Browse Source

renumber, clean whitespace

Roger Dingledine 15 years ago
parent
commit
5b7669130b

+ 2 - 0
doc/spec/proposals/000-index.txt

@@ -94,6 +94,7 @@ Proposals by number:
 172  GETINFO controller option for circuit information [ACCEPTED]
 172  GETINFO controller option for circuit information [ACCEPTED]
 173  GETINFO Option Expansion [ACCEPTED]
 173  GETINFO Option Expansion [ACCEPTED]
 174  Optimistic Data for Tor: Server Side [OPEN]
 174  Optimistic Data for Tor: Server Side [OPEN]
+175  Automatically promoting Tor clients to nodes [DRAFT]
 
 
 
 
 Proposals by status:
 Proposals by status:
@@ -106,6 +107,7 @@ Proposals by status:
    144  Increase the diversity of circuits by detecting nodes belonging the same provider
    144  Increase the diversity of circuits by detecting nodes belonging the same provider
    169  Eliminate TLS renegotiation for the Tor connection handshake [for 0.2.2]
    169  Eliminate TLS renegotiation for the Tor connection handshake [for 0.2.2]
    170  Configuration options regarding circuit building
    170  Configuration options regarding circuit building
+   175  Automatically promoting Tor clients to nodes [for ]
  NEEDS-REVISION:
  NEEDS-REVISION:
    131  Help users to verify they are using Tor
    131  Help users to verify they are using Tor
  OPEN:
  OPEN:

+ 7 - 8
doc/spec/proposals/175-automatic-node-promotion.txt

@@ -1,9 +1,8 @@
-Filename: xxx-automatic-node-promotion.txt
+Filename: 175-automatic-node-promotion.txt
 Title: Automatically promoting Tor clients to nodes
 Title: Automatically promoting Tor clients to nodes
 Author: Steven Murdoch
 Author: Steven Murdoch
 Created: 12-Mar-2010
 Created: 12-Mar-2010
 Status: Draft
 Status: Draft
-Target:
 
 
 1. Overview
 1. Overview
 
 
@@ -28,7 +27,7 @@ Target:
    countries. By automatically promoting Tor clients to bridges, and
    countries. By automatically promoting Tor clients to bridges, and
    perhaps also to full public relays, this proposal aims to solve
    perhaps also to full public relays, this proposal aims to solve
    these problems.
    these problems.
- 
+
    Only Tor clients which are sufficiently useful should be promoted,
    Only Tor clients which are sufficiently useful should be promoted,
    and the process of determining usefulness should be performed
    and the process of determining usefulness should be performed
    without reporting the existence of the client to the central
    without reporting the existence of the client to the central
@@ -150,22 +149,22 @@ Target:
         the number of successes >= num_useful, Tor should consider
         the number of successes >= num_useful, Tor should consider
         promotion to a bridge
         promotion to a bridge
    end.
    end.
- 
+
    When Tor starts, it must fill in the samples for which it was not
    When Tor starts, it must fill in the samples for which it was not
    running. This can only happen once the consensus has downloaded,
    running. This can only happen once the consensus has downloaded,
    because the value of check_period is needed.
    because the value of check_period is needed.
- 
+
       1. Tor generates a random number y from the Poisson distribution [1]
       1. Tor generates a random number y from the Poisson distribution [1]
          with lambda = (current_time - last_check) * (1 / check_period)
          with lambda = (current_time - last_check) * (1 / check_period)
-      2. Tor sets the value last_check to the current_time (in seconds)	
+      2. Tor sets the value last_check to the current_time (in seconds)
       3. Add y test failures to the ring buffer measurements_results
       3. Add y test failures to the ring buffer measurements_results
       4. Tor saves last_check and measurements_results to disk
       4. Tor saves last_check and measurements_results to disk
- 
+
    In this way, a Tor client will measure its bandwidth and
    In this way, a Tor client will measure its bandwidth and
    reachability every check_period seconds, on average. Provided
    reachability every check_period seconds, on average. Provided
    check_period is sufficiently greater than a minute (say, at least an
    check_period is sufficiently greater than a minute (say, at least an
    hour), the times of check will follow a Poisson distribution. [2]
    hour), the times of check will follow a Poisson distribution. [2]
- 
+
    While this does require that Tor does record the state of a client
    While this does require that Tor does record the state of a client
    over time, this does not leak much information. Only a binary
    over time, this does not leak much information. Only a binary
    reachable/non-reachable is stored, and the timing of samples becomes
    reachable/non-reachable is stored, and the timing of samples becomes