, and relocate it to its own sub-section. - TOR_VEGAS now defaults to CWND/RTT BDP estimator - Minor TOR_VEGAS alg bugfixes - Add a 'delta' parameter to TOR_VEGAS for steady-state backoff - Consensus param update notes and param range fixes. - Add glossary of common congestion control acronyms - Misc clarifications
2022-02-17Be explicit about EXT_FIELD_LEN=0Nick Mathewson
2022-02-17ntor3, rend3: clarify extension field defaults.Nick Mathewson
These patch changes describe new default behaviors for extension field lists, as appear in ntor3 and in many places throughout the ntor3 protocol. In general: * Unrecognized extensions MUST be ignored. Additionally, all the following rules apply _unless otherwise stated in the documentation for an extension. * Extensions are sent in sorted order. * Extensions should only be sent once in a message * If you receive multiple copies of an extension, only the first one counts. This comes out of discussions on tor!525.
2022-01-19Merge branch 'tor-gitlab/mr/56'David Goulet