aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-07-12Merge branch 'missing_newline_again' into 'main'David Goulet
Document an onionbalance (?) behavior wrt missing newlines. See merge request tpo/core/torspec!152
2023-07-12Merge branch 'bug40805' into 'main'David Goulet
explain implementation details from #40805 fix See merge request tpo/core/torspec!151
2023-07-07Document an onionbalance (?) behavior wrt missing newlines.Nick Mathewson
C Tor tolerates this; Arti didn't (until arti!1389). Also see !109, where we noted a different occurrence of this problem.
2023-07-06explain implementation details from #40805 fixRoger Dingledine
2023-07-06number sections numericallyRoger Dingledine
2023-06-29Merge branch 'cert-rsaed25519-expiration-date' into 'main'Alexander Færøy
cert-spec: specify unit for EXPIRATION_DATE See merge request tpo/core/torspec!147
2023-06-28Merge branch 'bug40566' into 'main'David Goulet
Prop#324: Clarify that we use TOR_VEGAS and cwnd-RTT BDP estimation See merge request tpo/core/torspec!150
2023-06-27Prop#324: Clarify that we use TOR_VEGAS and cwnd-RTT BDP estimationMike Perry
Also remove the deprecated cc_bdp_alg param, and update the cc_alg param description.
2023-06-27Merge branch 'tor-gitlab/mr/145'David Goulet
2023-06-27Prop#324: Update congestion control paramsMike Perry
2023-06-26Merge branch 'issue210_01' into 'main'Alexander Færøy
bandwidth-file: Add ratios KeyValues in RelayLines Closes #210 See merge request tpo/core/torspec!149
2023-06-26bandwidth-file: Add ratios KeyValues in RelayLinesjuga0
and network bandwidth averages KeyValues in the Header. Closes #210
2023-06-26Merge branch 'cert-sign' into 'main'Nick Mathewson
cert-spec: improve signature formulation See merge request tpo/core/torspec!146
2023-06-25cert-spec: specify unit for EXPIRATION_DATEEmil Engler
The unit for the EXPIRATION_DATE field in the Rsa->Ed25519 cross-certificates is HOURS after the epoch. This however, is not mentioned in the specification so far, thereby fixing it.
2023-06-25cert-spec: improve signature formulationEmil Engler
I personally had a hard time implementing the signature validation in Ed25519 certificates, as I have misinterpreted it as signing only the first 64 bytes. I hope that this patch puts more clearance into the material.
2023-06-23Bug 40569: Document cc_sendme_inc changesMike Perry
2023-06-21Merge branch 'pseudocode-digest' into 'main'David Goulet
tor-spec: provide pseudocode for digest check Closes #205 See merge request tpo/core/torspec!143
2023-06-21tor-spec: provide pseudocode for digest checkEmil Engler
This commit implements a pseudocode example for the digest in both: encryption and decryption cases. The pseudocode itself is a combination of Python code and the Rust slice type. Fixes #205
2023-06-20Merge branch 'bug40808' into 'main'David Goulet
Change KISTSchedRunInterval range and default; add KISTSchedRunIntervalClient See merge request tpo/core/torspec!144
2023-06-20Change KISTSchedRunInterval range and default; add KISTSchedRunIntervalClientMike Perry
2023-06-20Merge branch 'tor-gitlab/mr/138'David Goulet
2023-06-20rend-spec: Document directory behaviour for handling descriptor uploads.Gabriela Moldovan
This adds a paragraph describing the checks hidden service directories are supposed to perform before accepting a descriptor upload. Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-06-15Merge branch 'padding-zero-time-fields' into 'main'Alexander Færøy
Document channel padding stop timeout field values See merge request tpo/core/torspec!142
2023-06-15Merge branch 'mac_key_len' into 'main'Alexander Færøy
rend-spec: document MAC_KEY_LEN=32. See merge request tpo/core/torspec!141
2023-06-15Merge branch 'ticket189' into 'main'Alexander Færøy
rend-spec: Clarify that "exactly the same contents" means "exactly". Closes #189 See merge request tpo/core/torspec!120
2023-06-15Document channel padding stop timeout field valuesIan Jackson
I UTSL C-tor and it memsets the thing to zero and then fails to write these timeout fields. We should recommend that other implementations do the same.
