From f6d98d50c9f4b25ca190fd3242007721656b580d Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Mon, 12 Aug 2013 10:46:08 -0400 Subject: Tweak 219 a little more --- proposals/219-expanded-dns.txt | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) (limited to 'proposals/219-expanded-dns.txt') diff --git a/proposals/219-expanded-dns.txt b/proposals/219-expanded-dns.txt index b43e63e..76e7987 100644 --- a/proposals/219-expanded-dns.txt +++ b/proposals/219-expanded-dns.txt @@ -3,6 +3,7 @@ Title: Support for full DNS and DNSSEC resolution in Tor Authors: Ondrej Mikle Created: 4 February 2012 Modified: 2 August 2013 +Target: 0.2.5.x Status: Draft 0. Overview @@ -59,7 +60,7 @@ Status: Draft The FLAGS field is reserved, and should be set to 0 by all clients. Because of the maximum length of the RELAY cell, the DNS packet may - not be longer than 496 bytes. [XXXX Is this enough?] + not be longer than 496 bytes. [XXXX Is this enough? -NM] Some fields in the query must be omitted or set to zero: see section 3 below. @@ -89,8 +90,6 @@ Status: Draft cells, with contents: [00 04 00] R2[0:495], [00] R2[495:992], and [01] R2[992:1024] respectively. - The server should {XXXXX}. - [NOTE: I'm using the length field and the is-this-the-last-cell field to allow multi-packet responses in the future. -NM] -- cgit v1.2.3-54-g00ecf