[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [torspec/master] grammar/etc clarifications while reading proposal 260



commit b6b2d248ca9b51876eb841c545c6641c1697aac0
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date:   Thu Feb 11 23:11:35 2016 -0500

    grammar/etc clarifications while reading proposal 260
---
 proposals/260-rend-single-onion.txt | 32 ++++++++++++++++----------------
 1 file changed, 16 insertions(+), 16 deletions(-)

diff --git a/proposals/260-rend-single-onion.txt b/proposals/260-rend-single-onion.txt
index fc01551..79990a8 100644
--- a/proposals/260-rend-single-onion.txt
+++ b/proposals/260-rend-single-onion.txt
@@ -29,10 +29,10 @@ Status: Draft
 2. Motivation
 
    Rendezvous single onion services are best used by sites which:
-      * Donâ??t require location anonymity
+      * Don't require location anonymity
       * Would appreciate lower latency or self-authenticated addresses
       * Would like to work with existing tor clients and relays
-      * Canâ??t accept connections to an open ORPort
+      * Can't accept connections to an open ORPort
 
    Rendezvous single onion services have a few benefits over double onion
    services:
@@ -61,7 +61,7 @@ Status: Draft
 
       * Connection latency is higher, as one-hop circuits are built to the
         introduction and rendezvous points. Single onion services perform one
-        extend to the single onion serviceâ??s ORPort only
+        extend to the single onion service's ORPort only
 
    It should also be noted that, while single onion services receive many
    incoming connections from different relays, rendezvous single onion
@@ -99,8 +99,8 @@ Status: Draft
    further discussion of security issues.)
 
    (Please note that this proposal follows the hop counting conventions in the
-   tor source code. A circuit with a single connections between the client and
-   the endpoint is one-hop, a circuit with 4 connections (and 3 nodes) between
+   tor source code. A circuit with a single connection between the client and
+   the endpoint is one-hop; a circuit with 4 connections (and 3 nodes) between
    the client and endpoint is four-hop.)
 
 5. Publishing a rendezvous single onion service
@@ -109,11 +109,11 @@ Status: Draft
    group of tor instances) must:
 
       * Publish onion descriptors in the same manner as any onion service,
-        using three-hop circuits. This avoids service blocking by IP address,
-        proposal #224 (next-generation hidden services) avoids blocking by
+        using three-hop circuits. This avoids service blocking by IP address.
+        Proposal #224 (next-generation hidden services) avoids blocking by
         onion address.
       * Perform the rendezvous protocol in the same manner as a double
-        onion service, but make the intro and rendezvous connections one-hop.
+        onion service, but make the intro and rendezvous circuits one-hop.
         (This may allow intro and rendezvous points to block the service.)
 
 5.1. Configuration options
@@ -130,10 +130,10 @@ Status: Draft
         a Rendezvous Single Onion Service. (Default: 0)
 
    Because of the grave consequences of misconfiguration here, we have added
-   â??NonAnonymousâ?? to the name of the torrc option. Furthermore, Tor MUST issue
+   'NonAnonymous' to the name of the torrc option. Furthermore, Tor MUST issue
    a startup warning message to operators of the onion service if this feature
    is enabled.
-   [Should the name start with â??NonAnonymousâ?? instead?]
+   [Should the name start with 'NonAnonymous' instead?]
 
    As RendezvousSingleOnionServiceNonAnonymousServer modifies the behaviour
    of every onion service on a tor instance, it is impossible to run hidden
@@ -271,7 +271,7 @@ Status: Draft
    service, or continue with the rendezvous protocol.
 
    Running a rendezvous single onion service and single onion service allows
-   older clients to connect via rendezvous, and newer clients to connenct via
+   older clients to connect via rendezvous, and newer clients to connect via
    extend. This is useful for the transition period where not all clients
    support single onion services.
 
@@ -319,7 +319,7 @@ Status: Draft
 6.4 Predicted circuits
 
    We should look whether we can optimize further the predicted circuits that
-   Tor makes as a onion service for this mode.
+   Tor makes as an onion service for this mode.
 
 8. Security Implications
 
@@ -342,7 +342,7 @@ Status: Draft
    single onion services due to their benefits. This could increase the
    traffic on the tor network, therefore increasing anonymity overall.
    However, the unique behaviour of each type of onion service may still be
-   distinguishable from both the client and server ends of the connection.
+   distinguishable on both the client and server ends of the connection.
 
 8.2 Hidden Service Designs can potentially be more secure
 
@@ -352,9 +352,9 @@ Status: Draft
 
 8.3 One-hop onion service paths may encourage more attacks
 
-   There's a possible second-order effect here since both encrypted
-   services and hidden services will have foo.onion addresses and it's
-   not clear based on the address whether the service will be hidden --
+   There's a possible second-order effect here since both RSOS
+   and double onion services will have foo.onion addresses and it's
+   not clear based on the address which one the service uses:
    if *some* .onion addresses are easy to track down, are we encouraging
    adversaries to attack all rendezvous points just in case?
 

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits