aboutsummaryrefslogtreecommitdiff
path: root/proposals
AgeCommit message (Collapse)Author
2022-05-09prop339: Rename relay command and minor fixesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04prop339: Fix couple typosDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-04Draft proposal for UDP over Tor.Nick Mathewson
This has already been discussed somewhat on a pad; now we can move to an MR and fill in the missing parts.
2022-04-29Update the status of several proposalsNick Mathewson
(Based on network team discussion, 28 April 2022)
2022-04-22prop328: Update proposal to reflect implementationDavid Goulet
Closes #113 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-24Merge remote-tracking branch 'nickm/prop275'Alexander Færøy
2022-03-16DNS timeouts are not causing overload anymoreGeorg Koppen
Closes: #81.
2022-03-14Proposal 338: Use an 8-byte timestamp in NETINFO cellsNick Mathewson
2022-02-24Merge remote-tracking branch 'tor-gitlab/mr/60'Nick Mathewson
2022-02-22Prop 324: Updates for Negotiation and Simulation TestingMike Perry
Changes: - Rework exit negotiation logic a bit - Specify using ntorv3 with extension fields for negotiation - Clients only request congestion control; exits and services control sendme_inc - Rework onion service negotiation for descriptor-controlled FlowCtrl protover and sendme_inc value - Add bounds checks on sendme_inc for clients - Update parameter values based on Shadow results - Improvements to TOR_VEGAS algorithm based on simulation testing - Additional consensus parameters for RTT N-EWMA smoothing and TOR_VEGAS queue use caps - Clarify N_EWMA smoothing, and relocate it to its own sub-section. - TOR_VEGAS now defaults to CWND/RTT BDP estimator - Minor TOR_VEGAS alg bugfixes - Add a 'delta' parameter to TOR_VEGAS for steady-state backoff - Consensus param update notes and param range fixes. - Add glossary of common congestion control acronyms - Misc clarifications
2022-02-17Be explicit about EXT_FIELD_LEN=0Nick Mathewson
2022-02-17ntor3, rend3: clarify extension field defaults.Nick Mathewson
These patch changes describe new default behaviors for extension field lists, as appear in ntor3 and in many places throughout the ntor3 protocol. In general: * Unrecognized extensions MUST be ignored. Additionally, all the following rules apply _unless otherwise stated in the documentation for an extension. * Extensions are sent in sorted order. * Extensions should only be sent once in a message * If you receive multiple copies of an extension, only the first one counts. This comes out of discussions on tor!525.
2021-12-08Fold prop 335-middle-only-redux.md into the specs.Nick Mathewson
Also, mark it closed.
2021-11-22Update status for the two middle-only proposals.Nick Mathewson
334 is superseded by 335, which is Finished but not Closed.
2021-11-22Update proposal 321 based on discussions from @armaNick Mathewson
See tor#40134
2021-11-22Mark proposal 315 as implemented in 0.4.5.1-alpha.Nick Mathewson
2021-11-22Update proposal index based on recent reclassification.Nick Mathewson
2021-11-22Mark proposal 273 (exit pinning) as Reserve.Nick Mathewson
There's not been much progress here, and I don't think we'll come back to it any time soon.
2021-11-22Mark proposal 160 as closed.Nick Mathewson
It was documented back in b4d580ebbd65fde4d69fa4f9d2c75c405e1a12a1.
2021-11-22Mark 232 (TOR_PT_PROXY) as Closed.Nick Mathewson
George Kadianakis documented this back in 4dcd7e94f17c072.
2021-11-22Mark proposal 310 (guard bandaid) as Closed.Nick Mathewson
This behavior is now documented in guard-spec, since around 91ea21e3a36d5.
2021-11-22Mark proposal 282 as "accepted", not "finished".Nick Mathewson
Nobody votes on this flag any more, but we _didn't_ actually remove support in the code for voting on it. I incorrectly marked it Finished because its ticket was closed, but it doesn't seem to be actually implemented in Tor.
2021-11-22Mark proposal 301 as "open", not "finished".Nick Mathewson
I incorrectly marked it Finished because its ticket was closed, but it doesn't seem to be actually implemented in Tor.
2021-11-22Mark proposal 332-ntor-v3 as acceptedNick Mathewson
2021-11-22Move proposal 288 (privcount-shamir) to reserve.Nick Mathewson
2021-11-22Fold 314 (markdown) into 001 (process).Nick Mathewson
2021-11-22Mark proposal 242-better-families superseded by 321-happy-familiesNick Mathewson
2021-11-12Mark proposal 333 as Finished.Nick Mathewson
2021-11-09Mark proposal 275 as closed and fold it into dir-spec.Nick Mathewson
2021-11-01prop328: Fix the usage of extra-info versus server descriptorDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-01prop328: Close after merging it to dir-spec.txtDavid Goulet
Closes #70 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-01prop328: Update it to reflect implementationDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-01prop328: Mark if finished and update it to latestDavid Goulet
Implemented but not yet merged into main spec. Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-25Update proposal index.Nick Mathewson
2021-10-22Add proposals 336 and 337.Nick Mathewson
2021-10-17clarify prop335 based on tor-dev feedback from nusenuNick Mathewson
2021-10-08Proposal 335: alternative implementation for MiddleOnly.Nick Mathewson
2021-10-04Update Prop#324 for Flow Control improvementsMike Perry
- Specify rate advertisement of edge drain rate in XON, to minimize chatter - Limit the frequency of XON/XOFF with consensus parsams - Describe dropmark defenses using XON/XOFF limits - Describe how half-closed edge connections are handled with flow control - Describe flow control consensus parameters - Describe flow control shadow experiments and live comparison - Create and describe additional consensus parameters that will influence congestion control performance and memory usage - Clarify performance metrics involved in experiments - Remove some stale XXXs and TODOs
2021-09-30proposals: Run reindex.pyDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30Merge branch 'tor-gitlab/mr/46'David Goulet
2021-09-29simple grammar issues in prop321Roger Dingledine
2021-09-17Add Prop334: A Directory Authority Flag To Mark Relays As Middle-onlyNeel Chauhan
2021-09-13Merge remote-tracking branch 'tor-gitlab/mr/45'Nick Mathewson
2021-09-12add ed25519-master-pubkey.txt descriptionnusenu
2021-09-08fixup! prop324: Add section for onion service handlingDavid Goulet
2021-09-08prop324: Add section for onion service handlingDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-29Merge remote-tracking branch 'tor-gitlab/main'Nick Mathewson
2021-08-26Prop332: add test vectors.Nick Mathewson
2021-08-26Prop332: Minor edits.Nick Mathewson
Document that MAC_KEY_LEN exists, and is 32. Switch from SHAKE128 to SHAKE256: the performance difference is negligible, and that's what we use elsewhere in Tor.
2021-07-30Merge branch 'tor-gitlab/mr/38'David Goulet