aboutsummaryrefslogtreecommitdiff
path: root/proposals
AgeCommit message (Collapse)Author
2023-10-12Mark proposal 345 as closed.Nick Mathewson
2023-10-12gitlab ci for a basic testNick Mathewson
This test just tries to make sure reindex has been run, and that mdbook passes.
2023-10-12Terminate 000-index.txt correctly.Nick Mathewson
2023-10-12Merge INTRO and README; fix more titles.Nick Mathewson
2023-10-12Wrap text proposals in backticks.Nick Mathewson
2023-10-10Adjust SUMMARY template.Nick Mathewson
2023-10-10Change "README" to "BY_STATUS" for symmetry.Nick Mathewson
2023-10-10hack reindex.py to generate a SUMMARY.md file for mdbook.Nick Mathewson
2023-10-03Merge branch 'close_prop301' into 'main'Nick Mathewson
Close prop-301, describing the new consensus method 34 in dir-spec See merge request tpo/core/torspec!160
2023-10-03Add proposal 345-specs-in-mdbook.mdNick Mathewson
2023-10-03Mark proposal 332 as Closed.Nick Mathewson
2023-10-02Prop265: Add two research/proposal linksMike Perry
2023-09-26Run re-index scriptMike Perry
2023-09-26Prop#291: FinishedMike Perry
2023-09-26Prop#329: FinishedMike Perry
2023-09-26Prop324: Mark Finished and update sendme_inc proseMike Perry
2023-09-26Prop327: Finished (implemented in C-Tor)Mike Perry
2023-09-26Prop285: Target arti-dirauthMike Perry
2023-09-26Prop282: Mark for arti-dirauthMike Perry
2023-09-26Prop265 Status UpdateMike Perry
2023-08-25Merge branch 'close_guard_proposals' into 'main'David Goulet
Merge proposals 336 and 337 into guard-spec. See merge request tpo/core/torspec!165
2023-08-25Merge 337-simpler-guard-usability.md into guard-specNick Mathewson
This proposal gives an alternative formulation of the usability rules of guard-spec, and the relationship between guard status and circuit status.
2023-08-24Prop 327, Fix mistaken mention of floating pointMicah Elizabeth Scott
This is a mistake I made earlier. I mentioned floating point performance when describing HashX, there's no floating point in HashX. HashX is based on SuperscalarHash which is a simplified dataset-bootstrapping environment within RandomX. HashX and SuperscalarHash are integer-only, only the full RandomX algorithm used floating point.
2023-08-24Merge proposal 336-randomize-guard-retries.mdNick Mathewson
2023-08-22Add prop344 to index.Nick Mathewson
2023-08-22Mark Prop #344 Open.Mike Perry
2023-08-22Proposal #344: Prioritizing Protocol Information Leaks in TorMike Perry
2023-08-15Merge branch 'accept_prop301' into 'main'David Goulet
Mark proposal 301 (don't vote on package fingerprints) as accepted. See merge request tpo/core/torspec!159
2023-08-15Close prop-301, describing the new consensus method 34 in dir-specNick Mathewson
See tor!743 for the implementation.
2023-08-15Mark proposal 301 as accepted.Nick Mathewson
2023-08-15Run reindex script.Nick Mathewson
2023-08-15mark old counter galois onion proposal as supersededNick Mathewson
2023-08-15Mark proposals 098 and 099 as obsolete.Nick Mathewson
2023-07-27prop296: Close it as it is implementedDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-07-19Prop 327: fix minor typosSilvio Rhatto
2023-07-06explain implementation details from #40805 fixRoger Dingledine
2023-07-06number sections numericallyRoger Dingledine
2023-06-27Prop#324: Clarify that we use TOR_VEGAS and cwnd-RTT BDP estimationMike Perry
Also remove the deprecated cc_bdp_alg param, and update the cc_alg param description.
2023-06-27Prop#324: Update congestion control paramsMike Perry
2023-06-23Bug 40569: Document cc_sendme_inc changesMike Perry
2023-06-13prop340: Change the ntorv3 data formatDavid Goulet
Reason behind this is to simplify the negotiation of this feature. A ntorv3 handshake is in the fast path of circuit creation and minimizing any parsing and on the wire binary size is a win. Furthermore, this prevents us to go into a complex code path of version negotiation where either side can be tricked into using another older version. We also do NOT expect to ever end up in a situation where one side sends packed cells but not the other. And so, this change simplifies everything and reflects the approach we took with congestion control as well. Future change of packed/fragmented relay cells will be possible through a new ntorv3 extension and a Relay protover. Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-06-13prop340: Tweak how we handle optional stream IDsDavid Goulet
Introduce an optional header called the "message routing header" which contains a `stream_id` and is only present for commands that do require it. We also specify that if an unrecognized command is encountered, the circuit MUST be destroyed immediately. Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-06-13Merge branch 'tor-gitlab/mr/139'David Goulet
2023-06-06update 343-rend-caa to include guidance on the non mandatory state of CAAQ
2023-05-30Prop 327: Clarify that the starting difficulty is on the client side.Mike Perry
Also clarify that the main reason we may need to tune it is because of on-and-off attack patterns of large size.
2023-05-25Prop327: Remove notions of default difficulty and tuningMike Perry
Also link to the updated sim, and remove old sections of Tor Browser UX from before we had auto-difficulty.
2023-05-25Prop327: Onion service rate limiting is not congestion control.Mike Perry
It is just rate limiting. We could apply real Prop324 congestion control to the intro circuit, but so far we have not done so.
2023-05-24Merge branch 'tor-gitlab/mr/132'David Goulet
2023-05-24Describe identity-binding defense for intro-point POWNick Mathewson
2023-05-24proposal 327: Editing pass to align the spec with our implementationMicah Elizabeth Scott
This makes numerous small changes, but also adds some larger blocks of explanation that are written based on the finalized design. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>