浏览代码

some changes i found in my other sandbox

svn:r17216
Roger Dingledine 17 年之前
父节点
当前提交
5ad3669e93
共有 2 个文件被更改,包括 5 次插入1 次删除
  1. 4 0
      doc/TODO.021
  2. 1 1
      doc/spec/proposals/124-tls-certificates.txt

+ 4 - 0
doc/TODO.021

@@ -110,6 +110,8 @@ Roger
   - Did we actually apply Steven's dkimproxy patch?
   - Did we actually apply Steven's dkimproxy patch?
   - Brainstorm about safe but effective ways for vidalia to
   - Brainstorm about safe but effective ways for vidalia to
     auto-update its user's bridges via Tor in the background.
     auto-update its user's bridges via Tor in the background.
+  - it doesn't count as successfully opening a circuit if it's not
+    an exit circuit.
 
 
 Mike:
 Mike:
   - Roger wants to get an email every time there's a blog change,
   - Roger wants to get an email every time there's a blog change,
@@ -190,6 +192,8 @@ R   d 128: families of private bridges
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
     - 147: Eliminate the need for v2 directories in generating v3 directories
     - 147: Eliminate the need for v2 directories in generating v3 directories
+R     - authorities should initiate a reachability test upon first
+        glimpsing a new descriptor.
     - 148: Stream end reasons from the client side should be uniform.
     - 148: Stream end reasons from the client side should be uniform.
 K   - 155: Four Improvements of Hidden Service Performance
 K   - 155: Four Improvements of Hidden Service Performance
 
 

+ 1 - 1
doc/spec/proposals/124-tls-certificates.txt

@@ -143,7 +143,7 @@ Version negotiation and cipher suite selection:
         Cert_Length  [2 bytes]
         Cert_Length  [2 bytes]
         Certificate  [<cert_length> bytes]
         Certificate  [<cert_length> bytes]
 
 
-  Each certificate MUST sign the one prececeding it. The initator MUST
+  Each certificate MUST sign the one preceding it. The initator MUST
   place its connection certificate first; the responder, having
   place its connection certificate first; the responder, having
   already sent its connection certificate as part of the TLS handshake
   already sent its connection certificate as part of the TLS handshake
   MUST place its identity certificate first.
   MUST place its identity certificate first.