Browse Source

some changes i found in my other sandbox

svn:r17216
Roger Dingledine 16 years ago
parent
commit
5ad3669e93
2 changed files with 5 additions and 1 deletions
  1. 4 0
      doc/TODO.021
  2. 1 1
      doc/spec/proposals/124-tls-certificates.txt

+ 4 - 0
doc/TODO.021

@@ -110,6 +110,8 @@ Roger
   - Did we actually apply Steven's dkimproxy patch?
   - Did we actually apply Steven's dkimproxy patch?
   - Brainstorm about safe but effective ways for vidalia to
   - Brainstorm about safe but effective ways for vidalia to
     auto-update its user's bridges via Tor in the background.
     auto-update its user's bridges via Tor in the background.
+  - it doesn't count as successfully opening a circuit if it's not
+    an exit circuit.
 
 
 Mike:
 Mike:
   - Roger wants to get an email every time there's a blog change,
   - Roger wants to get an email every time there's a blog change,
@@ -190,6 +192,8 @@ R   d 128: families of private bridges
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
     - 147: Eliminate the need for v2 directories in generating v3 directories
     - 147: Eliminate the need for v2 directories in generating v3 directories
+R     - authorities should initiate a reachability test upon first
+        glimpsing a new descriptor.
     - 148: Stream end reasons from the client side should be uniform.
     - 148: Stream end reasons from the client side should be uniform.
 K   - 155: Four Improvements of Hidden Service Performance
 K   - 155: Four Improvements of Hidden Service Performance
 
 

+ 1 - 1
doc/spec/proposals/124-tls-certificates.txt

@@ -143,7 +143,7 @@ Version negotiation and cipher suite selection:
         Cert_Length  [2 bytes]
         Cert_Length  [2 bytes]
         Certificate  [<cert_length> bytes]
         Certificate  [<cert_length> bytes]
 
 
-  Each certificate MUST sign the one prececeding it. The initator MUST
+  Each certificate MUST sign the one preceding it. The initator MUST
   place its connection certificate first; the responder, having
   place its connection certificate first; the responder, having
   already sent its connection certificate as part of the TLS handshake
   already sent its connection certificate as part of the TLS handshake
   MUST place its identity certificate first.
   MUST place its identity certificate first.