2023-06-14rend-spec: document MAC_KEY_LEN=32.Nick Mathewson
We use this constant in various places throughout the document but we never say what it is.
2023-06-13prop340: Change the ntorv3 data formatDavid Goulet
Reason behind this is to simplify the negotiation of this feature. A ntorv3 handshake is in the fast path of circuit creation and minimizing any parsing and on the wire binary size is a win. Furthermore, this prevents us to go into a complex code path of version negotiation where either side can be tricked into using another older version. We also do NOT expect to ever end up in a situation where one side sends packed cells but not the other. And so, this change simplifies everything and reflects the approach we took with congestion control as well. Future change of packed/fragmented relay cells will be possible through a new ntorv3 extension and a Relay protover. Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-06-13prop340: Tweak how we handle optional stream IDsDavid Goulet
Introduce an optional header called the "message routing header" which contains a `stream_id` and is only present for commands that do require it. We also specify that if an unrecognized command is encountered, the circuit MUST be destroyed immediately. Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-06-13Merge branch 'tor-gitlab/mr/139'David Goulet
2023-06-13Describe the behavior of our HSv3 crypto layers.Nick Mathewson
These layers use SHA3 instead of SHA1 and AES256 instead of AES128. Their SENDME tags are made with SHA3 too, but they are truncated to 20 bytes. Closes #204.
2023-06-07Merge remote-tracking branch 'mikeperry/pow-edits'Alexander Færøy
2023-06-06update 343-rend-caa to include guidance on the non mandatory state of CAAQ
2023-05-31Merge branch 'relay_early' into 'main'Nick Mathewson
tor-spec: inform about RELAY_EARLY in EXTEND(2) See merge request tpo/core/torspec!135
2023-05-30Prop 327: Clarify that the starting difficulty is on the client side.Mike Perry
Also clarify that the main reason we may need to tune it is because of on-and-off attack patterns of large size.
2023-05-25Prop327: Remove notions of default difficulty and tuningMike Perry
Also link to the updated sim, and remove old sections of Tor Browser UX from before we had auto-difficulty.
2023-05-25Prop327: Onion service rate limiting is not congestion control.Mike Perry
It is just rate limiting. We could apply real Prop324 congestion control to the intro circuit, but so far we have not done so.
2023-05-24Merge branch 'tor-gitlab/mr/125'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/132'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/133'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/134'David Goulet
2023-05-24Describe identity-binding defense for intro-point POWNick Mathewson
2023-05-24proposal 327: Editing pass to align the spec with our implementationMicah Elizabeth Scott
This makes numerous small changes, but also adds some larger blocks of explanation that are written based on the finalized design. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-23Add info that onion v3 URLs use SHA3-256zocker1999net
2023-05-23tor-spec: inform about RELAY_EARLY in EXTEND(2)Emil Engler
EXTEND/EXTEND2 cells MUST only be send through RELAY_EARLY cells, as demanded by section 5.6. This commit informs about this in the section of the EXTEND/EXTEND2 cells, as the current formulation contradicts the one in 5.6 to some degree.
2023-05-23Merge remote-tracking branch 'gitlab/mr/129'Alexander Færøy
2023-05-23Merge remote-tracking branch 'gitlab/mr/128'Alexander Færøy
2023-05-23Merge remote-tracking branch 'gitlab/mr/127'Alexander Færøy
2023-05-18Prop329: Document Snowflake exemption to Guard restriction.Mike Perry
2023-05-18rend-spec: Add a set of test vectors for hs-ntor.Nick Mathewson
These were generated using a patched Tor with extra logging info. I've used them to validate (and find bugs in) the arti hs-ntor implementation. (See arti!1189.)