Explorar o código

proposals tweaks patch

is attached

--roger

>From 674f087ab98e1711bb533acf23ee88c7c2a1dfdb Mon Sep 17 00:00:00 2001
From: Roger Dingledine <arma@torproject.org>
Date: Sun, 7 Jun 2009 14:37:32 -0400
Subject: [PATCH] minor edits on proposals
Roger Dingledine %!s(int64=16) %!d(string=hai) anos
pai
achega
08fd7e61c7

+ 4 - 3
doc/spec/proposals/158-microdescriptors.txt

@@ -8,7 +8,7 @@ Status: Open
 
 
   15 May 2009: Substantially revised based on discussions on or-dev
   15 May 2009: Substantially revised based on discussions on or-dev
   from late January.  Removed the notion of voting on how to choose
   from late January.  Removed the notion of voting on how to choose
-  microdescriptors; made it just a function of the consesus method.
+  microdescriptors; made it just a function of the consensus method.
   (This lets us avoid the possibility of "desynchronization.")
   (This lets us avoid the possibility of "desynchronization.")
   Added suggestion to use a new consensus flavor.  Specified use of
   Added suggestion to use a new consensus flavor.  Specified use of
   SHA256 for new hashes. -nickm
   SHA256 for new hashes. -nickm
@@ -47,7 +47,7 @@ Status: Open
 3. Design
 3. Design
 
 
   There are three pieces to the proposal. First, authorities will list in
   There are three pieces to the proposal. First, authorities will list in
-  their votes (and thus in the consensus)  the expected hash
+  their votes (and thus in the consensus) the expected hash
   of microdescriptor for each relay. Second, directory mirrors will serve
   of microdescriptor for each relay. Second, directory mirrors will serve
   microdescriptors. Third, clients will ask for them and cache them.
   microdescriptors. Third, clients will ask for them and cache them.
 
 
@@ -111,7 +111,7 @@ Status: Open
   This new consensus flavor should be signed with the sha256 signature
   This new consensus flavor should be signed with the sha256 signature
   format as documented in proposal 162.
   format as documented in proposal 162.
 
 
-3.2. Directory mirrors serve microdescriptors
+3.2. Directory mirrors fetch, cache, and serve microdescriptors
 
 
   Directory mirrors should then read the microdescriptor-elements line
   Directory mirrors should then read the microdescriptor-elements line
   from the consensus, and learn how to answer requests. (Directory mirrors
   from the consensus, and learn how to answer requests. (Directory mirrors
@@ -122,6 +122,7 @@ Status: Open
     http://<hostname>/tor/micro/d/<D1>-<D2>-<D3>.z
     http://<hostname>/tor/micro/d/<D1>-<D2>-<D3>.z
   (We use base64 for size and for consistency with the consensus
   (We use base64 for size and for consistency with the consensus
   format. We use -s instead of +s to separate these items, since
   format. We use -s instead of +s to separate these items, since
+  ... since...?
 
 
   All the microdescriptors from the current consensus should also be
   All the microdescriptors from the current consensus should also be
   available at:
   available at:

+ 8 - 8
doc/spec/proposals/162-consensus-flavors.txt

@@ -5,7 +5,6 @@ Created: 14-May-2009
 Target: 0.2.2
 Target: 0.2.2
 Status: Open
 Status: Open
 
 
-
 Overview:
 Overview:
 
 
    This proposal describes a way to publish each consensus in
    This proposal describes a way to publish each consensus in
@@ -67,8 +66,8 @@ Spec modifications:
    The supported consensus flavors are defined as part of the
    The supported consensus flavors are defined as part of the
    authorities' consensus method.
    authorities' consensus method.
 
 
-   For each supported flavors, every authority calculates another
+   For each supported flavor, every authority calculates another
-   consensus document of as-yet-unspecified format, and exchange
+   consensus document of as-yet-unspecified format, and exchanges
    detached signatures for these documents as in the current consensus
    detached signatures for these documents as in the current consensus
    design.
    design.
 
 
@@ -112,7 +111,7 @@ Spec modifications:
        Documents = Document*
        Documents = Document*
        Document = "document" SP flavor SP SignedLength
        Document = "document" SP flavor SP SignedLength
                                     1*(SP AlgorithmName "=" Digest) NL
                                     1*(SP AlgorithmName "=" Digest) NL
-       Signatures = Signature *
+       Signatures = Signature*
        Signature = "directory-signature" SP algname SP identity
        Signature = "directory-signature" SP algname SP identity
                            SP signing-key-digest NL signature
                            SP signing-key-digest NL signature
 
 
@@ -141,15 +140,15 @@ Spec modifications:
 
 
     The 'SHA256' signature format for directory objects is defined as
     The 'SHA256' signature format for directory objects is defined as
     the RSA signature of the OAEP+-padded SHA256 digest of the SHA256
     the RSA signature of the OAEP+-padded SHA256 digest of the SHA256
-    digest of the the item to be signed.  When checking signatures,
+    digest of the item to be signed.  When checking signatures,
-    the signature MUST be treated as valid if the signed material
+    the signature MUST be treated as valid if the signature material
     begins with SHA256(SHA256(document)); this allows us to add other
     begins with SHA256(SHA256(document)); this allows us to add other
     data later.
     data later.
 
 
 Considerations:
 Considerations:
 
 
     - We should not create a new flavor of consensus when adding a
     - We should not create a new flavor of consensus when adding a
-      field wouldn't be too onerous.
+      field instead wouldn't be too onerous.
 
 
     - We should not proliferate flavors lightly: clients will be
     - We should not proliferate flavors lightly: clients will be
       distinguishable based on which flavor they download.
       distinguishable based on which flavor they download.
@@ -159,7 +158,7 @@ Migration:
     - Stage one: authorities begin generating and serving
     - Stage one: authorities begin generating and serving
       consensus-index files.
       consensus-index files.
 
 
-    - Stage two: Caches begin downloading consenusus-index files,
+    - Stage two: Caches begin downloading consensus-index files,
       validating them, and using them to decide what flavors of
       validating them, and using them to decide what flavors of
       consensus documents to cache.  They download all listed
       consensus documents to cache.  They download all listed
       documents, and compare them to the digests given in the
       documents, and compare them to the digests given in the
@@ -176,3 +175,4 @@ Acknowledgements:
 
 
     Aspects of this design and its applications to hash migration were
     Aspects of this design and its applications to hash migration were
     heavily influenced by IRC conversations with Marian.
     heavily influenced by IRC conversations with Marian.
+