From 1eaaf7f4ac887ea748375920e27d664c7401f2eb Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Thu, 12 Oct 2023 12:27:59 -0400 Subject: Wrap text proposals in backticks. --- proposals/000-index.txt | 2 ++ proposals/001-process.txt | 2 ++ proposals/098-todo.txt | 2 ++ proposals/099-misc.txt | 2 ++ proposals/100-tor-spec-udp.txt | 2 ++ proposals/101-dir-voting.txt | 2 ++ proposals/102-drop-opt.txt | 2 ++ proposals/103-multilevel-keys.txt | 2 ++ proposals/104-short-descriptors.txt | 2 ++ proposals/105-handshake-revision.txt | 2 ++ proposals/106-less-tls-constraint.txt | 2 ++ proposals/107-uptime-sanity-checking.txt | 2 ++ proposals/108-mtbf-based-stability.txt | 2 ++ proposals/109-no-sharing-ips.txt | 2 ++ proposals/110-avoid-infinite-circuits.txt | 2 ++ proposals/111-local-traffic-priority.txt | 2 ++ proposals/112-bring-back-pathlencoinweight.txt | 2 ++ proposals/113-fast-authority-interface.txt | 2 ++ proposals/114-distributed-storage.txt | 2 ++ proposals/115-two-hop-paths.txt | 2 ++ proposals/116-two-hop-paths-from-guard.txt | 2 ++ proposals/117-ipv6-exits.txt | 2 ++ proposals/118-multiple-orports.txt | 2 ++ proposals/119-controlport-auth.txt | 2 ++ proposals/120-shutdown-descriptors.txt | 2 ++ proposals/121-hidden-service-authentication.txt | 2 ++ proposals/122-unnamed-flag.txt | 2 ++ proposals/123-autonaming.txt | 2 ++ proposals/124-tls-certificates.txt | 2 ++ proposals/125-bridges.txt | 2 ++ proposals/126-geoip-reporting.txt | 2 ++ proposals/127-dirport-mirrors-downloads.txt | 2 ++ proposals/128-bridge-families.txt | 2 ++ proposals/129-reject-plaintext-ports.txt | 2 ++ proposals/130-v2-conn-protocol.txt | 2 ++ proposals/131-verify-tor-usage.txt | 2 ++ proposals/132-browser-check-tor-service.txt | 2 ++ proposals/133-unreachable-ors.txt | 2 ++ proposals/134-robust-voting.txt | 2 ++ proposals/135-private-tor-networks.txt | 2 ++ proposals/136-legacy-keys.txt | 2 ++ proposals/137-bootstrap-phases.txt | 2 ++ proposals/138-remove-down-routers-from-consensus.txt | 2 ++ proposals/139-conditional-consensus-download.txt | 2 ++ proposals/140-consensus-diffs.txt | 2 ++ proposals/141-jit-sd-downloads.txt | 2 ++ proposals/142-combine-intro-and-rend-points.txt | 2 ++ proposals/143-distributed-storage-improvements.txt | 2 ++ proposals/144-enforce-distinct-providers.txt | 2 ++ proposals/145-newguard-flag.txt | 2 ++ proposals/146-long-term-stability.txt | 2 ++ proposals/147-prevoting-opinions.txt | 2 ++ proposals/148-uniform-client-end-reason.txt | 2 ++ proposals/149-using-netinfo-data.txt | 2 ++ proposals/150-exclude-exit-nodes.txt | 2 ++ proposals/151-path-selection-improvements.txt | 2 ++ proposals/152-single-hop-circuits.txt | 2 ++ proposals/153-automatic-software-update-protocol.txt | 2 ++ proposals/154-automatic-updates.txt | 2 ++ proposals/155-four-hidden-service-improvements.txt | 2 ++ proposals/156-tracking-blocked-ports.txt | 2 ++ proposals/157-specific-cert-download.txt | 2 ++ proposals/158-microdescriptors.txt | 2 ++ proposals/159-exit-scanning.txt | 2 ++ proposals/160-bandwidth-offset.txt | 2 ++ proposals/161-computing-bandwidth-adjustments.txt | 2 ++ proposals/162-consensus-flavors.txt | 2 ++ proposals/163-detecting-clients.txt | 2 ++ proposals/164-reporting-server-status.txt | 2 ++ proposals/165-simple-robust-voting.txt | 2 ++ proposals/166-statistics-extra-info-docs.txt | 2 ++ proposals/167-params-in-consensus.txt | 2 ++ proposals/168-reduce-circwindow.txt | 2 ++ proposals/169-eliminating-renegotiation.txt | 2 ++ proposals/170-user-path-config.txt | 2 ++ proposals/171-separate-streams.txt | 2 ++ proposals/172-circ-getinfo-option.txt | 2 ++ proposals/173-getinfo-option-expansion.txt | 2 ++ proposals/174-optimistic-data-server.txt | 2 ++ proposals/175-automatic-node-promotion.txt | 2 ++ proposals/176-revising-handshake.txt | 2 ++ proposals/177-flag-abstention.txt | 2 ++ proposals/178-param-voting.txt | 2 ++ proposals/179-TLS-cert-and-parameter-normalization.txt | 2 ++ proposals/180-pluggable-transport.txt | 2 ++ proposals/181-optimistic-data-client.txt | 2 ++ proposals/182-creditbucket.txt | 2 ++ proposals/183-refillintervals.txt | 2 ++ proposals/184-v3-link-protocol.txt | 2 ++ proposals/185-dir-without-dirport.txt | 2 ++ proposals/186-multiple-orports.txt | 2 ++ proposals/187-allow-client-auth.txt | 2 ++ proposals/188-bridge-guards.txt | 2 ++ proposals/189-authorize-cell.txt | 2 ++ proposals/190-shared-secret-bridge-authorization.txt | 2 ++ proposals/191-mitm-bridge-detection-resistance.txt | 2 ++ proposals/192-store-bridge-information.txt | 2 ++ proposals/193-safe-cookie-authentication.txt | 2 ++ proposals/194-mnemonic-urls.txt | 2 ++ proposals/195-TLS-normalization-for-024.txt | 2 ++ proposals/196-transport-control-ports.txt | 2 ++ proposals/197-postmessage-ipc.txt | 2 ++ proposals/198-restore-clienthello-semantics.txt | 2 ++ proposals/199-bridgefinder-integration.txt | 2 ++ proposals/200-new-create-and-extend-cells.txt | 2 ++ proposals/201-bridge-v3-reqs-stats.txt | 2 ++ proposals/202-improved-relay-crypto.txt | 2 ++ proposals/203-https-frontend.txt | 2 ++ proposals/204-hidserv-subdomains.txt | 2 ++ proposals/205-local-dnscache.txt | 2 ++ proposals/206-directory-sources.txt | 2 ++ proposals/207-directory-guards.txt | 2 ++ proposals/208-ipv6-exits-redux.txt | 2 ++ proposals/209-path-bias-tuning.txt | 2 ++ proposals/210-faster-headless-consensus-bootstrap.txt | 2 ++ proposals/211-mapaddress-tor-status.txt | 2 ++ proposals/212-using-old-consensus.txt | 2 ++ proposals/213-remove-stream-sendmes.txt | 2 ++ proposals/214-longer-circids.txt | 2 ++ proposals/215-update-min-consensus-ver.txt | 2 ++ proposals/216-ntor-handshake.txt | 2 ++ proposals/217-ext-orport-auth.txt | 2 ++ proposals/218-usage-controller-events.txt | 2 ++ proposals/219-expanded-dns.txt | 2 ++ proposals/220-ecc-id-keys.txt | 2 ++ proposals/221-stop-using-create-fast.txt | 2 ++ proposals/222-remove-client-timestamps.txt | 2 ++ proposals/223-ace-handshake.txt | 2 ++ proposals/224-rend-spec-ng.txt | 2 ++ proposals/225-strawman-shared-rand.txt | 2 ++ proposals/226-bridgedb-database-improvements.txt | 2 ++ proposals/227-vote-on-package-fingerprints.txt | 2 ++ proposals/228-cross-certification-onionkeys.txt | 2 ++ proposals/229-further-socks5-extensions.txt | 2 ++ proposals/230-rsa1024-relay-id-migration.txt | 2 ++ proposals/231-migrate-authority-rsa1024-ids.txt | 2 ++ proposals/232-pluggable-transports-through-proxy.txt | 2 ++ proposals/233-quicken-tor2web-mode.txt | 2 ++ proposals/234-remittance-addresses.txt | 2 ++ proposals/235-kill-named-flag.txt | 2 ++ proposals/236-single-guard-node.txt | 2 ++ proposals/237-directory-servers-for-all.txt | 2 ++ proposals/238-hs-relay-stats.txt | 2 ++ proposals/239-consensus-hash-chaining.txt | 2 ++ proposals/240-auth-cert-revocation.txt | 2 ++ proposals/241-suspicious-guard-turnover.txt | 2 ++ proposals/242-better-families.txt | 2 ++ proposals/243-hsdir-flag-need-stable.txt | 2 ++ proposals/244-use-rfc5705-for-tls-binding.txt | 2 ++ proposals/245-tap-out.txt | 2 ++ proposals/246-merge-hsdir-and-intro.txt | 2 ++ proposals/247-hs-guard-discovery.txt | 2 ++ proposals/248-removing-rsa-identities.txt | 2 ++ proposals/249-large-create-cells.txt | 2 ++ proposals/250-commit-reveal-consensus.txt | 2 ++ proposals/251-netflow-padding.txt | 2 ++ proposals/252-single-onion.txt | 2 ++ proposals/253-oob-hmac.txt | 2 ++ proposals/254-padding-negotiation.txt | 2 ++ proposals/255-hs-load-balancing.txt | 2 ++ proposals/256-key-revocation.txt | 2 ++ proposals/257-hiding-authorities.txt | 2 ++ proposals/258-dirauth-dos.txt | 2 ++ proposals/259-guard-selection.txt | 2 ++ proposals/260-rend-single-onion.txt | 2 ++ proposals/261-aez-crypto.txt | 2 ++ proposals/262-rekey-circuits.txt | 2 ++ proposals/263-ntru-for-pq-handshake.txt | 2 ++ proposals/264-subprotocol-versions.txt | 2 ++ proposals/265-load-balancing-with-overhead.txt | 2 ++ proposals/266-removing-current-obsolete-clients.txt | 2 ++ proposals/267-tor-consensus-transparency.txt | 2 ++ proposals/268-guard-selection.txt | 2 ++ proposals/269-hybrid-handshake.txt | 2 ++ proposals/270-newhope-hybrid-handshake.txt | 2 ++ proposals/271-another-guard-selection.txt | 2 ++ proposals/272-valid-and-running-by-default.txt | 2 ++ proposals/273-exit-relay-pinning.txt | 2 ++ proposals/274-rotate-onion-keys-less.txt | 2 ++ proposals/275-md-published-time-is-silly.txt | 2 ++ proposals/276-lower-bw-granularity.txt | 2 ++ proposals/277-detect-id-sharing.txt | 2 ++ proposals/278-directory-compression-scheme-negotiation.txt | 2 ++ proposals/279-naming-layer-api.txt | 2 ++ proposals/280-privcount-in-tor.txt | 2 ++ proposals/281-bulk-md-download.txt | 2 ++ proposals/282-remove-named-from-consensus.txt | 2 ++ proposals/283-ipv6-in-micro-consensus.txt | 2 ++ proposals/284-hsv3-control-port.txt | 2 ++ proposals/285-utf-8.txt | 2 ++ proposals/286-hibernation-api.txt | 2 ++ proposals/287-reduce-lifetime.txt | 2 ++ proposals/288-privcount-with-shamir.txt | 2 ++ proposals/289-authenticated-sendmes.txt | 2 ++ proposals/290-deprecate-consensus-methods.txt | 2 ++ proposals/291-two-guard-nodes.txt | 2 ++ proposals/292-mesh-vanguards.txt | 2 ++ proposals/293-know-when-to-publish.txt | 2 ++ proposals/294-tls-1.3.txt | 2 ++ proposals/295-relay-crypto-with-adl.txt | 2 ++ proposals/296-expose-bandwidth-files.txt | 2 ++ proposals/297-safer-protover-shutdowns.txt | 2 ++ proposals/298-canonical-families.txt | 2 ++ proposals/299-ip-failure-count.txt | 2 ++ proposals/300-walking-onions.txt | 2 ++ proposals/301-dont-vote-on-package-fingerprints.txt | 2 ++ proposals/302-padding-machines-for-onion-clients.txt | 2 ++ proposals/303-protover-removal-policy.txt | 2 ++ proposals/304-socks5-extending-hs-error-codes.txt | 2 ++ proposals/305-establish-intro-dos-defense-extention.txt | 2 ++ proposals/306-ipv6-happy-eyeballs.txt | 2 ++ proposals/307-onionbalance-v3.txt | 2 ++ proposals/308-counter-galois-onion.txt | 2 ++ proposals/309-optimistic-socks-in-tor.txt | 2 ++ proposals/310-bandaid-on-guard-selection.txt | 2 ++ proposals/311-relay-ipv6-reachability.txt | 2 ++ proposals/312-relay-auto-ipv6-addr.txt | 2 ++ proposals/313-relay-ipv6-stats.txt | 2 ++ proposals/315-update-dir-required-fields.txt | 2 ++ proposals/317-secure-dns-name-resolution.txt | 2 ++ proposals/324-rtt-congestion-control.txt | 2 ++ proposals/327-pow-over-intro.txt | 2 ++ proposals/329-traffic-splitting.txt | 2 ++ proposals/334-middle-only-flag.txt | 2 ++ proposals/343-rend-caa.txt | 3 ++- proposals/344-protocol-info-leaks.txt | 2 ++ proposals/proposal-status.txt | 2 ++ 227 files changed, 454 insertions(+), 1 deletion(-) diff --git a/proposals/000-index.txt b/proposals/000-index.txt index 48765d0..d81a0e2 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -1,3 +1,4 @@ +``` Filename: 000-index.txt Title: Index of Tor Proposals Author: Nick Mathewson @@ -533,3 +534,4 @@ Proposals by status: INFORMATIONAL: 159 Exit Scanning 300 Walking Onions: Scaling and Saving Bandwidth +``` diff --git a/proposals/001-process.txt b/proposals/001-process.txt index 7211c3b..51526bb 100644 --- a/proposals/001-process.txt +++ b/proposals/001-process.txt @@ -1,3 +1,4 @@ +``` Filename: 001-process.txt Title: The Tor Proposal Process Author: Nick Mathewson @@ -207,3 +208,4 @@ Proposal numbering: Numbers 000-099 are reserved for special and meta-proposals. 100 and up are used for actual proposals. Numbers aren't recycled. +``` diff --git a/proposals/098-todo.txt b/proposals/098-todo.txt index 0acb464..91202c9 100644 --- a/proposals/098-todo.txt +++ b/proposals/098-todo.txt @@ -1,3 +1,4 @@ +``` Filename: 098-todo.txt Title: Proposals that should be written Author: Nick Mathewson, Roger Dingledine @@ -107,3 +108,4 @@ B.2. ... and that we have no idea how to do. Let onion keys be not just RSA but maybe DH too, for Paul's reply onion design. +``` diff --git a/proposals/099-misc.txt b/proposals/099-misc.txt index ef34c80..bc44540 100644 --- a/proposals/099-misc.txt +++ b/proposals/099-misc.txt @@ -1,3 +1,4 @@ +``` Filename: 099-misc.txt Title: Miscellaneous proposals Author: Various @@ -29,3 +30,4 @@ Proposals -- Nick Mathewson +``` diff --git a/proposals/100-tor-spec-udp.txt b/proposals/100-tor-spec-udp.txt index 7f06222..e9f1eae 100644 --- a/proposals/100-tor-spec-udp.txt +++ b/proposals/100-tor-spec-udp.txt @@ -1,3 +1,4 @@ +``` Filename: 100-tor-spec-udp.txt Title: Tor Unreliable Datagram Extension Proposal Author: Marc Liberatore @@ -420,3 +421,4 @@ traffic "for free". example, what happens when a UDP packet doesn't fit in a single cell?) -NM +``` diff --git a/proposals/101-dir-voting.txt b/proposals/101-dir-voting.txt index 634d3f1..39fa6c6 100644 --- a/proposals/101-dir-voting.txt +++ b/proposals/101-dir-voting.txt @@ -1,3 +1,4 @@ +``` Filename: 101-dir-voting.txt Title: Voting on the Tor Directory System Author: Nick Mathewson @@ -281,3 +282,4 @@ by the authorities. -RD] off very quickly from downloading consensus docs until they're actually implemented. +``` diff --git a/proposals/102-drop-opt.txt b/proposals/102-drop-opt.txt index 490376b..a7d0cbe 100644 --- a/proposals/102-drop-opt.txt +++ b/proposals/102-drop-opt.txt @@ -1,3 +1,4 @@ +``` Filename: 102-drop-opt.txt Title: Dropping "opt" from the directory format Author: Nick Mathewson @@ -36,3 +37,4 @@ Status: once earlier formats are obsolete. +``` diff --git a/proposals/103-multilevel-keys.txt b/proposals/103-multilevel-keys.txt index 7ec254a..3bb3c28 100644 --- a/proposals/103-multilevel-keys.txt +++ b/proposals/103-multilevel-keys.txt @@ -1,3 +1,4 @@ +``` Filename: 103-multilevel-keys.txt Title: Splitting identity key from regularly used signing key Author: Nick Mathewson @@ -202,3 +203,4 @@ Extensions to Proposal 101. unknown signing keys might be enough to make the consensus correctly signed, do not use the consensus, but do not discard it until we have a new keys document. +``` diff --git a/proposals/104-short-descriptors.txt b/proposals/104-short-descriptors.txt index 90e0764..c543bf1 100644 --- a/proposals/104-short-descriptors.txt +++ b/proposals/104-short-descriptors.txt @@ -1,3 +1,4 @@ +``` Filename: 104-short-descriptors.txt Title: Long and Short Router Descriptors Author: Nick Mathewson @@ -179,3 +180,4 @@ Migration: * Once tools that want bandwidth info support fetching extra info: * Have routers stop including bandwidth info in their router descriptors. +``` diff --git a/proposals/105-handshake-revision.txt b/proposals/105-handshake-revision.txt index 791a016..45a937c 100644 --- a/proposals/105-handshake-revision.txt +++ b/proposals/105-handshake-revision.txt @@ -1,3 +1,4 @@ +``` Filename: 105-handshake-revision.txt Title: Version negotiation for the Tor protocol. Author: Nick Mathewson, Roger Dingledine @@ -321,3 +322,4 @@ Security issues: authorities' RecommmendedVersions mechanism, even if it is still technically possible to use them. +``` diff --git a/proposals/106-less-tls-constraint.txt b/proposals/106-less-tls-constraint.txt index 7e7621d..1655525 100644 --- a/proposals/106-less-tls-constraint.txt +++ b/proposals/106-less-tls-constraint.txt @@ -1,3 +1,4 @@ +``` Filename: 106-less-tls-constraint.txt Title: Checking fewer things during TLS handshakes Author: Nick Mathewson @@ -109,3 +110,4 @@ OTHER SPEC CHANGES: When a client doesn't give us an identity, we should never extend any circuits to it (duh), and we should allow it to set circuit ID however it wants. +``` diff --git a/proposals/107-uptime-sanity-checking.txt b/proposals/107-uptime-sanity-checking.txt index 922129b..7764889 100644 --- a/proposals/107-uptime-sanity-checking.txt +++ b/proposals/107-uptime-sanity-checking.txt @@ -1,3 +1,4 @@ +``` Filename: 107-uptime-sanity-checking.txt Title: Uptime Sanity Checking Author: Kevin Bauer & Damon McCoy @@ -52,3 +53,4 @@ Discussion: This proposal also led to 108-mtbf-based-stability.txt +``` diff --git a/proposals/108-mtbf-based-stability.txt b/proposals/108-mtbf-based-stability.txt index 2941037..962d273 100644 --- a/proposals/108-mtbf-based-stability.txt +++ b/proposals/108-mtbf-based-stability.txt @@ -1,3 +1,4 @@ +``` Filename: 108-mtbf-based-stability.txt Title: Base "Stable" Flag on Mean Time Between Failures Author: Nick Mathewson @@ -86,3 +87,4 @@ Implementation: Servers should probe at random intervals to test whether servers are running. +``` diff --git a/proposals/109-no-sharing-ips.txt b/proposals/109-no-sharing-ips.txt index a0f1fff..98927e9 100644 --- a/proposals/109-no-sharing-ips.txt +++ b/proposals/109-no-sharing-ips.txt @@ -1,3 +1,4 @@ +``` Filename: 109-no-sharing-ips.txt Title: No more than one server per IP address Author: Kevin Bauer & Damon McCoy @@ -88,3 +89,4 @@ Compatibility: [Note Roger's tweak to this behavior, in http://archives.seul.org/or/cvs/Oct-2007/msg00118.html] +``` diff --git a/proposals/110-avoid-infinite-circuits.txt b/proposals/110-avoid-infinite-circuits.txt index 7d6772d..07f5461 100644 --- a/proposals/110-avoid-infinite-circuits.txt +++ b/proposals/110-avoid-infinite-circuits.txt @@ -1,3 +1,4 @@ +``` Filename: 110-avoid-infinite-circuits.txt Title: Avoiding infinite length circuits Author: Roger Dingledine @@ -118,3 +119,4 @@ Acknowledgements: is working on implementing a fix based on this design in the summer 2007 timeframe.) +``` diff --git a/proposals/111-local-traffic-priority.txt b/proposals/111-local-traffic-priority.txt index 9411463..762634e 100644 --- a/proposals/111-local-traffic-priority.txt +++ b/proposals/111-local-traffic-priority.txt @@ -1,3 +1,4 @@ +``` Filename: 111-local-traffic-priority.txt Title: Prioritizing local traffic over relayed traffic Author: Roger Dingledine @@ -149,3 +150,4 @@ Prognosis: We could probably remove the third case and it would still work, but hey. +``` diff --git a/proposals/112-bring-back-pathlencoinweight.txt b/proposals/112-bring-back-pathlencoinweight.txt index 3f6c337..5109328 100644 --- a/proposals/112-bring-back-pathlencoinweight.txt +++ b/proposals/112-bring-back-pathlencoinweight.txt @@ -1,3 +1,4 @@ +``` Filename: 112-bring-back-pathlencoinweight.txt Title: Bring Back Pathlen Coin Weight Author: Mike Perry @@ -161,3 +162,4 @@ Migration: [1] http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf +``` diff --git a/proposals/113-fast-authority-interface.txt b/proposals/113-fast-authority-interface.txt index 8912b53..55e925f 100644 --- a/proposals/113-fast-authority-interface.txt +++ b/proposals/113-fast-authority-interface.txt @@ -1,3 +1,4 @@ +``` Filename: 113-fast-authority-interface.txt Title: Simplifying directory authority administration Author: Nick Mathewson @@ -83,3 +84,4 @@ Resolution: automatically create bindings", and that approach is implemented. There are remaining issues in the problem statement above that need their own solutions. +``` diff --git a/proposals/114-distributed-storage.txt b/proposals/114-distributed-storage.txt index 91a787d..1c0f40f 100644 --- a/proposals/114-distributed-storage.txt +++ b/proposals/114-distributed-storage.txt @@ -1,3 +1,4 @@ +``` Filename: 114-distributed-storage.txt Title: Distributed Storage for Tor Hidden Service Descriptors Author: Karsten Loesing @@ -437,3 +438,4 @@ Compatibility: After the second transition phase, the authoritative directories should stop serving hidden service descriptors. +``` diff --git a/proposals/115-two-hop-paths.txt b/proposals/115-two-hop-paths.txt index 9854c9a..7ef07b4 100644 --- a/proposals/115-two-hop-paths.txt +++ b/proposals/115-two-hop-paths.txt @@ -1,3 +1,4 @@ +``` Filename: 115-two-hop-paths.txt Title: Two Hop Paths Author: Mike Perry @@ -383,3 +384,4 @@ Migration: [1] http://p2pnet.net/story/11279 [2] http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf [3] Proof available upon request ;) +``` diff --git a/proposals/116-two-hop-paths-from-guard.txt b/proposals/116-two-hop-paths-from-guard.txt index f456253..8228c7a 100644 --- a/proposals/116-two-hop-paths-from-guard.txt +++ b/proposals/116-two-hop-paths-from-guard.txt @@ -1,3 +1,4 @@ +``` Filename: 116-two-hop-paths-from-guard.txt Title: Two hop paths from entry guards Author: Michael Lieberman @@ -116,3 +117,4 @@ MIT mentioned above. 2) It would give governments an incentive to confiscate exit nodes to see if they are pulling this trick. +``` diff --git a/proposals/117-ipv6-exits.txt b/proposals/117-ipv6-exits.txt index f343ff7..e5231db 100644 --- a/proposals/117-ipv6-exits.txt +++ b/proposals/117-ipv6-exits.txt @@ -1,3 +1,4 @@ +``` Filename: 117-ipv6-exits.txt Title: IPv6 exits Author: coderman @@ -409,3 +410,4 @@ Contents 'Network Address Translation - Protocol Translation (NAT-PT)' http://www.ietf.org/rfc/rfc2766.txt +``` diff --git a/proposals/118-multiple-orports.txt b/proposals/118-multiple-orports.txt index 69ab382..0378589 100644 --- a/proposals/118-multiple-orports.txt +++ b/proposals/118-multiple-orports.txt @@ -1,3 +1,4 @@ +``` Filename: 118-multiple-orports.txt Title: Advertising multiple ORPorts at once Author: Nick Mathewson @@ -85,3 +86,4 @@ Notes 3 July: - Write up the simple version of this. No ranges needed yet. No networkstatus chagnes yet. +``` diff --git a/proposals/119-controlport-auth.txt b/proposals/119-controlport-auth.txt index 9ed1cc1..32c70b6 100644 --- a/proposals/119-controlport-auth.txt +++ b/proposals/119-controlport-auth.txt @@ -1,3 +1,4 @@ +``` Filename: 119-controlport-auth.txt Title: New PROTOCOLINFO command for controllers Author: Roger Dingledine @@ -138,3 +139,4 @@ Unsolved problems: to think about how to demand password-based authentication without bothering the user about it. +``` diff --git a/proposals/120-shutdown-descriptors.txt b/proposals/120-shutdown-descriptors.txt index 5cfe2b5..465ef86 100644 --- a/proposals/120-shutdown-descriptors.txt +++ b/proposals/120-shutdown-descriptors.txt @@ -1,3 +1,4 @@ +``` Filename: 120-shutdown-descriptors.txt Title: Shutdown descriptors when Tor servers stop Author: Roger Dingledine @@ -81,3 +82,4 @@ Comments: 2) Maybe add a rule "Don't do this for hibernation if we expect to wake up before the next consensus is published"? - NM 9 Oct 2007 +``` diff --git a/proposals/121-hidden-service-authentication.txt b/proposals/121-hidden-service-authentication.txt index 404ca57..678d4d4 100644 --- a/proposals/121-hidden-service-authentication.txt +++ b/proposals/121-hidden-service-authentication.txt @@ -1,3 +1,4 @@ +``` Filename: 121-hidden-service-authentication.txt Title: Hidden Service Authentication Author: Tobias Kamm, Thomas Lauterbach, Karsten Loesing, Ferdinand Rieger, @@ -774,3 +775,4 @@ Implementation: checking access counters. - Log access for accountability. +``` diff --git a/proposals/122-unnamed-flag.txt b/proposals/122-unnamed-flag.txt index 2ce7bb2..d73f2e4 100644 --- a/proposals/122-unnamed-flag.txt +++ b/proposals/122-unnamed-flag.txt @@ -1,3 +1,4 @@ +``` Filename: 122-unnamed-flag.txt Title: Network status entries need a new Unnamed flag Author: Roger Dingledine @@ -134,3 +135,4 @@ Implemented-In: 0.2.0.x blacklisted from the network, the really bad part is that this logic is really unintuitive to prospective new server operators. +``` diff --git a/proposals/123-autonaming.txt b/proposals/123-autonaming.txt index 74c4869..bc9cdfa 100644 --- a/proposals/123-autonaming.txt +++ b/proposals/123-autonaming.txt @@ -1,3 +1,4 @@ +``` Filename: 123-autonaming.txt Title: Naming authorities automatically create bindings Author: Peter Palfrader @@ -52,3 +53,4 @@ Proposal: This automaton does not necessarily need to live in the Tor code, it can do its job just as well when it's an external tool. +``` diff --git a/proposals/124-tls-certificates.txt b/proposals/124-tls-certificates.txt index 9472d14..0149da7 100644 --- a/proposals/124-tls-certificates.txt +++ b/proposals/124-tls-certificates.txt @@ -1,3 +1,4 @@ +``` Filename: 124-tls-certificates.txt Title: Blocking resistant TLS certificate usage Author: Steven J. Murdoch @@ -311,3 +312,4 @@ References: [5] Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) % +``` diff --git a/proposals/125-bridges.txt b/proposals/125-bridges.txt index 9d95729..2b4d0e6 100644 --- a/proposals/125-bridges.txt +++ b/proposals/125-bridges.txt @@ -1,3 +1,4 @@ +``` Filename: 125-bridges.txt Title: Behavior for bridge users, bridge relays, and bridge authorities Author: Roger Dingledine @@ -289,3 +290,4 @@ Implemented-In: 0.2.0.x We should figure this out in the 0.2.1.x timeframe. +``` diff --git a/proposals/126-geoip-reporting.txt b/proposals/126-geoip-reporting.txt index 9f3b21c..131b25f 100644 --- a/proposals/126-geoip-reporting.txt +++ b/proposals/126-geoip-reporting.txt @@ -1,3 +1,4 @@ +``` Filename: 126-geoip-reporting.txt Title: Getting GeoIP data and publishing usage summaries Author: Roger Dingledine @@ -408,3 +409,4 @@ Implemented-In: 0.2.0.x Other ideas? +``` diff --git a/proposals/127-dirport-mirrors-downloads.txt b/proposals/127-dirport-mirrors-downloads.txt index 377492c..fcdec60 100644 --- a/proposals/127-dirport-mirrors-downloads.txt +++ b/proposals/127-dirport-mirrors-downloads.txt @@ -1,3 +1,4 @@ +``` Filename: 127-dirport-mirrors-downloads.txt Title: Relaying dirport requests to Tor download site / website Author: Roger Dingledine @@ -153,3 +154,4 @@ Status: Obsolete you about a gmail autoresponder address just as easily, and then you'd get better authentication of the Tor program to boot. +``` diff --git a/proposals/128-bridge-families.txt b/proposals/128-bridge-families.txt index e5bdcf9..67f208e 100644 --- a/proposals/128-bridge-families.txt +++ b/proposals/128-bridge-families.txt @@ -1,3 +1,4 @@ +``` Filename: 128-bridge-families.txt Title: Families of private bridges Author: Roger Dingledine @@ -62,3 +63,4 @@ Status: Dead ideas/ directory. Somebody should pick it up sometime and finish the design and implementation. +``` diff --git a/proposals/129-reject-plaintext-ports.txt b/proposals/129-reject-plaintext-ports.txt index 8080ff5..91b9bd4 100644 --- a/proposals/129-reject-plaintext-ports.txt +++ b/proposals/129-reject-plaintext-ports.txt @@ -1,3 +1,4 @@ +``` Filename: 129-reject-plaintext-ports.txt Title: Block Insecure Protocols by Default Author: Kevin Bauer & Damon McCoy @@ -112,3 +113,4 @@ Next steps: b) We should decide which ports to reject by default. The current consensus is 23,109,110,143 -- the same set that we warn for now. +``` diff --git a/proposals/130-v2-conn-protocol.txt b/proposals/130-v2-conn-protocol.txt index f5c31cc..fddbb75 100644 --- a/proposals/130-v2-conn-protocol.txt +++ b/proposals/130-v2-conn-protocol.txt @@ -1,3 +1,4 @@ +``` Filename: 130-v2-conn-protocol.txt Title: Version 2 Tor connection protocol Author: Nick Mathewson @@ -182,3 +183,4 @@ Proposal: Until NETINFO cells have been exchanged, the connection is not open. +``` diff --git a/proposals/131-verify-tor-usage.txt b/proposals/131-verify-tor-usage.txt index 8af1151..19a5737 100644 --- a/proposals/131-verify-tor-usage.txt +++ b/proposals/131-verify-tor-usage.txt @@ -1,3 +1,4 @@ +``` Filename: 131-verify-tor-usage.txt Title: Help users to verify they are using Tor Author: Steven J. Murdoch @@ -146,3 +147,4 @@ Related work: Tor should be able to respond with a webpage to notify the user of how to fix the problem. This also implies that Tor must be told of the special IP address, and so must be effectively permanent. +``` diff --git a/proposals/132-browser-check-tor-service.txt b/proposals/132-browser-check-tor-service.txt index 7aecaaf..d652d6f 100644 --- a/proposals/132-browser-check-tor-service.txt +++ b/proposals/132-browser-check-tor-service.txt @@ -1,3 +1,4 @@ +``` Filename: 132-browser-check-tor-service.txt Title: A Tor Web Service For Verifying Correct Browser Configuration Author: Robert Hogan @@ -143,3 +144,4 @@ Open Issues: future. Or maybe it's not such a bad thing, Tor is merely attempting to make normally invalid resource requests valid for a given purpose. +``` diff --git a/proposals/133-unreachable-ors.txt b/proposals/133-unreachable-ors.txt index 5e2916b..ed80d7a 100644 --- a/proposals/133-unreachable-ors.txt +++ b/proposals/133-unreachable-ors.txt @@ -1,3 +1,4 @@ +``` Filename: 133-unreachable-ors.txt Title: Incorporate Unreachable ORs into the Tor Network Author: Robert Hogan @@ -126,3 +127,4 @@ Implementation Issues: published OR should be willing to accept is an open question. Is one hundred, mostly idle, such orconns too onerous? +``` diff --git a/proposals/134-robust-voting.txt b/proposals/134-robust-voting.txt index c5dfb3b..66dfef5 100644 --- a/proposals/134-robust-voting.txt +++ b/proposals/134-robust-voting.txt @@ -1,3 +1,4 @@ +``` Filename: 134-robust-voting.txt Title: More robust consensus voting with diverse authority sets Author: Peter Palfrader @@ -121,3 +122,4 @@ requirement that an adversary must compromise a majority of authorities in order to control the consensus. -- Nick +``` diff --git a/proposals/135-private-tor-networks.txt b/proposals/135-private-tor-networks.txt index 19ef68b..7ce0d4c 100644 --- a/proposals/135-private-tor-networks.txt +++ b/proposals/135-private-tor-networks.txt @@ -1,3 +1,4 @@ +``` Filename: 135-private-tor-networks.txt Title: Simplify Configuration of Private Tor Networks Author: Karsten Loesing @@ -279,3 +280,4 @@ Test: [warn] Failed to parse/validate config: TestingTorNetwork may only be configured in combination with a non-default set of DirServers. +``` diff --git a/proposals/136-legacy-keys.txt b/proposals/136-legacy-keys.txt index f2b1b5c..ab8c9de 100644 --- a/proposals/136-legacy-keys.txt +++ b/proposals/136-legacy-keys.txt @@ -1,3 +1,4 @@ +``` Filename: 136-legacy-keys.txt Title: Mass authority migration with legacy keys Author: Nick Mathewson @@ -98,3 +99,4 @@ Notes: I don't think this achieves us anything either, though. +``` diff --git a/proposals/137-bootstrap-phases.txt b/proposals/137-bootstrap-phases.txt index ebe044c..fbb5081 100644 --- a/proposals/137-bootstrap-phases.txt +++ b/proposals/137-bootstrap-phases.txt @@ -1,3 +1,4 @@ +``` Filename: 137-bootstrap-phases.txt Title: Keep controllers informed as Tor bootstraps Author: Roger Dingledine @@ -233,3 +234,4 @@ Implemented-In: 0.2.1.x Controllers should use this getinfo when they connect or attach to Tor to learn its current state. +``` diff --git a/proposals/138-remove-down-routers-from-consensus.txt b/proposals/138-remove-down-routers-from-consensus.txt index 776911b..037edbb 100644 --- a/proposals/138-remove-down-routers-from-consensus.txt +++ b/proposals/138-remove-down-routers-from-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 138-remove-down-routers-from-consensus.txt Title: Remove routers that are not Running from consensus documents Author: Peter Palfrader @@ -47,3 +48,4 @@ Implemented-In: 0.2.1.2-alpha consensus document is formed like before but a new last step removes all routers from the listing that are not marked as Running. +``` diff --git a/proposals/139-conditional-consensus-download.txt b/proposals/139-conditional-consensus-download.txt index 941f5ad..ea00acc 100644 --- a/proposals/139-conditional-consensus-download.txt +++ b/proposals/139-conditional-consensus-download.txt @@ -1,3 +1,4 @@ +``` Filename: 139-conditional-consensus-download.txt Title: Download consensus documents only when it will be trusted Author: Peter Palfrader @@ -92,3 +93,4 @@ Footnotes: 1. For