Browse Source

mark off todo items; add todo items; correct tor-spec.txt

svn:r2101
Roger Dingledine 21 years ago
parent
commit
a7d16e38eb
2 changed files with 18 additions and 16 deletions
  1. 10 3
      doc/TODO
  2. 8 13
      doc/tor-spec.txt

+ 10 - 3
doc/TODO

@@ -105,10 +105,10 @@ NICK    - Reputation info needs to give better weight to recent events than
           - and working
           - and working
 
 
       for pre1:
       for pre1:
-        - 0.0.8 ORs should use identity key for 0.0.7 ORs sometimes but
+        o 0.0.8 ORs should use identity key for 0.0.7 ORs sometimes but
           not always?
           not always?
-        - we should publish advertised_bandwidth in descriptor
-        - bug: 0.0.8 OPs can't extend from an 0.0.7 OR to an 0.0.8 OR
+        o we should publish advertised_bandwidth in descriptor
+        o bug: 0.0.8 OPs can't extend from an 0.0.7 OR to an 0.0.8 OR
 
 
       post pre1:
       post pre1:
         - when we sigint tor, the dns/cpuworkers don't intercept sigint?
         - when we sigint tor, the dns/cpuworkers don't intercept sigint?
@@ -117,6 +117,13 @@ NICK    - Reputation info needs to give better weight to recent events than
         - ORs use uniquer default nicknames
         - ORs use uniquer default nicknames
         - Tors deal appropriately when a newly-verified router has the
         - Tors deal appropriately when a newly-verified router has the
           same nickname as another router they know about
           same nickname as another router they know about
+        X 007 can't extend to unverified 008. they will never be able to.
+        - if a begin failed due to exit policy, but we believe the IP
+          should have been allowed, switch that router to exitpolicy
+          reject *:* until we get our next directory.
+        - make advertised_server_mode() ORs fetch dirs more often.
+        - should the running-routers list put unverified routers at the
+          end?
 
 
 
 
       ongoing:
       ongoing:

+ 8 - 13
doc/tor-spec.txt

@@ -11,10 +11,6 @@ This is not a design document; most design criteria are not examined.  For
 more information on why Tor acts as it does, see tor-design.pdf.
 more information on why Tor acts as it does, see tor-design.pdf.
 
 
 TODO: (very soon)
 TODO: (very soon)
-      X EXTEND cells should have hostnames or nicknames, so that OPs never
-        resolve OR hostnames.  Else DNS servers can give different answers to
-        different OPs, and compromise their anonymity.
-         - Alternatively, directories should include IPs.
       - REASON_CONNECTFAILED should include an IP.
       - REASON_CONNECTFAILED should include an IP.
       - Copy prose from tor-design to make everything more readable.
       - Copy prose from tor-design to make everything more readable.
 
 
@@ -68,8 +64,8 @@ TODO: (very soon)
    support any suite without ephemeral keys, symmetric keys of at
    support any suite without ephemeral keys, symmetric keys of at
    least 128 bits, and digests of at least 160 bits.
    least 128 bits, and digests of at least 160 bits.
 
 
-   An OR always sends two-certificate chain, consisting of a self-signed
-   certificate containing the OR's identity key, and of a second certificate
+   An OR always sends a two-certificate chain, consisting of a self-signed
+   certificate containing the OR's identity key, and a second certificate
    using a short-term connection key.  The commonName of the second
    using a short-term connection key.  The commonName of the second
    certificate is the OR's nickname, and the commonName of the first
    certificate is the OR's nickname, and the commonName of the first
    certificate is the OR's nickname, followed by a space and the string
    certificate is the OR's nickname, followed by a space and the string
@@ -79,8 +75,7 @@ TODO: (very soon)
    as expected.  (When initiating a connection, the expected identity key is
    as expected.  (When initiating a connection, the expected identity key is
    the one given in the directory; when creating a connection because of an
    the one given in the directory; when creating a connection because of an
    EXTEND cell, the expected identity key is the one given in the cell.)  If
    EXTEND cell, the expected identity key is the one given in the cell.)  If
-   the key is not as expected, the party must close the connection if it is
-   not.
+   the key is not as expected, the party must close the connection.
 
 
    Once a TLS connection is established, the two sides send cells
    Once a TLS connection is established, the two sides send cells
    (specified below) to one another.  Cells are sent serially.  All
    (specified below) to one another.  Cells are sent serially.  All
@@ -175,18 +170,18 @@ TODO: (very soon)
    The relay payload for an EXTEND relay cell consists of:
    The relay payload for an EXTEND relay cell consists of:
          Address                       [4 bytes]
          Address                       [4 bytes]
          Port                          [2 bytes]
          Port                          [2 bytes]
-         Public key hash               [20 bytes]
          Onion skin                    [186 bytes]
          Onion skin                    [186 bytes]
+         Public key hash               [20 bytes]
 
 
    The port and address field denote the IPV4 address and port of the
    The port and address field denote the IPV4 address and port of the
    next onion router in the circuit; the public key hash is the SHA1 hash of
    next onion router in the circuit; the public key hash is the SHA1 hash of
    the ASN1 encoding of the next onion router's identity key.
    the ASN1 encoding of the next onion router's identity key.
 
 
    [XXXX Before 0.0.8, EXTEND cells did not include the public key hash.
    [XXXX Before 0.0.8, EXTEND cells did not include the public key hash.
-   Servers running 0.0.8 distinguish the old-style cells based on the length
-   of payloads.  Clients running 0.0.8 check for servers version 0.0.7 or
-   later, and send them the old-style EXTEND cells.  In a future release,
-   old-style EXTEND cells will not be supported.]
+   Servers running 0.0.8 distinguish the old-style cells based on the
+   length of payloads. (Servers running 0.0.7 blindly pass on the extend
+   cell regardless of length.) In a future release, old-style EXTEND
+   cells will not be supported.]
 
 
    The payload for a CREATED cell, or the relay payload for an
    The payload for a CREATED cell, or the relay payload for an
    EXTENDED cell, contains:
    EXTENDED cell, contains: