aboutsummaryrefslogtreecommitdiff
path: root/tor-spec.txt
AgeCommit message (Collapse)Author
2019-12-10convert text blocks into widely compatible "blockquote" syntaxHans-Christoph Steiner
This only adds newline characters to make the existing text blocks act like "blockquote" or "code block" syntax in Markdown, asciidoc, and others. This was accomplished by manually reviewing the output of this script: ```bash for f in *.txt; do cat $f | python -c "import sys,re;print(re.sub(r'(\n {0,3}[^ \n][^\n]*\n)( {4,}[^\n]*)', r'\1\n\2', sys.stdin.read()))" > ${f}.tmp mv ${f}.tmp $f done ```
2019-12-02Merge remote-tracking branch 'dgoulet/ticket32617_01'George Kadianakis
2019-11-26rend-spec-v3.txt: Merge prop305 in itDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-26fix erroneous header numbering punctuationHans-Christoph Steiner
The clear standard is trailing "." after each numeric section. This fixes the small handful of outliers. This makes it easy to convert these headers to common markup formats, for example: http://hyperpolyglot.org/lightweight-markup
2019-08-190.4.1.5 is scheduled to be a stable release.Nick Mathewson
2019-08-19tor-spec: Clarify protover Padding=1 and Padding=2.George Kadianakis
2019-05-31tor-spec: Add authenticated SENDMEsDavid Goulet
This merges proposal 289 into tor-spec.txt. Most of the circuit-level flow control section has been rewritten to be clearer and better detail version 0 and 1. Closes #30365 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-01-15Merge remote-tracking branch 'asn-github/bug28142'Nick Mathewson
2018-12-21my next surfer band name will be the protocoolsRoger Dingledine
2018-12-20Merge remote-tracking branch 'tor-github/pr/46'Nick Mathewson
2018-12-11Mark proposal 297-safer-protocol-shutdowns.txt as implemented (#27735)Nick Mathewson
2018-12-06Update syntax that describes NETINFO cellrl1987
2018-12-06Specify protover support for circuit-level padding.George Kadianakis
2018-11-29Reword address format definition in section 4.5rl1987
Let's refrain from mentioning section 6.4 in here, as the format is not exactly the same - not all address type field values from section 6.4 make sense in NETINFO cell and NETINFO cell does not have a TTL value at the end of each address. It's a little confusing to suggest that there is a reuse of wire format fragment between RELAY_RESOLVED and NETINFO cells.
2018-08-08Merge remote-tracking branch 'teor/ticket26885'Nick Mathewson
2018-07-30Clarify some places where we meant RELAY to include RELAY_EARLY.Nick Mathewson
2018-07-30Merge branch '26228-padding-bytes_squashed'Nick Mathewson
2018-07-30tor-spec: Prop#289: RELAY cell padding should be randomisedteor
Updates tor-spec for 26871
2018-07-30tor-spec: Clarify padding bytes in VPADDING, PADDING, and DROP cellsteor
Closes 26870.
2018-07-26tor-spec: Generalise "exit" to "end" where appropriateteor
Closes #26885.
2018-07-26tor-spec: Generalise the first-hop ban to rend points and exit streamsteor
Part of 26885.
2018-07-20Clarify all-zeroes relay fingerprint behaviorTaylor Yu
The all-zeroes special case for EXTEND/EXTEND2 cells is for relay fingerprints/public keys, not cell crypto digests. Closes ticket 26893.
2018-07-20Say CREATE/CREATE2, etc. where neededTaylor Yu
Not all of the text describing CREATE, CREATED, EXTEND, or EXTENDED cells was updated when the "2"-suffixed versions were added. Closes ticket 26894.
2018-07-20Merge branch '26860-decryption-order-squashed'Nick Mathewson
2018-07-20tor-spec: circIDs are no longer chosen based on nicknamesteor
And perhaps they never were?
2018-07-20tor-spec: fix some section numbersteor
2018-07-20tor-spec: Specify how EXTEND2 cells are turned into CREATE2 cellsteor
Also generalised the EXTENDED to CREATED section so it covers EXTENDED2 to CREATED2. Closes 26859.
2018-07-19tor-spec: Rewrite the Routing Relay Cells sectionteor
The section now consists of: * forward encryption at the client * forward decryption at ORs * backward encryption at the end (exit) * backward decryption at the client Part of 26860.
2018-07-19tor-spec: Fix recognized error, and explain why the field existsteor
Closes 26872.
2018-07-18Update spec with SHOULD/MUST behavior for padding bytesDave Rolek
In doing so, specify a general behavior for padding bytes in Section 3 and cross-reference other locations to this, to aid in future consistency. Also clarify a few vague parts of the prior wording. Fixes #26860.
2018-07-18Update spec to match correct decryption orderDave Rolek
Fixes #26860.
2018-03-27Fix typo in tor-spec.txtTaylor Yu
Section 5.1.2 erroneously suggested that a client might send an EXTENDED2 cell, which was probably a typo. Also change "a" to "an".
2018-02-13Small tweaks to clarify recognized even moreNick Mathewson
2018-02-08Change clause about recognized to 'may'Damian Johnson
Good point from Roger and Tim on... https://trac.torproject.org/projects/tor/ticket/25171
2018-02-07Clarify what the RELAY cell's 'recognized' field is forDamian Johnson
Our tor-spec left me pretty mystified what the 'recognized' field actually was. It discussed what to do when it was zero, but not what the field *was* or what non-zero meant. Thankfully Roger filled me in over tasty, tasty pizza.
2018-01-12Merge commit '8692de910d'Nick Mathewson
2017-09-20Document Ed25519 link authentication and EXTEND formats.Nick Mathewson
2017-09-20Remove a comment about unimplemented feature in 0.2.0.23-rcNick Mathewson
2017-09-20VERSIONS cells sent after the initial VERSIONS cell are droppedteor
Resolves 22931.
2017-09-20When VPADDING cells are sent early, specify their CIRC_ID_LENteor
Resolves 22929.
2017-09-19Clarify which ciphers we are talking about in tor-spec 0.3.Nick Mathewson
Make sure we mention all the ciphers we use, and use the phrase "unless otherwise specified" liberally to make sure that people don't think that we're still RSA1024 all over. Also rename the hybrid encryption thing to "legacy hybrid encryption", and put it in its own section. Closes ticket 22722.
2017-09-19clarify that RELAY_SENDME cells are emptyNick Mathewson
2017-09-19Document exact contents of RELAY_RESOLVED cellsNick Mathewson
We had been vague about what the Value fields here were. Also, document that addresses in NETINFO don't have TTLs. Closes ticket 22937.
2017-09-19Correct our description of circID MSB logicNick Mathewson
In protocol <= 3 we allowed OPs to set the circID msb however they wanted. We don't do that any more in >= 4. Closes ticket 22882.
2017-09-07Describe actual use of NETINFO fieldsNick Mathewson
Instead of saying the clock skew and "your address" fields are unused, describe the dangers of using them as unconditionally trusted.
2017-09-07Mention link protocol 5 in section 9.1Nick Mathewson
Closes ticket 22918.
2017-09-06Correct description of which cells are allowed during the handshakeNick Mathewson
We said that PADDING was allowed, but it wasn't. Bug 22934.
2017-08-2314312: Clarify the status of extra bytes in RELAY_END payload.Nick Mathewson
2017-08-21Clarify response to RELAY_BEGIN_DIR; fixes 23276Nick Mathewson
2017-07-25may->must, and split a sentence into twoNick Mathewson
The original was incorrect to say "You may do A if B, C otherwise." but it seems less clear to say "You MUST do A if B, C otherwise." than it is to say "If A, you MUST B. If not A, you MUST C." Closes ticket 22951