the purpose of this proposal a client can be any Tor instance that downloads a consensus document. This includes relays, directory caches as well as end users. +``` diff --git a/proposals/140-consensus-diffs.txt b/proposals/140-consensus-diffs.txt index c50aba0..d1a5a1d 100644 --- a/proposals/140-consensus-diffs.txt +++ b/proposals/140-consensus-diffs.txt @@ -1,3 +1,4 @@ +``` Filename: 140-consensus-diffs.txt Title: Provide diffs between consensuses Author: Peter Palfrader @@ -231,3 +232,4 @@ Ticket: https://bugs.torproject.org/13339 This parameter determines how old a consensus can be (in hours) before a client should no longer try to find a diff for it. +``` diff --git a/proposals/141-jit-sd-downloads.txt b/proposals/141-jit-sd-downloads.txt index bba6493..1216ded 100644 --- a/proposals/141-jit-sd-downloads.txt +++ b/proposals/141-jit-sd-downloads.txt @@ -1,3 +1,4 @@ +``` Filename: 141-jit-sd-downloads.txt Title: Download server descriptors on demand Author: Peter Palfrader @@ -321,3 +322,4 @@ Status: Obsolete B needs to contact C so it can ask about the descriptor before passing it back to the client. +``` diff --git a/proposals/142-combine-intro-and-rend-points.txt b/proposals/142-combine-intro-and-rend-points.txt index 3abd5c8..6ad34eb 100644 --- a/proposals/142-combine-intro-and-rend-points.txt +++ b/proposals/142-combine-intro-and-rend-points.txt @@ -1,3 +1,4 @@ +``` Filename: 142-combine-intro-and-rend-points.txt Title: Combine Introduction and Rendezvous Points Author: Karsten Loesing, Christian Wilms @@ -275,3 +276,4 @@ References: [5] Lasse Øverlier and Paul Syverson, Locating Hidden Servers. In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006. +``` diff --git a/proposals/143-distributed-storage-improvements.txt b/proposals/143-distributed-storage-improvements.txt index ce3f781..c89c309 100644 --- a/proposals/143-distributed-storage-improvements.txt +++ b/proposals/143-distributed-storage-improvements.txt @@ -1,3 +1,4 @@ +``` Filename: 143-distributed-storage-improvements.txt Title: Improvements of Distributed Storage for Tor Hidden Service Descriptors Author: Karsten Loesing @@ -191,3 +192,4 @@ Compatibility: All proposed improvements are compatible to the currently implemented design as described in proposal 114. +``` diff --git a/proposals/144-enforce-distinct-providers.txt b/proposals/144-enforce-distinct-providers.txt index 1a682f3..da3845e 100644 --- a/proposals/144-enforce-distinct-providers.txt +++ b/proposals/144-enforce-distinct-providers.txt @@ -1,3 +1,4 @@ +``` Filename: 144-enforce-distinct-providers.txt Title: Increase the diversity of circuits by detecting nodes belonging the same provider @@ -163,3 +164,4 @@ In the Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. http://freehaven.net/anonbib/#murdoch-pet2007 [5] http://bugs.noreply.org/flyspray/index.php?do=details&id=690 +``` diff --git a/proposals/145-newguard-flag.txt b/proposals/145-newguard-flag.txt index 98c6508..7646727 100644 --- a/proposals/145-newguard-flag.txt +++ b/proposals/145-newguard-flag.txt @@ -1,3 +1,4 @@ +``` Filename: 145-newguard-flag.txt Title: Separate "suitable as a guard" from "suitable as a new guard" Author: Nick Mathewson @@ -38,3 +39,4 @@ Alternatives We might instead have authorities list weights with which nodes should be picked as guards. +``` diff --git a/proposals/146-long-term-stability.txt b/proposals/146-long-term-stability.txt index 650be33..110231f 100644 --- a/proposals/146-long-term-stability.txt +++ b/proposals/146-long-term-stability.txt @@ -1,3 +1,4 @@ +``` Filename: 146-long-term-stability.txt Title: Add new flag to reflect long-term stability Author: Nick Mathewson @@ -91,3 +92,4 @@ Issues and future possibilities: Longterm is a really awkward name. +``` diff --git a/proposals/147-prevoting-opinions.txt b/proposals/147-prevoting-opinions.txt index 22f5c0f..42787a5 100644 --- a/proposals/147-prevoting-opinions.txt +++ b/proposals/147-prevoting-opinions.txt @@ -1,3 +1,4 @@ +``` Filename: 147-prevoting-opinions.txt Title: Eliminate the need for v2 directories in generating v3 directories Author: Nick Mathewson @@ -118,3 +119,4 @@ Reasons for rejection: -c | sort | grep " [1-4] " | wc -l`, result is 63, divide by 7*24 published consensuses, obtain 0.375 as end result.) +``` diff --git a/proposals/148-uniform-client-end-reason.txt b/proposals/148-uniform-client-end-reason.txt index 1db3b3e..0ee8145 100644 --- a/proposals/148-uniform-client-end-reason.txt +++ b/proposals/148-uniform-client-end-reason.txt @@ -1,3 +1,4 @@ +``` Filename: 148-uniform-client-end-reason.txt Title: Stream end reasons from the client side should be uniform Author: Roger Dingledine @@ -55,3 +56,4 @@ Design: like most of the Windows clients currently do and like the non-Windows clients already do sometimes. +``` diff --git a/proposals/149-using-netinfo-data.txt b/proposals/149-using-netinfo-data.txt index 0ad663c..d8d052c 100644 --- a/proposals/149-using-netinfo-data.txt +++ b/proposals/149-using-netinfo-data.txt @@ -1,3 +1,4 @@ +``` Filename: 149-using-netinfo-data.txt Title: Using data from NETINFO cells Author: Nick Mathewson @@ -43,3 +44,4 @@ Avoiding MITM attacks connections without first trying to build a canonical one. +``` diff --git a/proposals/150-exclude-exit-nodes.txt b/proposals/150-exclude-exit-nodes.txt index b497ae6..460058c 100644 --- a/proposals/150-exclude-exit-nodes.txt +++ b/proposals/150-exclude-exit-nodes.txt @@ -1,3 +1,4 @@ +``` Filename: 150-exclude-exit-nodes.txt Title: Exclude Exit Nodes from a circuit Author: Mfr @@ -45,3 +46,4 @@ Risks: about broken exits because of this option. This issue can probably be addressed sufficiently with documentation. +``` diff --git a/proposals/151-path-selection-improvements.txt b/proposals/151-path-selection-improvements.txt index e92b574..5eacfa7 100644 --- a/proposals/151-path-selection-improvements.txt +++ b/proposals/151-path-selection-improvements.txt @@ -1,3 +1,4 @@ +``` Filename: 151-path-selection-improvements.txt Title: Improving Tor Path Selection Author: Fallon Chen, Mike Perry @@ -147,3 +148,4 @@ Issues timeout can be achieved without cutting off a great number of the total paths. This will eliminate a great deal of the performance variation of Tor usage. +``` diff --git a/proposals/152-single-hop-circuits.txt b/proposals/152-single-hop-circuits.txt index d0b28b1..1e271af 100644 --- a/proposals/152-single-hop-circuits.txt +++ b/proposals/152-single-hop-circuits.txt @@ -1,3 +1,4 @@ +``` Filename: 152-single-hop-circuits.txt Title: Optionally allow exit from single-hop circuits Author: Geoff Goodell @@ -60,3 +61,4 @@ Security Considerations exit-from-single-hop-circuits" when choosing random paths through the Tor network. +``` diff --git a/proposals/153-automatic-software-update-protocol.txt b/proposals/153-automatic-software-update-protocol.txt index c2979bb..7cf0c0a 100644 --- a/proposals/153-automatic-software-update-protocol.txt +++ b/proposals/153-automatic-software-update-protocol.txt @@ -1,3 +1,4 @@ +``` Filename: 153-automatic-software-update-protocol.txt Title: Automatic software update protocol Author: Jacob Appelbaum @@ -173,3 +174,4 @@ question. x.x Other Things Other things should be added to this proposal. What are they? +``` diff --git a/proposals/154-automatic-updates.txt b/proposals/154-automatic-updates.txt index 4c2c6d3..e893344 100644 --- a/proposals/154-automatic-updates.txt +++ b/proposals/154-automatic-updates.txt @@ -1,3 +1,4 @@ +``` Filename: 154-automatic-updates.txt Title: Automatic Software Update Protocol Author: Matt Edman @@ -375,3 +376,4 @@ References [3] Tor version specification, https://tor-svn.freehaven.net/svn/tor/trunk/doc/spec/version-spec.txt +``` diff --git a/proposals/155-four-hidden-service-improvements.txt b/proposals/155-four-hidden-service-improvements.txt index 423c9e8..3406481 100644 --- a/proposals/155-four-hidden-service-improvements.txt +++ b/proposals/155-four-hidden-service-improvements.txt @@ -1,3 +1,4 @@ +``` Filename: 155-four-hidden-service-improvements.txt Title: Four Improvements of Hidden Service Performance Author: Karsten Loesing, Christian Wilms @@ -118,3 +119,4 @@ References: [3] http://freehaven.net/~karsten/hidserv/design-2008-08-15.pdf +``` diff --git a/proposals/156-tracking-blocked-ports.txt b/proposals/156-tracking-blocked-ports.txt index acc0625..578621f 100644 --- a/proposals/156-tracking-blocked-ports.txt +++ b/proposals/156-tracking-blocked-ports.txt @@ -1,3 +1,4 @@ +``` Filename: 156-tracking-blocked-ports.txt Title: Tracking blocked ports on the client side Author: Robert Hogan @@ -527,3 +528,4 @@ Index: src/or/circuitbuild.c /** If question is the string "entry-guards", then dump +``` diff --git a/proposals/157-specific-cert-download.txt b/proposals/157-specific-cert-download.txt index e0ef0e8..8a69611 100644 --- a/proposals/157-specific-cert-download.txt +++ b/proposals/157-specific-cert-download.txt @@ -1,3 +1,4 @@ +``` Filename: 157-specific-cert-download.txt Title: Make certificate downloads specific Author: Nick Mathewson @@ -100,3 +101,4 @@ Why cross-certify too? References: This is related to part 2 of bug 854. +``` diff --git a/proposals/158-microdescriptors.txt b/proposals/158-microdescriptors.txt index 442d705..d267c0b 100644 --- a/proposals/158-microdescriptors.txt +++ b/proposals/158-microdescriptors.txt @@ -1,3 +1,4 @@ +``` Filename: 158-microdescriptors.txt Title: Clients download consensus + microdescriptors Author: Roger Dingledine @@ -197,3 +198,4 @@ Implemented-In: 0.2.3.1-alpha Phase three, clients should start fetching and caching them instead of normal descriptors. +``` diff --git a/proposals/159-exit-scanning.txt b/proposals/159-exit-scanning.txt index d2a7f3b..0f4d329 100644 --- a/proposals/159-exit-scanning.txt +++ b/proposals/159-exit-scanning.txt @@ -1,3 +1,4 @@ +``` Filename: 159-exit-scanning.txt Title: Exit Scanning Author: Mike Perry @@ -140,3 +141,4 @@ Having a separate file that is under the exclusive control of the scanner allows us to heavily isolate the scanner from the Tor authority, potentially even running them on separate machines. +``` diff --git a/proposals/160-bandwidth-offset.txt b/proposals/160-bandwidth-offset.txt index 8ad4d18..33abd45 100644 --- a/proposals/160-bandwidth-offset.txt +++ b/proposals/160-bandwidth-offset.txt @@ -1,3 +1,4 @@ +``` Filename: 160-bandwidth-offset.txt Title: Authorities vote for bandwidth offsets in consensus Author: Roger Dingledine @@ -103,3 +104,4 @@ Target: 0.2.1.x +``` diff --git a/proposals/161-computing-bandwidth-adjustments.txt b/proposals/161-computing-bandwidth-adjustments.txt index 6968724..38a1f9e 100644 --- a/proposals/161-computing-bandwidth-adjustments.txt +++ b/proposals/161-computing-bandwidth-adjustments.txt @@ -1,3 +1,4 @@ +``` Title: Computing Bandwidth Adjustments Filename: 161-computing-bandwidth-adjustments.txt Author: Mike Perry @@ -172,3 +173,4 @@ Status: Closed This file can be either copied or rsynced into a directory readable by the directory authority. +``` diff --git a/proposals/162-consensus-flavors.txt b/proposals/162-consensus-flavors.txt index 2a227a0..85e6421 100644 --- a/proposals/162-consensus-flavors.txt +++ b/proposals/162-consensus-flavors.txt @@ -1,3 +1,4 @@ +``` Filename: 162-consensus-flavors.txt Title: Publish the consensus in multiple flavors Author: Nick Mathewson @@ -188,3 +189,4 @@ Acknowledgements: Aspects of this design and its applications to hash migration were heavily influenced by IRC conversations with Marian. +``` diff --git a/proposals/163-detecting-clients.txt b/proposals/163-detecting-clients.txt index f2a17a5..5f77703 100644 --- a/proposals/163-detecting-clients.txt +++ b/proposals/163-detecting-clients.txt @@ -1,3 +1,4 @@ +``` Filename: 163-detecting-clients.txt Title: Detecting whether a connection comes from a client Author: Nick Mathewson @@ -116,3 +117,4 @@ Open questions: [Suggested answer: for now, just try making circuits through the node. Extend this to extending circuits as needed.] +``` diff --git a/proposals/164-reporting-server-status.txt b/proposals/164-reporting-server-status.txt index 24fcc8f..418b3f8 100644 --- a/proposals/164-reporting-server-status.txt +++ b/proposals/164-reporting-server-status.txt @@ -1,3 +1,4 @@ +``` Filename: 164-reporting-server-status.txt Title: Reporting the status of server votes Author: Nick Mathewson @@ -90,3 +91,4 @@ Risks: +``` diff --git a/proposals/165-simple-robust-voting.txt b/proposals/165-simple-robust-voting.txt index 28ea6d9..c759ee8 100644 --- a/proposals/165-simple-robust-voting.txt +++ b/proposals/165-simple-robust-voting.txt @@ -1,3 +1,4 @@ +``` Filename: 165-simple-robust-voting.txt Title: Easy migration for voting authority sets Author: Nick Mathewson @@ -134,3 +135,4 @@ Acknowledgments: The design came out of an IRC conversation with Peter Palfrader. He had the basic idea first. +``` diff --git a/proposals/166-statistics-extra-info-docs.txt b/proposals/166-statistics-extra-info-docs.txt index 8b0c6a1..0075ade 100644 --- a/proposals/166-statistics-extra-info-docs.txt +++ b/proposals/166-statistics-extra-info-docs.txt @@ -1,3 +1,4 @@ +``` Filename: 166-statistics-extra-info-docs.txt Title: Including Network Statistics in Extra-Info Documents Author: Karsten Loesing @@ -389,3 +390,4 @@ Implementation notes: gathering statistics. However, in the near future, statistics shall be enabled gathered by all relays by default, where requiring a ./configure option would be a barrier for many relay operators. +``` diff --git a/proposals/167-params-in-consensus.txt b/proposals/167-params-in-consensus.txt index d23bc9c..f616c35 100644 --- a/proposals/167-params-in-consensus.txt +++ b/proposals/167-params-in-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 167-params-in-consensus.txt Title: Vote on network parameters in consensus Author: Roger Dingledine @@ -45,3 +46,4 @@ Implemented-In: 0.2.2 I don't have any non-integer values in mind yet. So I say we cross that bridge when we get to it. +``` diff --git a/proposals/168-reduce-circwindow.txt b/proposals/168-reduce-circwindow.txt index 9932ff6..48fc146 100644 --- a/proposals/168-reduce-circwindow.txt +++ b/proposals/168-reduce-circwindow.txt @@ -1,3 +1,4 @@ +``` Filename: 168-reduce-circwindow.txt Title: Reduce default circuit window Author: Roger Dingledine @@ -132,3 +133,4 @@ Status: Rejected isn't very complex. Let's shoot for that, and fall back to (b) if the patch turns out to be so big that we reconsider. +``` diff --git a/proposals/169-eliminating-renegotiation.txt b/proposals/169-eliminating-renegotiation.txt index fe4cd58..36f8acd 100644 --- a/proposals/169-eliminating-renegotiation.txt +++ b/proposals/169-eliminating-renegotiation.txt @@ -1,3 +1,4 @@ +``` Filename: 169-eliminating-renegotiation.txt Title: Eliminate TLS renegotiation for the Tor connection handshake Author: Nick Mathewson @@ -404,3 +405,4 @@ Superseded-By: 176 now, I think they should just get it. Eventually we can deprecate the V2 handshake as we did with the V1 handshake. +``` diff --git a/proposals/170-user-path-config.txt b/proposals/170-user-path-config.txt index 42163f1..da85700 100644 --- a/proposals/170-user-path-config.txt +++ b/proposals/170-user-path-config.txt @@ -1,3 +1,4 @@ +``` Title: Configuration options regarding circuit building Filename: 170-user-path-config.txt Author: Sebastian Hahn @@ -93,3 +94,4 @@ Compatibility: The old Strict*Nodes options are deprecated, and the StrictNodes option is new. Tor users may need to update their configuration file. +``` diff --git a/proposals/171-separate-streams.txt b/proposals/171-separate-streams.txt index 01668a4..f482b09 100644 --- a/proposals/171-separate-streams.txt +++ b/proposals/171-separate-streams.txt @@ -1,3 +1,4 @@ +``` Filename: 171-separate-streams.txt Title: Separate streams across circuits by connection metadata Author: Robert Hogan, Jacob Appelbaum, Damon McCoy, Nick Mathewson @@ -356,3 +357,4 @@ Lingering questions: I suspect there are issues remaining with DNS and TransPort users, and that my "just use AutomapHostsOnResolve" suggestion may be insufficient. +``` diff --git a/proposals/172-circ-getinfo-option.txt b/proposals/172-circ-getinfo-option.txt index 38b0da7..9c9cea7 100644 --- a/proposals/172-circ-getinfo-option.txt +++ b/proposals/172-circ-getinfo-option.txt @@ -1,3 +1,4 @@ +``` Filename: 172-circ-getinfo-option.txt Title: GETINFO controller option for circuit information Author: Damian Johnson @@ -136,3 +137,4 @@ Specification: provides the same fields that would be given by calling "GETINFO rcirc/id/" with the CircID. +``` diff --git a/proposals/173-getinfo-option-expansion.txt b/proposals/173-getinfo-option-expansion.txt index 035471d..9c6cc12 100644 --- a/proposals/173-getinfo-option-expansion.txt +++ b/proposals/173-getinfo-option-expansion.txt @@ -1,3 +1,4 @@ +``` Filename: 173-getinfo-option-expansion.txt Title: GETINFO Option Expansion Author: Damian Johnson @@ -103,3 +104,4 @@ Specification: 650-EXITS_SEEN TimeStarted="2008-12-25 23:50:43" PortSummary=80=16,443=8 +``` diff --git a/proposals/174-optimistic-data-server.txt b/proposals/174-optimistic-data-server.txt index 193565b..ef34526 100644 --- a/proposals/174-optimistic-data-server.txt +++ b/proposals/174-optimistic-data-server.txt @@ -1,3 +1,4 @@ +``` Filename: 174-optimistic-data-server.txt Title: Optimistic Data for Tor: Server Side Author: Ian Goldberg @@ -241,3 +242,4 @@ Performance and scalability notes: There may be more RAM used at Exit nodes, as mentioned above, but it is transient. +``` diff --git a/proposals/175-automatic-node-promotion.txt b/proposals/175-automatic-node-promotion.txt index d6d86a6..2713a2a 100644 --- a/proposals/175-automatic-node-promotion.txt +++ b/proposals/175-automatic-node-promotion.txt @@ -1,3 +1,4 @@ +``` Filename: 175-automatic-node-promotion.txt Title: Automatically promoting Tor clients to nodes Author: Steven Murdoch @@ -238,3 +239,4 @@ Status: Rejected http://www.itl.nist.gov/div898/handbook/pmc/section3/pmc331.htm (e-Handbook of Statistical Methods) % vim: spell ai et: +``` diff --git a/proposals/176-revising-handshake.txt b/proposals/176-revising-handshake.txt index 20a3ef2..f53190a 100644 --- a/proposals/176-revising-handshake.txt +++ b/proposals/176-revising-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 176-revising-handshake.txt Title: Proposed version-3 link handshake for Tor Author: Nick Mathewson @@ -622,3 +623,4 @@ Supersedes: 169 now, I think they should just stick with V1. Eventually we can deprecate the V2 handshake as we did with the V1 handshake. When that happens, servers can be V3-only. +``` diff --git a/proposals/177-flag-abstention.txt b/proposals/177-flag-abstention.txt index cbc0819..02a4657 100644 --- a/proposals/177-flag-abstention.txt +++ b/proposals/177-flag-abstention.txt @@ -1,3 +1,4 @@ +``` Filename: 177-flag-abstention.txt Title: Abstaining from votes on individual flags Author: Nick Mathewson @@ -103,3 +104,4 @@ Examples: it is not run by wombats. (As now, "no" votes win ties.) +``` diff --git a/proposals/178-param-voting.txt b/proposals/178-param-voting.txt index 58d2a62..fc7fe25 100644 --- a/proposals/178-param-voting.txt +++ b/proposals/178-param-voting.txt @@ -1,3 +1,4 @@ +``` Filename: 178-param-voting.txt Title: Require majority of authorities to vote for consensus parameters Author: Sebastian Hahn @@ -99,3 +100,4 @@ Implementation: An example implementation of this feature can be found in https://gitweb.torproject.org/sebastian/tor.git, branch safer_params. +``` diff --git a/proposals/179-TLS-cert-and-parameter-normalization.txt b/proposals/179-TLS-cert-and-parameter-normalization.txt index 4272d4f..cf455a8 100644 --- a/proposals/179-TLS-cert-and-parameter-normalization.txt +++ b/proposals/179-TLS-cert-and-parameter-normalization.txt @@ -1,3 +1,4 @@ +``` Filename: 179-TLS-cert-and-parameter-normalization.txt Title: TLS certificate and parameter normalization Author: Jacob Appelbaum, Gladys Shufflebottom @@ -384,3 +385,4 @@ present in the Tor TLS setup process? [4] httpd-2.2.17/modules/ss/ssl_engine_dh.c [5] http://tools.ietf.org/html/rfc4419 [6] http://archives.seul.org/or/dev/Jan-2011/msg00037.html +``` diff --git a/proposals/180-pluggable-transport.txt b/proposals/180-pluggable-transport.txt index c23e5fa..8626375 100644 --- a/proposals/180-pluggable-transport.txt +++ b/proposals/180-pluggable-transport.txt @@ -1,3 +1,4 @@ +``` Filename: 180-pluggable-transport.txt Title: Pluggable transports for circumvention Author: Jacob Appelbaum, Nick Mathewson @@ -548,3 +549,4 @@ Appendix: recommendations for transports protocols -- and in many cases, most possible variants of a given protocol won't actually exist in the wild. +``` diff --git a/proposals/181-optimistic-data-client.txt b/proposals/181-optimistic-data-client.txt index 6d0a929..e1544df 100644 --- a/proposals/181-optimistic-data-client.txt +++ b/proposals/181-optimistic-data-client.txt @@ -1,3 +1,4 @@ +``` Filename: 181-optimistic-data-client.txt Title: Optimistic Data for Tor: Client Side Author: Ian Goldberg @@ -126,3 +127,4 @@ Performance and scalability notes: OPs may queue a little more data, if the SOCKS client pushes it faster than the OP can write it out. But that's also true today after the SOCKS CONNECT returns success, right? +``` diff --git a/proposals/182-creditbucket.txt b/proposals/182-creditbucket.txt index fc3cb17..b462a61 100644 --- a/proposals/182-creditbucket.txt +++ b/proposals/182-creditbucket.txt @@ -1,3 +1,4 @@ +``` Filename: 182-creditbucket.txt Title: Credit Bucket Author: Florian Tschorsch and Björn Scheuermann @@ -181,3 +182,4 @@ References: [1] Karsten Loesing. Analysis of Circuit Queues in Tor. August 25, 2009. [2] https://trac.torproject.org/projects/tor/wiki/sponsors/SponsorD/June2011 +``` diff --git a/proposals/183-refillintervals.txt b/proposals/183-refillintervals.txt index 81ff5b0..b2425fd 100644 --- a/proposals/183-refillintervals.txt +++ b/proposals/183-refillintervals.txt @@ -1,3 +1,4 @@ +``` Filename: 183-refillintervals.txt Title: Refill Intervals Author: Florian Tschorsch and Björn Scheuermann @@ -88,3 +89,4 @@ References: [1] Karsten Loesing. Analysis of Circuit Queues in Tor. August 25, 2009. [2] https://trac.torproject.org/projects/tor/wiki/sponsors/SponsorD/June2011 +``` diff --git a/proposals/184-v3-link-protocol.txt b/proposals/184-v3-link-protocol.txt index 820e779..5de9294 100644 --- a/proposals/184-v3-link-protocol.txt +++ b/proposals/184-v3-link-protocol.txt @@ -1,3 +1,4 @@ +``` Filename: 184-v3-link-protocol.txt Title: Miscellaneous changes for a v3 Tor link protocol Author: Nick Mathewson @@ -96,3 +97,4 @@ Notes on future-proofing: tweaking the link protocol to have a variable-length cell type encoding. +``` diff --git a/proposals/185-dir-without-dirport.txt b/proposals/185-dir-without-dirport.txt index 65cfd43..21c5b8c 100644 --- a/proposals/185-dir-without-dirport.txt +++ b/proposals/185-dir-without-dirport.txt @@ -1,3 +1,4 @@ +``` Filename: 185-dir-without-dirport.txt Title: Directory caches without DirPort Author: Nick Mathewson @@ -47,3 +48,4 @@ Consensus: as a directory cache. This does not require a new version of the consensus algorithm. +``` diff --git a/proposals/186-multiple-orports.txt b/proposals/186-multiple-orports.txt index f66ad83..f29d1c6 100644 --- a/proposals/186-multiple-orports.txt +++ b/proposals/186-multiple-orports.txt @@ -1,3 +1,4 @@ +``` Filename: 186-multiple-orports.txt Title: Multiple addresses for one OR or bridge Author: Nick Mathewson @@ -283,3 +284,4 @@ TODO: * Come up with a better alternative to running6 for the longterm? +``` diff --git a/proposals/187-allow-client-auth.txt b/proposals/187-allow-client-auth.txt index 67c878e..b461b92 100644 --- a/proposals/187-allow-client-auth.txt +++ b/proposals/187-allow-client-auth.txt @@ -1,3 +1,4 @@ +``` Filename: 187-allow-client-auth.txt Title: Reserve a cell type to allow client authorization Author: Nick Mathewson @@ -129,3 +130,4 @@ Counterargument: it's too late! break their connections only to a couple of alpha versions which one hopes by then will be long-deprecated already. +``` diff --git a/proposals/188-bridge-guards.txt b/proposals/188-bridge-guards.txt index 2a74416..51f7139 100644 --- a/proposals/188-bridge-guards.txt +++ b/proposals/188-bridge-guards.txt @@ -1,3 +1,4 @@ +``` Filename: 188-bridge-guards.txt Title: Bridge Guards and other anti-enumeration defenses Author: Nick Mathewson, Isis Lovecruft @@ -520,3 +521,4 @@ Status: Reserve What fraction of our traffic is bridge traffic? Will this alter our circuit selection weights? +``` diff --git a/proposals/189-authorize-cell.txt b/proposals/189-authorize-cell.txt index 4836c5f..14d9a77 100644 --- a/proposals/189-authorize-cell.txt +++ b/proposals/189-authorize-cell.txt @@ -1,3 +1,4 @@ +``` Filename: 189-authorize-cell.txt Title: AUTHORIZE and AUTHORIZED cells Author: George Kadianakis @@ -138,3 +139,4 @@ Status: Obsolete This proposal does not try to specify how a bridge can avoid detection by an adversary. +``` diff --git a/proposals/190-shared-secret-bridge-authorization.txt b/proposals/190-shared-secret-bridge-authorization.txt index 31c692b..8c9d45b 100644 --- a/proposals/190-shared-secret-bridge-authorization.txt +++ b/proposals/190-shared-secret-bridge-authorization.txt @@ -1,3 +1,4 @@ +``` Filename: 190-shared-secret-bridge-authorization.txt Title: Bridge Client Authorization Based on a Shared Secret Author: George Kadianakis @@ -101,3 +102,4 @@ Notes: This is obsoleted by pluggable transports. Thanks to Nick Mathewson and Robert Ransom for the help and suggestions while writing this proposal. +``` diff --git a/proposals/191-mitm-bridge-detection-resistance.txt b/proposals/191-mitm-bridge-detection-resistance.txt index a4689bb..4faf60d 100644 --- a/proposals/191-mitm-bridge-detection-resistance.txt +++ b/proposals/191-mitm-bridge-detection-resistance.txt @@ -1,3 +1,4 @@ +``` Filename: 191-mitm-bridge-detection-resistance.txt Title: Bridge Detection Resistance against MITM-capable Adversaries Author: George Kadianakis @@ -161,3 +162,4 @@ Status: Obsolete Thanks to Robert Ransom for his great help and suggestions on devising this scheme and writing this proposal! +``` diff --git a/proposals/192-store-bridge-information.txt b/proposals/192-store-bridge-information.txt index fe7d016..4e2dee0 100644 --- a/proposals/192-store-bridge-information.txt +++ b/proposals/192-store-bridge-information.txt @@ -1,3 +1,4 @@ +``` Filename: 192-store-bridge-information.txt Title: Automatically retrieve and store information about bridges Author: Sebastian Hahn @@ -135,3 +136,4 @@ the bridge authority side doesn't need any changes. The new configuration options governing the behaviour of Tor would be incompatible with previous versions, so the torrc needs to be adapted. The state file changes should not affect older versions. +``` diff --git a/proposals/193-safe-cookie-authentication.txt b/proposals/193-safe-cookie-authentication.txt index a3717fe..c97fcbb 100644 --- a/proposals/193-safe-cookie-authentication.txt +++ b/proposals/193-safe-cookie-authentication.txt @@ -1,3 +1,4 @@ +``` Filename: 193-safe-cookie-authentication.txt Title: Safe cookie authentication for Tor controllers Author: Robert Ransom @@ -142,3 +143,4 @@ Rationale: to keep controllers from using the server as an oracle for its own challenges (it could be replaced with a hash function). +``` diff --git a/proposals/194-mnemonic-urls.txt b/proposals/194-mnemonic-urls.txt index aeae092..0dfbfc0 100644 --- a/proposals/194-mnemonic-urls.txt +++ b/proposals/194-mnemonic-urls.txt @@ -1,3 +1,4 @@ +``` Filename: 194-mnemonic-urls.txt Title: Mnemonic .onion URLs Author: Sai, Alex Fink @@ -198,3 +199,4 @@ https://github.com/hellais/Onion-url/blob/master/dev/mnemonic.py [17] http://www.reddit.com/r/technology/comments/ecllk [18] http://wordnet.princeton.edu/wordnet/man2.1/wnstats.7WN.html +``` diff --git a/proposals/195-TLS-normalization-for-024.txt b/proposals/195-TLS-normalization-for-024.txt index bfc8d9a..8b3d8a9 100644 --- a/proposals/195-TLS-normalization-for-024.txt +++ b/proposals/195-TLS-normalization-for-024.txt @@ -1,3 +1,4 @@ +``` Filename: 195-TLS-normalization-for-024.txt Title: TLS certificate normalization for Tor 0.2.4.x Author: Jacob Appelbaum, Gladys Shufflebottom, Nick Mathewson, Tim Wilde @@ -168,3 +169,4 @@ Target: 0.2.4.x plausible way would probably be an implementation bug in OpenSSL or something. +``` diff --git a/proposals/196-transport-control-ports.txt b/proposals/196-transport-control-ports.txt index f4d8a0e..972ddb3 100644 --- a/proposals/196-transport-control-ports.txt +++ b/proposals/196-transport-control-ports.txt @@ -1,3 +1,4 @@ +``` Filename: 196-transport-control-ports.txt Title: Extended ORPort and TransportControlPort Author: George Kadianakis, Nick Mathewson @@ -238,3 +239,4 @@ Implemented-In: 0.2.5.2-alpha control information with the Tor client. The current proposal doesn't yet support this, but we should not add functionality that will prevent it from being possible. +``` diff --git a/proposals/197-postmessage-ipc.txt b/proposals/197-postmessage-ipc.txt index da246b3..e9ae6e6 100644 --- a/proposals/197-postmessage-ipc.txt +++ b/proposals/197-postmessage-ipc.txt @@ -1,3 +1,4 @@ +``` Filename: 197-postmessage-ipc.txt Title: Message-based Inter-Controller IPC Channel Author: Mike Perry @@ -97,3 +98,4 @@ Implementation plan needed. However, Torbutton does not have immediate need for this protocol. +``` diff --git a/proposals/198-restore-clienthello-semantics.txt b/proposals/198-restore-clienthello-semantics.txt index 2a3a560..9ec5aa3 100644 --- a/proposals/198-restore-clienthello-semantics.txt +++ b/proposals/198-restore-clienthello-semantics.txt @@ -1,3 +1,4 @@ +``` Filename: 198-restore-clienthello-semantics.txt Title: Restore semantics of TLS ClientHello Author: Nick Mathewson @@ -188,3 +189,4 @@ Open questions: implications of leaking cell types and circuit IDs to a future compromise. +``` diff --git a/proposals/199-bridgefinder-integration.txt b/proposals/199-bridgefinder-integration.txt index fbabf91..4c806e7 100644 --- a/proposals/199-bridgefinder-integration.txt +++ b/proposals/199-bridgefinder-integration.txt @@ -1,3 +1,4 @@ +``` Filename: 199-bridgefinder-integration.txt Title: Integration of BridgeFinder and BridgeFinderHelper Author: Mike Perry @@ -412,3 +413,4 @@ Security Concerns: BridgeFinder and BridgeFinderHelper encountered. +``` diff --git a/proposals/200-new-create-and-extend-cells.txt b/proposals/200-new-create-and-extend-cells.txt index 1a556dc..52934c9 100644 --- a/proposals/200-new-create-and-extend-cells.txt +++ b/proposals/200-new-create-and-extend-cells.txt @@ -1,3 +1,4 @@ +``` Filename: 200-new-create-and-extend-cells.txt Title: Adding new, extensible CREATE, EXTEND, and related cells Author: Robert Ransom @@ -153,3 +154,4 @@ Bugs: type that would require it. +``` diff --git a/proposals/201-bridge-v3-reqs-stats.txt b/proposals/201-bridge-v3-reqs-stats.txt index e267cba..81503d0 100644 --- a/proposals/201-bridge-v3-reqs-stats.txt +++ b/proposals/201-bridge-v3-reqs-stats.txt @@ -1,3 +1,4 @@ +``` Filename: 201-bridge-v3-reqs-stats.txt Title: Make bridges report statistics on daily v3 network status requests Author: Karsten Loesing @@ -36,3 +37,4 @@ Specification: [0] https://metrics.torproject.org/papers/countingusers-2010-11-30.pdf +``` diff --git a/proposals/202-improved-relay-crypto.txt b/proposals/202-improved-relay-crypto.txt index e9a1fd1..4913f98 100644 --- a/proposals/202-improved-relay-crypto.txt +++ b/proposals/202-improved-relay-crypto.txt @@ -1,3 +1,4 @@ +``` Filename: 202-improved-relay-crypto.txt Title: Two improved relay encryption protocols for Tor cells Author: Nick Mathewson @@ -817,3 +818,4 @@ R. References [23R] The 23 Raccoons, "Analysis of the Relative Severity of Tagging Attacks" http://archives.seul.org/or/dev/Mar-2012/msg00019.html (You'll want to read the rest of the thread too.) +``` diff --git a/proposals/203-https-frontend.txt b/proposals/203-https-frontend.txt index 4bbb271..e9e83c1 100644 --- a/proposals/203-https-frontend.txt +++ b/proposals/203-https-frontend.txt @@ -1,3 +1,4 @@ +``` Filename: 203-https-frontend.txt Title: Avoiding censorship by impersonating an HTTPS server Author: Nick Mathewson @@ -275,3 +276,4 @@ Related work: (high collateral damage). 1. https://trac.torproject.org/projects/tor/wiki/doc/meek +``` diff --git a/proposals/204-hidserv-subdomains.txt b/proposals/204-hidserv-subdomains.txt index 056fbad..aee5727 100644 --- a/proposals/204-hidserv-subdomains.txt +++ b/proposals/204-hidserv-subdomains.txt @@ -1,3 +1,4 @@ +``` Filename: 204-hidserv-subdomains.txt Title: Subdomain support for Hidden Service addresses Author: Alessandro Preite Martinez @@ -27,3 +28,4 @@ Status: Closed simply as "aaaaaaaaaaaaaaaa.onion". +``` diff --git a/proposals/205-local-dnscache.txt b/proposals/205-local-dnscache.txt index d0a0107..b7c8aa0 100644 --- a/proposals/205-local-dnscache.txt +++ b/proposals/205-local-dnscache.txt @@ -1,3 +1,4 @@ +``` Filename: 205-local-dnscache.txt Title: Remove global client-side DNS caching Author: Nick Mathewson @@ -157,3 +158,4 @@ Status: Closed without most of the security issues, if we restrict it to DNSSec-signed answers. +``` diff --git a/proposals/206-directory-sources.txt b/proposals/206-directory-sources.txt index d81b2f6..bdb6481 100644 --- a/proposals/206-directory-sources.txt +++ b/proposals/206-directory-sources.txt @@ -1,3 +1,4 @@ +``` Filename: 206-directory-sources.txt Title: Preconfigured directory sources for bootstrapping Author: Nick Mathewson @@ -87,3 +88,4 @@ Some notes on security: +``` diff --git a/proposals/207-directory-guards.txt b/proposals/207-directory-guards.txt index 8d21d3e..51dcdbf 100644 --- a/proposals/207-directory-guards.txt +++ b/proposals/207-directory-guards.txt @@ -1,3 +1,4 @@ +``` Filename: 207-directory-guards.txt Title: Directory guards Author: Nick Mathewson @@ -52,3 +53,4 @@ Open questions and notes: +``` diff --git a/proposals/208-ipv6-exits-redux.txt b/proposals/208-ipv6-exits-redux.txt index 32fb09c..fd0adfa 100644 --- a/proposals/208-ipv6-exits-redux.txt +++ b/proposals/208-ipv6-exits-redux.txt @@ -1,3 +1,4 @@ +``` Filename: 208-ipv6-exits-redux.txt Title: IPv6 Exits Redux Author: Nick Mathewson @@ -125,3 +126,4 @@ Implemented-In: 0.2.4.7-alpha This makes proposal 205 especially necessary here. +``` diff --git a/proposals/209-path-bias-tuning.txt b/proposals/209-path-bias-tuning.txt index 7d02422..fcdaf78 100644 --- a/proposals/209-path-bias-tuning.txt +++ b/proposals/209-path-bias-tuning.txt @@ -1,3 +1,4 @@ +``` Filename: 209-path-bias-tuning.txt Title: Tuning the Parameters for the Path Bias Defense Author: Mike Perry @@ -286,3 +287,4 @@ Implementation Notes: Differences between proposal and current source 3. https://gitweb.torproject.org/torflow.git/tree/HEAD:/CircuitAnalysis/PathBias 4. https://github.com/meejah/txtorcon/blob/exit_scanner/apps/exit_scanner/failure-rate-scanner.py 5. See 2.4.1 of path-spec.txt for further details on circuit timeout calculations. +``` diff --git a/proposals/210-faster-headless-consensus-bootstrap.txt b/proposals/210-faster-headless-consensus-bootstrap.txt index 380a9ac..3bf8760 100644 --- a/proposals/210-faster-headless-consensus-bootstrap.txt +++ b/proposals/210-faster-headless-consensus-bootstrap.txt @@ -1,3 +1,4 @@ +``` Filename: 210-faster-headless-consensus-bootstrap.txt Title: Faster Headless Consensus Bootstrapping Author: Mike Perry, Tim Wilson-Brown, Peter Palfrader @@ -236,3 +237,4 @@ Reliability Analysis among a larger number of directory mirrors. In addition, if all the authorities are blocked, current clients will inevitably fail, as they do not have a list of directory mirrors. +``` diff --git a/proposals/211-mapaddress-tor-status.txt b/proposals/211-mapaddress-tor-status.txt index 28be3bb..5dbe445 100644 --- a/proposals/211-mapaddress-tor-status.txt +++ b/proposals/211-mapaddress-tor-status.txt @@ -1,3 +1,4 @@ +``` Filename: 211-mapaddress-tor-status.txt Title: Internal Mapaddress for Tor Configuration Testing Author: Mike Perry @@ -143,3 +144,4 @@ Security Considerations 1. http://www.hpenterprisesecurity.com/vulncat/en/vulncat/dotnet/javascript_hijacking_vulnerable_framework.html +``` diff --git a/proposals/212-using-old-consensus.txt b/proposals/212-using-old-consensus.txt index 3fd9839..621466e 100644 --- a/proposals/212-using-old-consensus.txt +++ b/proposals/212-using-old-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 212-using-old-consensus.txt Title: Increase Acceptable Consensus Age Author: Mike Perry @@ -107,3 +108,4 @@ Implementation Notes still attempting to fetch new ones. 1. https://trac.torproject.org/projects/tor/ticket/7126 +``` diff --git a/proposals/213-remove-stream-sendmes.txt b/proposals/213-remove-stream-sendmes.txt index f2b8b34..18b51f3 100644 --- a/proposals/213-remove-stream-sendmes.txt +++ b/proposals/213-remove-stream-sendmes.txt @@ -1,3 +1,4 @@ +``` Filename: 213-remove-stream-sendmes.txt Title: Remove stream-level sendmes from the design Author: Roger Dingledine @@ -150,3 +151,4 @@ Status: Dead since it lacks any stream-level pushback for streams that are blocking on writes. Nicely done! +``` diff --git a/proposals/214-longer-circids.txt b/proposals/214-longer-circids.txt index b5bd88a..54675ac 100644 --- a/proposals/214-longer-circids.txt +++ b/proposals/214-longer-circids.txt @@ -1,3 +1,4 @@ +``` Filename: 214-longer-circids.txt Title: Allow 4-byte circuit IDs in a new link protocol Author: Nick Mathewson @@ -92,3 +93,4 @@ Implemented-In: 0.2.4.11-alpha implementation in branch "wide_circ_ids" in my public repository. Be afraid! More testing is needed! +``` diff --git a/proposals/215-update-min-consensus-ver.txt b/proposals/215-update-min-consensus-ver.txt index 899a943..c6fba59 100644 --- a/proposals/215-update-min-consensus-ver.txt +++ b/proposals/215-update-min-consensus-ver.txt @@ -1,3 +1,4 @@ +``` Filename: 215-update-min-consensus-ver.txt Title: Let the minimum consensus method change with time Author: Nick Mathewson @@ -93,3 +94,4 @@ Implemented-In: 0.2.6.1-alpha at all." That's harder to program, though. +``` diff --git a/proposals/216-ntor-handshake.txt b/proposals/216-ntor-handshake.txt index f76e81c..a96dd83 100644 --- a/proposals/216-ntor-handshake.txt +++ b/proposals/216-ntor-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 216-ntor-handshake.txt Title: Improved circuit-creation key exchange Author: Nick Mathewson @@ -211,3 +212,4 @@ Test vectors for HKDF-SHA256: b4dc21d69363e2895321c06184879d94b18f0784 11be70b767c7fc40679a9440a0c95ea83a23efbf +``` diff --git a/proposals/217-ext-orport-auth.txt b/proposals/217-ext-orport-auth.txt index 3734924..6a61a65 100644 --- a/proposals/217-ext-orport-auth.txt +++ b/proposals/217-ext-orport-auth.txt @@ -1,3 +1,4 @@ +``` Filename: 217-ext-orport-auth.txt Title: Tor Extended ORPort Authentication Author: George Kadianakis @@ -175,3 +176,4 @@ http://archives.seul.org/or/announce/Sep-2007/msg00000.html [1]: https://gitweb.torproject.org/torspec.git/blob/79f488c32c43562522e5592f2c19952dc7681a65:/control-spec.txt#l1069 +``` diff --git a/proposals/218-usage-controller-events.txt b/proposals/218-usage-controller-events.txt index 76c64cd..f709550 100644 --- a/proposals/218-usage-controller-events.txt +++ b/proposals/218-usage-controller-events.txt @@ -1,3 +1,4 @@ +``` Filename: 218-usage-controller-events.txt Title: Controller events to better understand connection/circuit usage Author: Rob Jansen, Karsten Loesing @@ -219,3 +220,4 @@ Implemented-In: 0.2.5.2-alpha as small as possible. Still, we should make sure that memory requirements won't grow significantly on busy relays. +``` diff --git a/proposals/219-expanded-dns.txt b/proposals/219-expanded-dns.txt index 7298b78..86b3f1a 100644 --- a/proposals/219-expanded-dns.txt +++ b/proposals/219-expanded-dns.txt @@ -1,3 +1,4 @@ +``` Filename: 219-expanded-dns.txt Title: Support for full DNS and DNSSEC resolution in Tor Authors: Ondrej Mikle @@ -346,3 +347,4 @@ Status: Needs-Revision References: [1] https://www.ietf.org/mail-archive/web/dane/current/msg02823.html +``` diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt index 21b6dac..a6e6b54 100644 --- a/proposals/220-ecc-id-keys.txt +++ b/proposals/220-ecc-id-keys.txt @@ -1,3 +1,4 @@ +``` Filename: 220-ecc-id-keys.txt Title: Migrate server identity keys to Ed25519 Authors: Nick Mathewson @@ -683,3 +684,4 @@ A.6. Related changes keys. This will improve link security, and deliver better fingerprinting resistence. See proposal 179 for an older discussion of this issue. +``` diff --git a/proposals/221-stop-using-create-fast.txt b/proposals/221-stop-using-create-fast.txt index 7903a39..2fa2209 100644 --- a/proposals/221-stop-using-create-fast.txt +++ b/proposals/221-stop-using-create-fast.txt @@ -1,3 +1,4 @@ +``` Filename: 221-stop-using-create-fast.txt Title: Stop using CREATE_FAST Authors: Nick Mathewson @@ -88,3 +89,4 @@ Status: Closed reliable signal, since "FastFirstHopPK 0" is easy enough to type, and the source code is easy enough to edit. Proposal 163 and its successors have better ideas here anyway. +``` diff --git a/proposals/222-remove-client-timestamps.txt b/proposals/222-remove-client-timestamps.txt index b2a2ae9..3af19d1 100644 --- a/proposals/222-remove-client-timestamps.txt +++ b/proposals/222-remove-client-timestamps.txt @@ -1,3 +1,4 @@ +``` Filename: 222-remove-client-timestamps.txt Title: Stop sending client timestamps Authors: Nick Mathewson @@ -248,3 +249,4 @@ Implementors might want to make this feature optional and on-by-default, just in case some higher-level application protocol really does depend on it. ================================================================== +``` diff --git a/proposals/223-ace-handshake.txt b/proposals/223-ace-handshake.txt index 5e333bb..70d34f4 100644 --- a/proposals/223-ace-handshake.txt +++ b/proposals/223-ace-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 223-ace-handshake.txt Title: Ace: Improved circuit-creation key exchange Author: Esfandiar Mohammadi, Aniket Kate, Michael Backes @@ -110,3 +111,4 @@ See also: http://www.infsec.cs.uni-saarland.de/~mohammadi/ace/ace.html for implementations, academic paper, and benchmarking code. +``` diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt index 1dfe87b..e1cba7f 100644 --- a/proposals/224-rend-spec-ng.txt +++ b/proposals/224-rend-spec-ng.txt @@ -1,3 +1,4 @@ +``` Filename: 224-rend-spec-ng.txt Title: Next-Generation Hidden Services in Tor Author: David Goulet, George Kadianakis, Nick Mathewson @@ -2368,3 +2369,4 @@ Appendix E. Managing authorized client data [CLIENT-AUTH-MGMT] [XXX what happens when people use both the control port interface and the filesystem interface?] +``` diff --git a/proposals/225-strawman-shared-rand.txt b/proposals/225-strawman-shared-rand.txt index f124174..6d71327 100644 --- a/proposals/225-strawman-shared-rand.txt +++ b/proposals/225-strawman-shared-rand.txt @@ -1,3 +1,4 @@ +``` Filename: 225-strawman-shared-rand.txt Title: Strawman proposal: commit-and-reveal shared rng Author: Nick Mathewson @@ -112,3 +113,4 @@ Superseded-by: 250 (TODO: should this be its own spec? If so, does it have to use our regular metaformat or can it use something less sucky?) +``` diff --git a/proposals/226-bridgedb-database-improvements.txt b/proposals/226-bridgedb-database-improvements.txt index dd52ae6..d239a4a 100644 --- a/proposals/226-bridgedb-database-improvements.txt +++ b/proposals/226-bridgedb-database-improvements.txt @@ -1,3 +1,4 @@ +``` Filename: 226-bridgedb-database-improvements.txt Title: "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" @@ -256,3 +257,4 @@ Status: Reserve [15]: http://redis.io/commands/evalsha [16]: http://www.restmq.com/ [17]: https://www.mediawiki.org/wiki/Redis +``` diff --git a/proposals/227-vote-on-package-fingerprints.txt b/proposals/227-vote-on-package-fingerprints.txt index 8839941..8b0b472 100644 --- a/proposals/227-vote-on-package-fingerprints.txt +++ b/proposals/227-vote-on-package-fingerprints.txt @@ -1,3 +1,4 @@ +``` Filename: 227-vote-on-package-fingerprints.txt Title: Include package fingerprints in consensus documents Author: Nick Mathewson, Mike Perry @@ -145,3 +146,4 @@ Implemented-In: 0.2.6.3-alpha tool. +``` diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt index 64fe5f6..50413d3 100644 --- a/proposals/228-cross-certification-onionkeys.txt +++ b/proposals/228-cross-certification-onionkeys.txt @@ -1,3 +1,4 @@ +``` Filename: 228-cross-certification-onionkeys.txt Title: Cross-certifying identity keys with onion keys Author: Nick Mathewson @@ -166,3 +167,4 @@ C. Implementation notes * An ntor onion key. +``` diff --git a/proposals/229-further-socks5-extensions.txt b/proposals/229-further-socks5-extensions.txt index 5661536..390750f 100644 --- a/proposals/229-further-socks5-extensions.txt +++ b/proposals/229-further-socks5-extensions.txt @@ -1,3 +1,4 @@ +``` Filename: 229-further-socks5-extensions.txt Title: Further SOCKS5 extensions Author: Yawning Angel @@ -252,3 +253,4 @@ Note: These are good ideas, but it's better not to hack SOCKS any further * check it into git * clean text a little, fix redundancy * ask some questions +``` diff --git a/proposals/230-rsa1024-relay-id-migration.txt b/proposals/230-rsa1024-relay-id-migration.txt index 3a997fe..92e72d8 100644 --- a/proposals/230-rsa1024-relay-id-migration.txt +++ b/proposals/230-rsa1024-relay-id-migration.txt @@ -1,3 +1,4 @@ +``` Filename: 230-rsa1024-relay-id-migration.txt Title: How to change RSA1024 relay identity keys Authors: Nick Mathewson @@ -83,3 +84,4 @@ Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256. the descriptor. +``` diff --git a/proposals/231-migrate-authority-rsa1024-ids.txt b/proposals/231-migrate-authority-rsa1024-ids.txt index 0388cf0..af5c6af 100644 --- a/proposals/231-migrate-authority-rsa1024-ids.txt +++ b/proposals/231-migrate-authority-rsa1024-ids.txt @@ -1,3 +1,4 @@ +``` Filename: 231-migrate-authority-rsa1024-ids.txt Title: Migrating authority RSA1024 identity keys Authors: Nick Mathewson @@ -68,3 +69,4 @@ Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256. but not include them in votes or the consensus; or if they are included, don't assign them flags that will get them used. +``` diff --git a/proposals/232-pluggable-transports-through-proxy.txt b/proposals/232-pluggable-transports-through-proxy.txt index 03cee07..53b1524 100644 --- a/proposals/232-pluggable-transports-through-proxy.txt +++ b/proposals/232-pluggable-transports-through-proxy.txt @@ -1,3 +1,4 @@ +``` Filename: 232-pluggable-transports-through-proxy.txt Title: Pluggable Transport through SOCKS proxy Author: Arturo Filastò @@ -77,3 +78,4 @@ Specifications: Tor Pluggable Transport communication from its stdout and it is configured to use both a normal proxy and a pluggable transport it should kill the transport proxy. +``` diff --git a/proposals/233-quicken-tor2web-mode.txt b/proposals/233-quicken-tor2web-mode.txt index fd002c0..2821f36 100644 --- a/proposals/233-quicken-tor2web-mode.txt +++ b/proposals/233-quicken-tor2web-mode.txt @@ -1,3 +1,4 @@ +``` Filename: 233-quicken-tor2web-mode.txt Title: Making Tor2Web mode faster Author: Virgil Griffith, Fabio Pietrosanti, Giovanni Pellerano @@ -33,3 +34,4 @@ Status: Rejected [1] Tor2web mode: https://trac.torproject.org/projects/tor/ticket/2553 [2] Self-rendezvous: https://trac.torproject.org/projects/tor/ticket/9685 +``` diff --git a/proposals/234-remittance-addresses.txt b/proposals/234-remittance-addresses.txt index 712c1ed..e49830d 100644 --- a/proposals/234-remittance-addresses.txt +++ b/proposals/234-remittance-addresses.txt @@ -1,3 +1,4 @@ +``` Filename: 234-remittance-addresses.txt Title: Adding remittance field to directory specification Author: Virgil Griffith, Leif Ryge, Rob Jansen @@ -38,3 +39,4 @@ Note: Rejected. People are doing this with ContactInfo lines. (left-most) one of each currency is published in the directory consensus. +``` diff --git a/proposals/235-kill-named-flag.txt b/proposals/235-kill-named-flag.txt index 238315a..17688ed 100644 --- a/proposals/235-kill-named-flag.txt +++ b/proposals/235-kill-named-flag.txt @@ -1,3 +1,4 @@ +``` Filename: 235-kill-named-flag.txt Title: Stop assigning (and eventually supporting) the Named flag Authors: Sebastian Hahn @@ -51,3 +52,4 @@ Status: Closed 4. Open questions None. +``` diff --git a/proposals/236-single-guard-node.txt b/proposals/236-single-guard-node.txt index 7db8a67..50c734b 100644 --- a/proposals/236-single-guard-node.txt +++ b/proposals/236-single-guard-node.txt @@ -1,3 +1,4 @@ +``` Filename: 236-single-guard-node.txt Title: The move to a single guard node Author: George Kadianakis, Nicholas Hopper @@ -304,3 +305,4 @@ References: [6]: https://trac.torproject.org/projects/tor/ticket/9001 [7]: https://trac.torproject.org/projects/tor/ticket/10969 +``` diff --git a/proposals/237-directory-servers-for-all.txt b/proposals/237-directory-servers-for-all.txt index 130bd32..a25352f 100644 --- a/proposals/237-directory-servers-for-all.txt +++ b/proposals/237-directory-servers-for-all.txt @@ -1,3 +1,4 @@ +``` Filename: 237-directory-servers-for-all.txt Title: All relays are directory servers Author: Matthew Finkel @@ -131,3 +132,4 @@ Future Considerations: Is V2Dir a good name for this? It's the name we currently use, but that's a silly reason to continue using it. +``` diff --git a/proposals/238-hs-relay-stats.txt b/proposals/238-hs-relay-stats.txt index 9134003..7b263bd 100644 --- a/proposals/238-hs-relay-stats.txt +++ b/proposals/238-hs-relay-stats.txt @@ -1,3 +1,4 @@ +``` Filename: 238-hs-relay-stats.txt Title: Better hidden service stats from Tor relays Author: George Kadianakis, David Goulet, Karsten Loesing, Aaron Johnson @@ -291,3 +292,4 @@ Status: Closed [ONIONS-LAPLACE-GRAPH]: https://raw.githubusercontent.com/corcra/pioton/master/vis/laplacePDF_mu0.0_b26.67.png https://raw.githubusercontent.com/corcra/pioton/master/vis/laplaceCDF_mu0.0_b26.67.png +``` diff --git a/proposals/239-consensus-hash-chaining.txt b/proposals/239-consensus-hash-chaining.txt index 0c259dd..72738a2 100644 --- a/proposals/239-consensus-hash-chaining.txt +++ b/proposals/239-consensus-hash-chaining.txt @@ -1,3 +1,4 @@ +``` Filename: 239-consensus-hash-chaining.txt Title: Consensus Hash Chaining Author: Nick Mathewson, Andrea Shepard @@ -97,3 +98,4 @@ Status: Open * Clients MAY offer the option to retain previous consensuses in memory only to allow for validation without the potential disk leak. +``` diff --git a/proposals/240-auth-cert-revocation.txt b/proposals/240-auth-cert-revocation.txt index ae7d4b8..1128671 100644 --- a/proposals/240-auth-cert-revocation.txt +++ b/proposals/240-auth-cert-revocation.txt @@ -1,3 +1,4 @@ +``` Filename: 240-auth-cert-revocation.txt Title: Early signing key revocation for directory authorities Author: Nick Mathewson @@ -46,3 +47,4 @@ Status: Open of certificate B, and certificate B revokes the key of certificate A. Instead, I am inclined to say that this is a MUST NOT. +``` diff --git a/proposals/241-suspicious-guard-turnover.txt b/proposals/241-suspicious-guard-turnover.txt index 004feb1..16ccfb4 100644 --- a/proposals/241-suspicious-guard-turnover.txt +++ b/proposals/241-suspicious-guard-turnover.txt @@ -1,3 +1,4 @@ +``` Filename: 241-suspicious-guard-turnover.txt Title: Resisting guard-turnover attacks Author: Aaron Johnson, Nick Mathewson @@ -180,3 +181,4 @@ Appendix B. Acknowledgements Appendix C. Desirable revisions Incorporate ideas from proposal 156. +``` diff --git a/proposals/242-better-families.txt b/proposals/242-better-families.txt index 5f4ac47..c2edb54 100644 --- a/proposals/242-better-families.txt +++ b/proposals/242-better-families.txt @@ -1,3 +1,4 @@ +``` Filename: 242-better-families.txt Title: Better performance and usability for the MyFamily option Author: Nick Mathewson @@ -95,3 +96,4 @@ Superseded-by: 321-happy-families.md It's possible that families are a bad idea entirely; see ticket #6676. +``` diff --git a/proposals/243-hsdir-flag-need-stable.txt b/proposals/243-hsdir-flag-need-stable.txt index 035550b..1ed0245 100644 --- a/proposals/243-hsdir-flag-need-stable.txt +++ b/proposals/243-hsdir-flag-need-stable.txt @@ -1,3 +1,4 @@ +``` Filename: 243-hsdir-flag-need-stable.txt Title: Give out HSDir flag only to relays with Stable flag Author: George Kadianakis @@ -82,3 +83,4 @@ Implemented-in: 0.2.7 With the upcoming keyblinding scheme (#8106) and non-deterministic HSDir selection (#8244), are there any other criteria that we should use when assigning HSDir flags? +``` diff --git a/proposals/244-use-rfc5705-for-tls-binding.txt b/proposals/244-use-rfc5705-for-tls-binding.txt index 41ebfc1..faa148c 100644 --- a/proposals/244-use-rfc5705-for-tls-binding.txt +++ b/proposals/244-use-rfc5705-for-tls-binding.txt @@ -1,3 +1,4 @@ +``` Filename: 244-use-rfc5705-for-tls-binding.txt Title: Use RFC5705 Key Exporting in our AUTHENTICATE calls Author: Nick Mathewson @@ -44,3 +45,4 @@ Implemented-In: 0.3.0.1-alpha * The label string "EXPORTER FOR TOR TLS CLIENT BINDING " + TYPE * The context value equal to the client's Ed25519 identity key * The length 32. +``` diff --git a/proposals/245-tap-out.txt b/proposals/245-tap-out.txt index 4a9afd8..6edc3f9 100644 --- a/proposals/245-tap-out.txt +++ b/proposals/245-tap-out.txt @@ -1,3 +1,4 @@ +``` Filename: 245-tap-out.txt Title: Deprecating and removing the TAP circuit extension protocol Author: Nick Mathewson @@ -94,3 +95,4 @@ Status: Needs-Revision (For reference, the functions to patch would be rend_client_get_random_intro_impl and find_rp_for_intro.) +``` diff --git a/proposals/246-merge-hsdir-and-intro.txt b/proposals/246-merge-hsdir-and-intro.txt index 0a70aea..e9aa780 100644 --- a/proposals/246-merge-hsdir-and-intro.txt +++ b/proposals/246-merge-hsdir-and-intro.txt @@ -1,3 +1,4 @@ +``` Filename: 246-merge-hsdir-and-intro.txt Title: Merging Hidden Service Directories and Introduction Points Author: John Brooks, George Kadianakis @@ -302,3 +303,4 @@ Change history: References: [1] : https://lists.torproject.org/pipermail/tor-dev/2016-January/010203.html +``` diff --git a/proposals/247-hs-guard-discovery.txt b/proposals/247-hs-guard-discovery.txt index a41e025..a42161b 100644 --- a/proposals/247-hs-guard-discovery.txt +++ b/proposals/247-hs-guard-discovery.txt @@ -1,3 +1,4 @@ +``` Filename: 247-hs-guard-discovery.txt Title: Defending Against Guard Discovery Attacks using Vanguards Authors: George Kadianakis and Mike Perry @@ -757,3 +758,4 @@ CDF_table_323() ---------------------- 1. https://onionbalance.readthedocs.org/en/latest/design.html#overview +``` diff --git a/proposals/248-removing-rsa-identities.txt b/proposals/248-removing-rsa-identities.txt index eaabe41..3f05df3 100644 --- a/proposals/248-removing-rsa-identities.txt +++ b/proposals/248-removing-rsa-identities.txt @@ -1,3 +1,4 @@ +``` Filename: 248-removing-rsa-identities.txt Title: Remove all RSA identity keys Authors: Nick Mathewson @@ -86,3 +87,4 @@ Status: Needs-Revision make the phase 2 and phase 3 changes. +``` diff --git a/proposals/249-large-create-cells.txt b/proposals/249-large-create-cells.txt index 4be3e26..fdc80e2 100644 --- a/proposals/249-large-create-cells.txt +++ b/proposals/249-large-create-cells.txt @@ -1,3 +1,4 @@ +``` Filename: 249-large-create-cells.txt Title: Allow CREATE cells with >505 bytes of handshake data Authors: Nick Mathewson, Isis Lovecruft @@ -276,3 +277,4 @@ Appendix B. Acknowledgements This research was supported in part by NSF grants CNS-1111539, CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548. +``` diff --git a/proposals/250-commit-reveal-consensus.txt b/proposals/250-commit-reveal-consensus.txt index c9711aa..f9821e9 100644 --- a/proposals/250-commit-reveal-consensus.txt +++ b/proposals/250-commit-reveal-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 250-commit-reveal-consensus.txt Title: Random Number Generation During Tor Voting Authors: David Goulet, George Kadianakis @@ -640,3 +641,4 @@ References: [RNGMESSAGING]: https://moderncrypto.org/mail-archive/messaging/2015/002032.html +``` diff --git a/proposals/251-netflow-padding.txt b/proposals/251-netflow-padding.txt index 39cc795..c7a2ef4 100644 --- a/proposals/251-netflow-padding.txt +++ b/proposals/251-netflow-padding.txt @@ -1,3 +1,4 @@ +``` Filename: 251-netflow-padding.txt Title: Padding for netflow record resolution reduction Authors: Mike Perry @@ -363,3 +364,4 @@ Appendix A: Padding Cell Timeout Distribution Statistics 13. https://gitweb.torproject.org/torspec.git/tree/proposals/188-bridge-guards.txt 14. http://www.ntop.org/wp-content/uploads/2013/03/nProbe_UserGuide.pdf 15. http://infodoc.alcatel-lucent.com/html/0_add-h-f/93-0073-10-01/7750_SR_OS_Router_Configuration_Guide/Cflowd-CLI.html +``` diff --git a/proposals/252-single-onion.txt b/proposals/252-single-onion.txt index ddd78ea..c9b4c24 100644 --- a/proposals/252-single-onion.txt +++ b/proposals/252-single-onion.txt @@ -1,3 +1,4 @@ +``` Filename: 252-single-onion.txt Title: Single Onion Services Author: John Brooks, Paul Syverson, Roger Dingledine @@ -257,3 +258,4 @@ Superseded-by: 260 Tor circuit. In speech we sometimes use the even briefer, 'two-nion' and 'one-ion' respectively. +``` diff --git a/proposals/253-oob-hmac.txt b/proposals/253-oob-hmac.txt index 9e9e1d7..c7abbd9 100644 --- a/proposals/253-oob-hmac.txt +++ b/proposals/253-oob-hmac.txt @@ -1,3 +1,4 @@ +``` Filename: 253-oob-hmac.txt Title: Out of Band Circuit HMACs Authors: Mike Perry @@ -270,3 +271,4 @@ AES-NI[2]. 1. https://lists.torproject.org/pipermail/tor-dev/2012-March/003347.html 2. http://archives.seul.org/tor/dev/Mar-2015/msg00137.html +``` diff --git a/proposals/254-padding-negotiation.txt b/proposals/254-padding-negotiation.txt index 5ab5341..84b1d1b 100644 --- a/proposals/254-padding-negotiation.txt +++ b/proposals/254-padding-negotiation.txt @@ -1,3 +1,4 @@ +``` Filename: 254-padding-negotiation.txt Title: Padding Negotiation Authors: Mike Perry @@ -416,3 +417,4 @@ close the circuit upon detecting this activity. 1. https://gitweb.torproject.org/torspec.git/tree/proposals/251-netflow-padding.txt 2. https://www.cs.kau.se/pulls/hot/thebasketcase-wtfpad/ 3. https://www.cs.kau.se/pulls/hot/thebasketcase-ape/ +``` diff --git a/proposals/255-hs-load-balancing.txt b/proposals/255-hs-load-balancing.txt index 16657d0..136969d 100644 --- a/proposals/255-hs-load-balancing.txt +++ b/proposals/255-hs-load-balancing.txt @@ -1,3 +1,4 @@ +``` Filename: 255-hs-load-balancing.txt Title: Controller features to allow for load-balancing hidden services Author: Tom van der Woerdt @@ -156,3 +157,4 @@ the controller. The developer of the tor implementation should not have to choose between a round-robin algorithm and something that could pull CPU load averages from a centralized monitoring system. +``` diff --git a/proposals/256-key-revocation.txt b/proposals/256-key-revocation.txt index bbccaf9..e512471 100644 --- a/proposals/256-key-revocation.txt +++ b/proposals/256-key-revocation.txt @@ -1,3 +1,4 @@ +``` Filename: 256-key-revocation.txt Title: Key revocation for relays and authorities Authors: Nick Mathewson @@ -240,3 +241,4 @@ Status: Reserve NOT trust any signing key certificate with a matching key. +``` diff --git a/proposals/257-hiding-authorities.txt b/proposals/257-hiding-authorities.txt index 9c32f90..cdb49d9 100644 --- a/proposals/257-hiding-authorities.txt +++ b/proposals/257-hiding-authorities.txt @@ -1,3 +1,4 @@ +``` Filename: 257-hiding-authorities.txt Title: Refactoring authorities and making them more isolated from the net Authors: Nick Mathewson, Andrea Shepard @@ -211,3 +212,4 @@ A.1. Check-then-start TLS (We shouldn't do this for all the TLS in Tor: only for the cases where we want to restrict the users of a given TLS server.) +``` diff --git a/proposals/258-dirauth-dos.txt b/proposals/258-dirauth-dos.txt index 91ffd37..aa65d79 100644 --- a/proposals/258-dirauth-dos.txt +++ b/proposals/258-dirauth-dos.txt @@ -1,3 +1,4 @@ +``` Filename: 258-dirauth-dos.txt Title: Denial-of-service resistance for directory authorities Author: Andrea Shepard @@ -109,3 +110,4 @@ Status: Dead Widely distributed DoS attacks with many source IPs may still be able to avoid raising any single DIRIND_ONEHOP or DIRIND_DIRECT_CONN counter above threshold. +``` diff --git a/proposals/259-guard-selection.txt b/proposals/259-guard-selection.txt index 30bdcfa..76ee9b5 100644 --- a/proposals/259-guard-selection.txt +++ b/proposals/259-guard-selection.txt @@ -1,3 +1,4 @@ +``` Filename: 259-guard-selection.txt Title: New Guard Selection Behaviour Author: Isis Lovecruft, George Kadianakis @@ -302,3 +303,4 @@ This proposal was made obsolete by proposal #271. -*- coding: utf-8 -*- +``` diff --git a/proposals/260-rend-single-onion.txt b/proposals/260-rend-single-onion.txt index c4f2617..08ca33a 100644 --- a/proposals/260-rend-single-onion.txt +++ b/proposals/260-rend-single-onion.txt @@ -1,3 +1,4 @@ +``` Filename: 260-rend-single-onion.txt Title: Rendezvous Single Onion Services Author: Tim Wilson-Brown, John Brooks, Aaron Johnson, Rob Jansen, George Kadianakis, Paul Syverson, Roger Dingledine @@ -460,3 +461,4 @@ splitting described in section 8. Here are some initial ideas. be more comfortable enabling submission over an onion service, due to the additional security benefits. +``` diff --git a/proposals/261-aez-crypto.txt b/proposals/261-aez-crypto.txt index f9c652e..1a6c108 100644 --- a/proposals/261-aez-crypto.txt +++ b/proposals/261-aez-crypto.txt @@ -1,3 +1,4 @@ +``` Filename: 261-aez-crypto.txt Title: AEZ for relay cryptography Author: Nick Mathewson @@ -280,3 +281,4 @@ A.3. Performance notes: what if we don't have AESNI? Preliminary results are a bit disappointing, though, so I'll need to invetigate alternatives as well.] +``` diff --git a/proposals/262-rekey-circuits.txt b/proposals/262-rekey-circuits.txt index f639d1d..9f933f0 100644 --- a/proposals/262-rekey-circuits.txt +++ b/proposals/262-rekey-circuits.txt @@ -1,3 +1,4 @@ +``` Filename: 262-rekey-circuits.txt Title: Re-keying live circuits with new cryptographic material Author: Nick Mathewson @@ -132,3 +133,4 @@ Status: Reserve in the presence of traffic analysis. +``` diff --git a/proposals/263-ntru-for-pq-handshake.txt b/proposals/263-ntru-for-pq-handshake.txt index 6a3353e..f4d97d4 100644 --- a/proposals/263-ntru-for-pq-handshake.txt +++ b/proposals/263-ntru-for-pq-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 263-ntru-for-pq-handshake.txt Title: Request to change key exchange protocol for handshake v1.2 Author: John SCHANCK, William WHYTE and Zhenfei ZHANG @@ -313,3 +314,4 @@ This proposal was made obsolete by proposal #269. +``` diff --git a/proposals/264-subprotocol-versions.txt b/proposals/264-subprotocol-versions.txt index bd58125..9ccb803 100644 --- a/proposals/264-subprotocol-versions.txt +++ b/proposals/264-subprotocol-versions.txt @@ -1,3 +1,4 @@ +``` Filename: 264-subprotocol-versions.txt Title: Putting version numbers on the Tor subprotocols Author: Nick Mathewson @@ -547,3 +548,4 @@ A.3. Example integration with other open proposals New Relay protocol version. +``` diff --git a/proposals/265-load-balancing-with-overhead.txt b/proposals/265-load-balancing-with-overhead.txt index 731a5b0..43110ba 100644 --- a/proposals/265-load-balancing-with-overhead.txt +++ b/proposals/265-load-balancing-with-overhead.txt @@ -1,3 +1,4 @@ +``` Filename: 265-load-balancing-with-overhead.txt Title: Load Balancing with Overhead Parameters Authors: Mike Perry @@ -359,3 +360,4 @@ combined = solve( Wme, Wmg, Wgg, Wee) pprint(combined) +``` diff --git a/proposals/266-removing-current-obsolete-clients.txt b/proposals/266-removing-current-obsolete-clients.txt index a4cc75c..c266ce1 100644 --- a/proposals/266-removing-current-obsolete-clients.txt +++ b/proposals/266-removing-current-obsolete-clients.txt @@ -1,3 +1,4 @@ +``` Filename: 266-removing-current-obsolete-clients.txt Title: Removing current obsolete clients from the Tor network Author: Nick Mathewson @@ -259,3 +260,4 @@ B. Next steps. http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-02-12-15.01.log.html has a more full discussion of the above ideas. +``` diff --git a/proposals/267-tor-consensus-transparency.txt b/proposals/267-tor-consensus-transparency.txt index 117b76a..f5ea26e 100644 --- a/proposals/267-tor-consensus-transparency.txt +++ b/proposals/267-tor-consensus-transparency.txt @@ -1,3 +1,4 @@ +``` Filename: 267-tor-consensus-transparency.txt Title: Tor Consensus Transparency Author: Linus Nordberg @@ -361,3 +362,4 @@ C. References [RFC4627] https://tools.ietf.org/html/rfc4627 [rfc6962-bis-12] https://datatracker.ietf.org/doc/draft-ietf-trans-rfc6962-bis/12 [CT] https://https://www.certificate-transparency.org/ +``` diff --git a/proposals/268-guard-selection.txt b/proposals/268-guard-selection.txt index 3417b54..2d50790 100644 --- a/proposals/268-guard-selection.txt +++ b/proposals/268-guard-selection.txt @@ -1,3 +1,4 @@ +``` Filename: 268-guard-selection.txt Title: New Guard Selection Behaviour Author: Isis Lovecruft, George Kadianakis, [Ola Bini] @@ -507,3 +508,4 @@ Status: Obsolete version we can't recognize or it was chosen more than GUARD_LIFETIME ago. -*- coding: utf-8 -*- +``` diff --git a/proposals/269-hybrid-handshake.txt b/proposals/269-hybrid-handshake.txt index 4ab7e19..0f32944 100644 --- a/proposals/269-hybrid-handshake.txt +++ b/proposals/269-hybrid-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 269-hybrid-handshake.txt Title: Transitionally secure hybrid handshakes Author: John Schanck, William Whyte, Zhenfei Zhang, @@ -420,3 +421,4 @@ A2. Instantiation with NewHope PK := B | A_SEED KEM_ENC(PK) -> NEWHOPE_ENCAPS(PK) KEM_DEC(C, sk) -> NEWHOPE_DECAPS(C, sk) +``` diff --git a/proposals/270-newhope-hybrid-handshake.txt b/proposals/270-newhope-hybrid-handshake.txt index 52f6b50..6ad2e18 100644 --- a/proposals/270-newhope-hybrid-handshake.txt +++ b/proposals/270-newhope-hybrid-handshake.txt @@ -1,3 +1,4 @@ +``` Filename: 270-newhope-hybrid-handshake.txt Title: RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope Author: Isis Lovecruft, Peter Schwabe @@ -762,3 +763,4 @@ Depends: prop#220 prop#249 prop#264 prop#270 §C. Test Vectors +``` diff --git a/proposals/271-another-guard-selection.txt b/proposals/271-another-guard-selection.txt index 38da000..dc6ec46 100644 --- a/proposals/271-another-guard-selection.txt +++ b/proposals/271-another-guard-selection.txt @@ -1,3 +1,4 @@ +``` Filename: 271-another-guard-selection.txt Title: Another algorithm for guard selection Author: Isis Lovecruft, George Kadianakis, Ola Bini, Nick Mathewson @@ -887,3 +888,4 @@ TODO. Still non-addressed issues [Section:TODO] Suggestion: Treat it as a preference when adding to {CONFIRMED_GUARDS}, but not otherwise. +``` diff --git a/proposals/272-valid-and-running-by-default.txt b/proposals/272-valid-and-running-by-default.txt index 210a631..4ec056b 100644 --- a/proposals/272-valid-and-running-by-default.txt +++ b/proposals/272-valid-and-running-by-default.txt @@ -1,3 +1,4 @@ +``` Filename: 272-valid-and-running-by-default.txt Title: Listed routers should be Valid, Running, and treated as such Created: 26 Aug 2016 @@ -58,3 +59,4 @@ B. Does this solve the zombie problem? most ancient consensus-understanding Tors stop fetching descriptors and using the network. More testing needed though. +``` diff --git a/proposals/273-exit-relay-pinning.txt b/proposals/273-exit-relay-pinning.txt index 4a83a00..40e5abf 100644 --- a/proposals/273-exit-relay-pinning.txt +++ b/proposals/273-exit-relay-pinning.txt @@ -1,3 +1,4 @@ +``` Filename: 273-exit-relay-pinning.txt Title: Exit relay pinning for web services Author: Philipp Winter, Tobias Pulls, Roya Ensafi, and Nick Feamster @@ -221,3 +222,4 @@ Target: n/a policy over several exit relays, spread over time. In doing so, we are making assumptions on the number of visits the website sees. Is there a better solution that isn't significantly more complex? +``` diff --git a/proposals/274-rotate-onion-keys-less.txt b/proposals/274-rotate-onion-keys-less.txt index 09f5ea5..5625eb3 100644 --- a/proposals/274-rotate-onion-keys-less.txt +++ b/proposals/274-rotate-onion-keys-less.txt @@ -1,3 +1,4 @@ +``` Filename: 274-rotate-onion-keys-less.txt Title: Rotate onion keys less frequently Author: Nick Mathewson @@ -111,3 +112,4 @@ Implemented-In: 0.3.1.1-alpha previous onion key for an additional onion-key-grace-period-days days after it is replaced. +``` diff --git a/proposals/275-md-published-time-is-silly.txt b/proposals/275-md-published-time-is-silly.txt index e08e9a8..1cff90d 100644 --- a/proposals/275-md-published-time-is-silly.txt +++ b/proposals/275-md-published-time-is-silly.txt @@ -1,3 +1,4 @@ +``` Filename: 275-md-published-time-is-silly.txt Title: Stop including meaningful "published" time in microdescriptor consensus Author: Nick Mathewson @@ -126,3 +127,4 @@ Implemented-In: 0.4.8.1-alpha +``` diff --git a/proposals/276-lower-bw-granularity.txt b/proposals/276-lower-bw-granularity.txt index 156639e..bcd80c0 100644 --- a/proposals/276-lower-bw-granularity.txt +++ b/proposals/276-lower-bw-granularity.txt @@ -1,3 +1,4 @@ +``` Filename: 276-lower-bw-granularity.txt Title: Report bandwidth with lower granularity in consensus documents Author: Nick Mathewson @@ -77,3 +78,4 @@ Target: 0.3.1.x-alpha be safe? Would a time-aware smoothing mechanism work better? +``` diff --git a/proposals/277-detect-id-sharing.txt b/proposals/277-detect-id-sharing.txt index 7837615..e19f7ee 100644 --- a/proposals/277-detect-id-sharing.txt +++ b/proposals/277-detect-id-sharing.txt @@ -1,3 +1,4 @@ +``` Filename: 277-detect-id-sharing.txt Title: Detect multiple relay instances running with same ID Author: Nick Mathewson @@ -57,3 +58,4 @@ Target: 0.3.?? +``` diff --git a/proposals/278-directory-compression-scheme-negotiation.txt b/proposals/278-directory-compression-scheme-negotiation.txt index 6f509fc..6d80d39 100644 --- a/proposals/278-directory-compression-scheme-negotiation.txt +++ b/proposals/278-directory-compression-scheme-negotiation.txt @@ -1,3 +1,4 @@ +``` Filename: 278-directory-compression-scheme-negotiation.txt Title: Directory Compression Scheme Negotiation Author: Alexander Færøy @@ -207,3 +208,4 @@ Implemented-In: 0.3.1.1-alpha This research was supported in part by NSF grants CNS-1111539, CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548. +``` diff --git a/proposals/279-naming-layer-api.txt b/proposals/279-naming-layer-api.txt index 1a56ecd..1d22662 100644 --- a/proposals/279-naming-layer-api.txt +++ b/proposals/279-naming-layer-api.txt @@ -1,3 +1,4 @@ +``` Filename: 279-naming-layer-api.txt Title: A Name System API for Tor Onion Services Author: George Kadianakis, Yawning Angel, David Goulet @@ -522,3 +523,4 @@ Appendix A.2: Example plugins [PLUGINEXAMPLES] f) OnioNS g) Namecoin/Blockstart +``` diff --git a/proposals/280-privcount-in-tor.txt b/proposals/280-privcount-in-tor.txt index fd5a011..2944419 100644 --- a/proposals/280-privcount-in-tor.txt +++ b/proposals/280-privcount-in-tor.txt @@ -1,3 +1,4 @@ +``` Filename: 280-privcount-in-tor.txt Title: Privacy-Preserving Statistics with Privcount in Tor Author: Nick Mathewson, Tim Wilson-Brown @@ -335,3 +336,4 @@ Superseded-By: 288 want to expand this scheme to work with anonymous data collectors, such as Tor clients. +``` diff --git a/proposals/281-bulk-md-download.txt b/proposals/281-bulk-md-download.txt index c561aa0..8f624d9 100644 --- a/proposals/281-bulk-md-download.txt +++ b/proposals/281-bulk-md-download.txt @@ -1,3 +1,4 @@ +``` Filename: 281-bulk-md-download.txt Title: Downloading microdescriptors in bulk Author: Nick Mathewson @@ -98,3 +99,4 @@ Status: Reserve Caches supporting this download protocol need to advertise support of a new DirCache subprotocol version. +``` diff --git a/proposals/282-remove-named-from-consensus.txt b/proposals/282-remove-named-from-consensus.txt index eeef519..b37e855 100644 --- a/proposals/282-remove-named-from-consensus.txt +++ b/proposals/282-remove-named-from-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 282-remove-named-from-consensus.txt Title: Remove "Named" and "Unnamed" handling from consensus voting Author: Nick Mathewson @@ -22,3 +23,4 @@ Target: arti-dirauth the negotiated method is M or later, then the Named and Unnamed flags are handled as if any they were any other consensus flags. +``` diff --git a/proposals/283-ipv6-in-micro-consensus.txt b/proposals/283-ipv6-in-micro-consensus.txt index 1d29f78..f5846ef 100644 --- a/proposals/283-ipv6-in-micro-consensus.txt +++ b/proposals/283-ipv6-in-micro-consensus.txt @@ -1,3 +1,4 @@ +``` Filename: 283-ipv6-in-micro-consensus.txt Title: Move IPv6 ORPorts from microdescriptors to the microdesc consensus Author: Tim Wilson-Brown (teor), Nick Mathewson @@ -186,3 +187,4 @@ Ticket: #20916 Consensus-health implements a ReachableIPv6 pseudo-flag for authorities and relays: https://consensus-health.torproject.org/ +``` diff --git a/proposals/284-hsv3-control-port.txt b/proposals/284-hsv3-control-port.txt index 1ff20bb..6bef07a 100644 --- a/proposals/284-hsv3-control-port.txt +++ b/proposals/284-hsv3-control-port.txt @@ -1,3 +1,4 @@ +``` Filename: 284-hsv3-control-port.txt Title: Hidden Service v3 Control Port Author: David Goulet @@ -191,3 +192,4 @@ Status: Closed an "HSAddress". This field is extended to support v3 address: HSAddress = 16*Base32Character / 56*Base32Character / "UNKNOWN" +``` diff --git a/proposals/285-utf-8.txt b/proposals/285-utf-8.txt index cb7bab4..453a8db 100644 --- a/proposals/285-utf-8.txt +++ b/proposals/285-utf-8.txt @@ -1,3 +1,4 @@ +``` Filename: 285-utf-8.txt Title: Directory documents should be standardized as UTF-8 Author: Nick Mathewson @@ -115,3 +116,4 @@ Ticket: https://gitlab.torproject.org/tpo/core/tor/-/issues/40131 * Well-Formed UTF-8 Byte Sequences: Table 3-7, page 126. * Byte order mark: C11, page 83; D94, page 130. * UTF-8 encoding scheme: D96, pages 130. +``` diff --git a/proposals/286-hibernation-api.txt b/proposals/286-hibernation-api.txt index 796cfa8..e76773e 100644 --- a/proposals/286-hibernation-api.txt +++ b/proposals/286-hibernation-api.txt @@ -1,3 +1,4 @@ +``` Filename: 286-hibernation-api.txt Title: Controller APIs for hibernation access on mobile Author: Nick Mathewson @@ -195,3 +196,4 @@ Notes: This proposal was useful for our early thinking, but a simpler StartIdle -- Boolean. If set to 1, Tor begins in IDLE mode. +``` diff --git a/proposals/287-reduce-lifetime.txt b/proposals/287-reduce-lifetime.txt index 06e87d0..e37ead9 100644 --- a/proposals/287-reduce-lifetime.txt +++ b/proposals/287-reduce-lifetime.txt @@ -1,3 +1,4 @@ +``` Filename: 287-reduce-lifetime.txt Title: Reduce circuit lifetime without overloading the network Author: Fernando Fernandez Mancera @@ -103,3 +104,4 @@ Enhancing Tor's Performance using Real-time Traffic Classification [https://www.cypherpunks.ca/~iang/pubs/difftor-ccs.pdf] (It's not exactly about that, but they talk about circuit lifetime and the ten minutes problem a few times. Also it's an interesting paper.) +``` diff --git a/proposals/288-privcount-with-shamir.txt b/proposals/288-privcount-with-shamir.txt index 109c743..7315d4c 100644 --- a/proposals/288-privcount-with-shamir.txt +++ b/proposals/288-privcount-with-shamir.txt @@ -1,3 +1,4 @@ +``` Filename: 288-privcount-with-shamir.txt Title: Privacy-Preserving Statistics with Privcount in Tor (Shamir version) Author: Nick Mathewson, Tim Wilson-Brown, Aaron Johnson @@ -565,3 +566,4 @@ Appendix Z. Remaining client-side uncertainties How data is uploaded to DCs? What to say about persistence on the DC side? +``` diff --git a/proposals/289-authenticated-sendmes.txt b/proposals/289-authenticated-sendmes.txt index e09b882..ebb1e3c 100644 --- a/proposals/289-authenticated-sendmes.txt +++ b/proposals/289-authenticated-sendmes.txt @@ -1,3 +1,4 @@ +``` Filename: 289-authenticated-sendmes.txt Title: Authenticating sendme cells to mitigate bandwidth attacks Author: Rob Jansen, Roger Dingledine, David Goulet @@ -493,3 +494,4 @@ Implemented-In: 0.4.1.1-alpha This research was supported in part by NSF grants CNS-1111539, CNS-1314637, CNS-1526306, CNS-1619454, and CNS-1640548. +``` diff --git a/proposals/290-deprecate-consensus-methods.txt b/proposals/290-deprecate-consensus-methods.txt index 979559c..832426e 100644 --- a/proposals/290-deprecate-consensus-methods.txt +++ b/proposals/290-deprecate-consensus-methods.txt @@ -1,3 +1,4 @@ +``` Filename: 290-deprecate-consensus-methods.txt Title: Continuously update consensus methods Author: Nick Mathewson @@ -75,3 +76,4 @@ B. Client and relay compatibility notes not represent backward-incompatible changes in how they generate their consensuses. +``` diff --git a/proposals/291-two-guard-nodes.txt b/proposals/291-two-guard-nodes.txt index 56424cc..9b89eae 100644 --- a/proposals/291-two-guard-nodes.txt +++ b/proposals/291-two-guard-nodes.txt @@ -1,3 +1,4 @@ +``` Filename: 291-two-guard-nodes.txt Title: The move to two guard nodes Author: Mike Perry @@ -254,3 +255,4 @@ References: 12. https://trac.torproject.org/projects/tor/ticket/10969 13. https://www.freehaven.net/anonbib/cache/wpes12-cogs.pdf 14. https://gitweb.torproject.org/torspec.git/tree/proposals/247-hs-guard-discovery.txt +``` diff --git a/proposals/292-mesh-vanguards.txt b/proposals/292-mesh-vanguards.txt index 5341213..e0dc6e8 100644 --- a/proposals/292-mesh-vanguards.txt +++ b/proposals/292-mesh-vanguards.txt @@ -1,3 +1,4 @@ +``` Filename: 292-mesh-vanguards.txt Title: Mesh-based vanguards Authors: George Kadianakis and Mike Perry @@ -534,3 +535,4 @@ CDF_table_33() ---------------------- 1. https://onionbalance.readthedocs.org/en/latest/design.html#overview +``` diff --git a/proposals/293-know-when-to-publish.txt b/proposals/293-know-when-to-publish.txt index c6fd1aa..2ca4222 100644 --- a/proposals/293-know-when-to-publish.txt +++ b/proposals/293-know-when-to-publish.txt @@ -1,3 +1,4 @@ +``` Filename: 293-know-when-to-publish.txt Title: Other ways for relays to know when to publish Author: Nick Mathewson @@ -59,3 +60,4 @@ Implemented-In: 0.4.0.1-alpha published time in consensus documents accurate -- we can start setting it to some time in the distant future, per proposal 275. +``` diff --git a/proposals/294-tls-1.3.txt b/proposals/294-tls-1.3.txt index c9bae79..e195b2f 100644 --- a/proposals/294-tls-1.3.txt +++ b/proposals/294-tls-1.3.txt @@ -1,3 +1,4 @@ +``` Filename: 294-tls-1.3.txt Title: TLS 1.3 Migration Authors: Isis Lovecruft @@ -338,3 +339,4 @@ A. References https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set1_groups.html [TLS-1.3_SIGNATURE_ALGOS]: https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#signature-algorithms +``` diff --git a/proposals/295-relay-crypto-with-adl.txt b/proposals/295-relay-crypto-with-adl.txt index 7f8fc42..bf8fd77 100644 --- a/proposals/295-relay-crypto-with-adl.txt +++ b/proposals/295-relay-crypto-with-adl.txt @@ -1,3 +1,4 @@ +``` Filename: 295-relay-crypto-with-adl.txt Title: Using ADL for relay cryptography (solving the crypto-tagging attack) Author: Tomer Ashur, Orr Dunkelman, Atul Luykx @@ -561,3 +562,4 @@ Status: Open No changes are required to the authentication process when the relay cell is sent backwards. +``` diff --git a/proposals/296-expose-bandwidth-files.txt b/proposals/296-expose-bandwidth-files.txt index 908a9ad..c61dc68 100644 --- a/proposals/296-expose-bandwidth-files.txt +++ b/proposals/296-expose-bandwidth-files.txt @@ -1,3 +1,4 @@ +``` Filename: 296-expose-bandwidth-files.txt Title: Have Directory Authorities expose raw bandwidth list files Author: Tom Ritter @@ -84,3 +85,4 @@ Applications that parse the document should follow the bandwidth list file specification in bandwidth-file-spec.txt. If a new bandwidth list format version is added, the applications MAY need to upgrade to that version. +``` diff --git a/proposals/297-safer-protover-shutdowns.txt b/proposals/297-safer-protover-shutdowns.txt index 59fbac1..96d6f62 100644 --- a/proposals/297-safer-protover-shutdowns.txt +++ b/proposals/297-safer-protover-shutdowns.txt @@ -1,3 +1,4 @@ +``` Filename: 297-safer-protover-shutdowns.txt Title: Relaxing the protover-based shutdown rules Author: Nick Mathewson @@ -104,3 +105,4 @@ IMPLEMENTATION NOTE: +``` diff --git a/proposals/298-canonical-families.txt b/proposals/298-canonical-families.txt index a96ab8d..4576d63 100644 --- a/proposals/298-canonical-families.txt +++ b/proposals/298-canonical-families.txt @@ -1,3 +1,4 @@ +``` Filename: 298-canonical-families.txt Title: Putting family lines in canonical form Author: Nick Mathewson @@ -61,3 +62,4 @@ Implemented-In: 0.4.0.1-alpha +``` diff --git a/proposals/299-ip-failure-count.txt b/proposals/299-ip-failure-count.txt index 8c2319f..1078e6d 100644 --- a/proposals/299-ip-failure-count.txt +++ b/proposals/299-ip-failure-count.txt @@ -1,3 +1,4 @@ +``` Filename: 299-ip-failure-count.txt Title: Preferring IPv4 or IPv6 based on IP Version Failure Count Author: Neel Chauhan @@ -222,3 +223,4 @@ Ticket: https://trac.torproject.org/projects/tor/ticket/27491 Thank you teor for aiding me with the implementation of Happy Eyeballs in Tor. This would not have been possible if it weren't for you. +``` diff --git a/proposals/300-walking-onions.txt b/proposals/300-walking-onions.txt index 3df9f44..5ab3a7a 100644 --- a/proposals/300-walking-onions.txt +++ b/proposals/300-walking-onions.txt @@ -1,3 +1,4 @@ +``` Filename: 300-walking-onions.txt Title: Walking Onions: Scaling and Saving Bandwidth Author: Nick Mathewson @@ -511,3 +512,4 @@ A.2. Additional ideas but it might be worth looking at harder. +``` diff --git a/proposals/301-dont-vote-on-package-fingerprints.txt b/proposals/301-dont-vote-on-package-fingerprints.txt index cabf4f7..e4f5c03 100644 --- a/proposals/301-dont-vote-on-package-fingerprints.txt +++ b/proposals/301-dont-vote-on-package-fingerprints.txt @@ -1,3 +1,4 @@ +``` Filename: 301-dont-vote-on-package-fingerprints.txt Title: Don't include package fingerprints in consensus documents Author: Iain R. Learmonth @@ -71,3 +72,4 @@ B. Acknowledgements Thanks to teor and Nick Mathewson for their comments and suggestions on this proposal. +``` diff --git a/proposals/302-padding-machines-for-onion-clients.txt b/proposals/302-padding-machines-for-onion-clients.txt index cd24298..52710b0 100644 --- a/proposals/302-padding-machines-for-onion-clients.txt +++ b/proposals/302-padding-machines-for-onion-clients.txt @@ -1,3 +1,4 @@ +``` Filename: 302-padding-machines-for-onion-clients.txt Title: Hiding onion service clients using padding Author: George Kadianakis, Mike Perry @@ -303,3 +304,4 @@ A. Acknowledgements [1]: "Understanding Tor Usage with Privacy-Preserving Measurement" by Akshaya Mani, T Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr In Proceedings of the Internet Measurement Conference 2018 (IMC 2018). +``` diff --git a/proposals/303-protover-removal-policy.txt b/proposals/303-protover-removal-policy.txt index 54fcead..c2d5697 100644 --- a/proposals/303-protover-removal-policy.txt +++ b/proposals/303-protover-removal-policy.txt @@ -1,3 +1,4 @@ +``` Filename: 303-protover-removal-policy.txt Title: When and how to remove support for protocol versions Author: Nick Mathewson @@ -60,3 +61,4 @@ Status: Open _recommended_ for clients for at least 18 months. +``` diff --git a/proposals/304-socks5-extending-hs-error-codes.txt b/proposals/304-socks5-extending-hs-error-codes.txt index d8ff7d5..8866fa1 100644 --- a/proposals/304-socks5-extending-hs-error-codes.txt +++ b/proposals/304-socks5-extending-hs-error-codes.txt @@ -1,3 +1,4 @@ +``` Filename: 304-socks5-extending-hs-error-codes.txt Title: Extending SOCKS5 Onion Service Error Codes Author: David Goulet, George Kadianakis @@ -107,3 +108,4 @@ References: [PROP229] https://gitweb.torproject.org/torspec.git/tree/proposals/229-further-socks5-extensions.txt [RFC1928] https://www.ietf.org/rfc/rfc1928.txt +``` diff --git a/proposals/305-establish-intro-dos-defense-extention.txt b/proposals/305-establish-intro-dos-defense-extention.txt index e377f3e..e1b0256 100644 --- a/proposals/305-establish-intro-dos-defense-extention.txt +++ b/proposals/305-establish-intro-dos-defense-extention.txt @@ -1,3 +1,4 @@ +``` Filename: 305-establish-intro-dos-defense-extention.txt Title: ESTABLISH_INTRO Cell DoS Defense Extension Author: David Goulet, George Kadianakis @@ -199,3 +200,4 @@ References: [1] https://lists.torproject.org/pipermail/tor-dev/2019-May/013837.html [2] https://trac.torproject.org/15516 +``` diff --git a/proposals/306-ipv6-happy-eyeballs.txt b/proposals/306-ipv6-happy-eyeballs.txt index c5c9ddf..86a1445 100644 --- a/proposals/306-ipv6-happy-eyeballs.txt +++ b/proposals/306-ipv6-happy-eyeballs.txt @@ -1,3 +1,4 @@ +``` Filename: 306-ipv6-happy-eyeballs.txt Title: A Tor Implementation of IPv6 Happy Eyeballs Author: Neel Chauhan @@ -344,3 +345,4 @@ Ticket: https://trac.torproject.org/projects/tor/ticket/29801 [P299-TRAC]: https://trac.torproject.org/projects/tor/ticket/29801 [TEOR-P306-REP]: https://lists.torproject.org/pipermail/tor-dev/2019-July/013919.html +``` diff --git a/proposals/307-onionbalance-v3.txt b/proposals/307-onionbalance-v3.txt index baaa717..fb44cb3 100644 --- a/proposals/307-onionbalance-v3.txt +++ b/proposals/307-onionbalance-v3.txt @@ -1,3 +1,4 @@ +``` Filename: 307-onionbalance-v3.txt Title: Onion Balance Support for Onion Service v3 Author: Nick Mathewson @@ -183,3 +184,4 @@ A. Acknowledgments in this problem space. This research was supported by NSF grants CNS-1526306 and CNS-1619454. +``` diff --git a/proposals/308-counter-galois-onion.txt b/proposals/308-counter-galois-onion.txt index a57a38e..4714e8d 100644 --- a/proposals/308-counter-galois-onion.txt +++ b/proposals/308-counter-galois-onion.txt @@ -1,3 +1,4 @@ +``` Filename: 308-counter-galois-onion.txt Title: Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography Authors: Jean Paul Degabriele, Alessandro Melloni, Martijn Stam @@ -556,3 +557,4 @@ Misuse-Resistant Authenticated Encryption", RFC 8452, April 2019. [ST13] Thomas Shrimpton, R. Seth Terashima, "A Modular Framework for Building Variable-Input Length Tweakable Ciphers", ASIACRYPT 2013. +``` diff --git a/proposals/309-optimistic-socks-in-tor.txt b/proposals/309-optimistic-socks-in-tor.txt index d22a1a0..7f9272d 100644 --- a/proposals/309-optimistic-socks-in-tor.txt +++ b/proposals/309-optimistic-socks-in-tor.txt @@ -1,3 +1,4 @@ +``` Filename: 309-optimistic-socks-in-tor.txt Title: Optimistic SOCKS Data Author: Tom Ritter @@ -76,3 +77,4 @@ Ticket: #5915 References: [RFC1928] https://www.ietf.org/rfc/rfc1928.txt +``` diff --git a/proposals/310-bandaid-on-guard-selection.txt b/proposals/310-bandaid-on-guard-selection.txt index 2001994..94477a1 100644 --- a/proposals/310-bandaid-on-guard-selection.txt +++ b/proposals/310-bandaid-on-guard-selection.txt @@ -1,3 +1,4 @@ +``` Filename: 310-bandaid-on-guard-selection.txt Title: Towards load-balancing in Prop 271 Author: Florentin Rochet, Aaron Johnson et al. @@ -93,3 +94,4 @@ Status: Closed force clients onto compromised guards, using relays that are part of the history if they're still available (in sampled order), and by tracking its size. This should maintain the initial goals of Prop 271. +``` diff --git a/proposals/311-relay-ipv6-reachability.txt b/proposals/311-relay-ipv6-reachability.txt index 11282c3..2ad7f46 100644 --- a/proposals/311-relay-ipv6-reachability.txt +++ b/proposals/311-relay-ipv6-reachability.txt @@ -1,3 +1,4 @@ +``` Filename: 311-relay-ipv6-reachability.txt Title: Tor Relay IPv6 Reachability Author: teor, Nick Mathewson @@ -836,3 +837,4 @@ References: [Tor Specification]: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt +``` diff --git a/proposals/312-relay-auto-ipv6-addr.txt b/proposals/312-relay-auto-ipv6-addr.txt index 712175e..a82e239 100644 --- a/proposals/312-relay-auto-ipv6-addr.txt +++ b/proposals/312-relay-auto-ipv6-addr.txt @@ -1,3 +1,4 @@ +``` Filename: 312-relay-auto-ipv6-addr.txt Title: Tor Relay Automatic IPv6 Address Discovery Author: teor, Nick Mathewson, s7r @@ -1563,3 +1564,4 @@ References: [Tor Supported Platforms]: https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/SupportedPlatforms#OSSupportlevels +``` diff --git a/proposals/313-relay-ipv6-stats.txt b/proposals/313-relay-ipv6-stats.txt index ae02a33..c637dad 100644 --- a/proposals/313-relay-ipv6-stats.txt +++ b/proposals/313-relay-ipv6-stats.txt @@ -1,3 +1,4 @@ +``` Filename: 313-relay-ipv6-stats.txt Title: Tor Relay IPv6 Statistics Author: teor, Karsten Loesing, Nick Mathewson @@ -405,3 +406,4 @@ References: [Tor Specification]: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt +``` diff --git a/proposals/315-update-dir-required-fields.txt b/proposals/315-update-dir-required-fields.txt index 1761a03..875d8a0 100644 --- a/proposals/315-update-dir-required-fields.txt +++ b/proposals/315-update-dir-required-fields.txt @@ -1,3 +1,4 @@ +``` Filename: 315-update-dir-required-fields.txt Title: Updating the list of fields required in directory documents Author: Nick Mathewson @@ -129,3 +130,4 @@ Notes: become required: * pr +``` diff --git a/proposals/317-secure-dns-name-resolution.txt b/proposals/317-secure-dns-name-resolution.txt index ad2b7e6..55db19f 100644 --- a/proposals/317-secure-dns-name-resolution.txt +++ b/proposals/317-secure-dns-name-resolution.txt @@ -1,3 +1,4 @@ +``` Filename: 317-secure-dns-name-resolution.txt Title: Improve security aspects of DNS name resolution Author: Christian Hofer @@ -218,3 +219,4 @@ Performance and scalability: onion service in a performant manner it is always possible to fallback to clearweb nameservers by changing a configuration setting. +``` diff --git a/proposals/324-rtt-congestion-control.txt b/proposals/324-rtt-congestion-control.txt index 4235be8..c601980 100644 --- a/proposals/324-rtt-congestion-control.txt +++ b/proposals/324-rtt-congestion-control.txt @@ -1,3 +1,4 @@ +``` Filename: 324-rtt-congestion-control.txt Title: RTT-based Congestion Control for Tor Author: Mike Perry @@ -2313,3 +2314,4 @@ receive more data. It is sent to tell the sender to resume sending. 34. https://gitlab.torproject.org/tpo/core/tor/-/issues/40642 35. https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/49 +``` diff --git a/proposals/327-pow-over-intro.txt b/proposals/327-pow-over-intro.txt index bcaf6f3..3abffc4 100644 --- a/proposals/327-pow-over-intro.txt +++ b/proposals/327-pow-over-intro.txt @@ -1,3 +1,4 @@ +``` Filename: 327-pow-over-intro.txt Title: A First Take at PoW Over Introduction Circuits Author: George Kadianakis, Mike Perry, David Goulet, tevador @@ -1213,3 +1214,4 @@ A.2. References [REF_TEVADOR_1]: https://lists.torproject.org/pipermail/tor-dev/2020-May/014268.html [REF_TEVADOR_2]: https://lists.torproject.org/pipermail/tor-dev/2020-June/014358.html [REF_TEVADOR_SIM]: https://github.com/mikeperry-tor/scratchpad/blob/master/tor-pow/effort_sim.py#L57 +``` diff --git a/proposals/329-traffic-splitting.txt b/proposals/329-traffic-splitting.txt index 2a24f1f..e03d3aa 100644 --- a/proposals/329-traffic-splitting.txt +++ b/proposals/329-traffic-splitting.txt @@ -1,3 +1,4 @@ +``` Filename: 329-traffic-splitting.txt Title: Overcoming Tor's Bottlenecks with Traffic Splitting Author: David Goulet, Mike Perry @@ -1051,3 +1052,4 @@ References: [PROP308] https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/proposals/308-counter-galois-onion.txt +``` diff --git a/proposals/334-middle-only-flag.txt b/proposals/334-middle-only-flag.txt index 823e927..c011b6c 100644 --- a/proposals/334-middle-only-flag.txt +++ b/proposals/334-middle-only-flag.txt @@ -1,3 +1,4 @@ +``` Filename: 334-middle-only-flag.txt Title: A Directory Authority Flag To Mark Relays As Middle-only Author: Neel Chauhan @@ -114,3 +115,4 @@ Superseded-by: 335-middle-only-redux.md [2] - https://lists.torproject.org/pipermail/tor-dev/2021-September/014627.html [3] - https://lists.torproject.org/pipermail/tor-dev/2021-September/014630.html +``` diff --git a/proposals/343-rend-caa.txt b/proposals/343-rend-caa.txt index 0859690..1de1355 100644 --- a/proposals/343-rend-caa.txt +++ b/proposals/343-rend-caa.txt @@ -1,3 +1,4 @@ +``` Filename: 343-rend-caa.txt Title: CAA Extensions for the Tor Rendezvous Specification Author: Q Misell @@ -108,4 +109,4 @@ References: [tor-rend-spec-v3] The Tor Project, "Tor Rendezvous Specification - Version 3", - . \ No newline at end of file + .``` diff --git a/proposals/344-protocol-info-leaks.txt b/proposals/344-protocol-info-leaks.txt index abae2a7..f20ebca 100644 --- a/proposals/344-protocol-info-leaks.txt +++ b/proposals/344-protocol-info-leaks.txt @@ -1,3 +1,4 @@ +``` Filename: 344-protocol-info-leaks.txt Title: Prioritizing Protocol Information Leaks in Tor Author: Mike Perry @@ -1184,3 +1185,4 @@ References: [WFNETSIM] https://petsymposium.org/2023/files/papers/issue4/popets-2023-0125.pdf +``` diff --git a/proposals/proposal-status.txt b/proposals/proposal-status.txt index 8a709bc..af522d1 100644 --- a/proposals/proposal-status.txt +++ b/proposals/proposal-status.txt @@ -1,3 +1,4 @@ +``` [Last updated 9 Sep 2015] This is an update to the Tor proposal status overview. I last sent one @@ -553,3 +554,4 @@ again to remind me! this writing) and which parts of our current, more idiosyncratic, uses of TLS can be removed. +``` -- cgit v1.2.3-54-g00ecf