[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] Mark proposal 297-safer-protocol-shutdowns.txt as implemented (#27735)
commit 18fcb9ab42cca4ce963202a22cd1f93f68ecd57c
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Tue Dec 11 09:52:35 2018 -0500
Mark proposal 297-safer-protocol-shutdowns.txt as implemented (#27735)
---
proposals/000-index.txt | 4 ++--
proposals/297-safer-protover-shutdowns.txt | 10 +++++++++-
tor-spec.txt | 16 ++++++++++++----
3 files changed, 23 insertions(+), 7 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 9746434..dda8572 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -217,7 +217,7 @@ Proposals by number:
294 TLS 1.3 Migration [DRAFT]
295 Using ADL-GCM for relay cryptography (solving the crypto-tagging attack) [OPEN]
296 Have Directory Authorities expose raw bandwidth list files [OPEN]
-297 Relaxing the protover-based shutdown rules [OPEN]
+297 Relaxing the protover-based shutdown rules [CLOSED]
298 Putting family lines in canonical form [CLOSED]
@@ -249,7 +249,6 @@ Proposals by status:
289 Authenticating sendme cells to mitigate bandwidth attacks
295 Using ADL-GCM for relay cryptography (solving the crypto-tagging attack)
296 Have Directory Authorities expose raw bandwidth list files
- 297 Relaxing the protover-based shutdown rules [for 0.3.5.x]
ACCEPTED:
188 Bridge Guards and other anti-enumeration defenses
249 Allow CREATE cells with >505 bytes of handshake data
@@ -355,6 +354,7 @@ Proposals by status:
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
284 Hidden Service v3 Control Port
293 Other ways for relays to know when to publish [for 0.3.5] [in 0.4.0.1-alpha]
+ 297 Relaxing the protover-based shutdown rules [for 0.3.5.x] [in 0.4.0.x]
298 Putting family lines in canonical form [for 0.3.6.x] [in 0.4.0.1-alpha]
SUPERSEDED:
112 Bring Back Pathlen Coin Weight
diff --git a/proposals/297-safer-protover-shutdowns.txt b/proposals/297-safer-protover-shutdowns.txt
index 0307df3..59fbac1 100644
--- a/proposals/297-safer-protover-shutdowns.txt
+++ b/proposals/297-safer-protover-shutdowns.txt
@@ -2,8 +2,16 @@ Filename: 297-safer-protover-shutdowns.txt
Title: Relaxing the protover-based shutdown rules
Author: Nick Mathewson
Created: 19-Sep-2018
-Status: Open
+Status: Closed
Target: 0.3.5.x
+Implemented-In: 0.4.0.x
+
+IMPLEMENTATION NOTE:
+
+ We went with the proposed change in section 2. The "release date" is
+ now updated by the "make update-versions" target whenever the version
+ number is incremented. Maintainers may also manually set the "release
+ date" to the future.
1. Introduction
diff --git a/tor-spec.txt b/tor-spec.txt
index 97d5159..f4d3f53 100644
--- a/tor-spec.txt
+++ b/tor-spec.txt
@@ -1935,19 +1935,27 @@ see tor-design.pdf.
it should warn its operator that the relay is obsolete.
- When a relay lacks a protocol listed in required-relay-protocols, it
- must not attempt to join the network.
+ should warn its operator as above. If the consensus is newer than the
+ date when the software was released or scheduled for release, it must
+ not attempt to join the network.
- When a client lacks a protocol listed in recommended-client-protocols,
it should warn the user that the client is obsolete.
- - When a client lacks a protocol listed in required-client-protocols, it
- must not connect to the network. This implements a "safe forward
- shutdown" mechanism for zombie clients.
+ - When a client lacks a protocol listed in required-client-protocols,
+ it should warn the user as above. If the consensus is newer than the
+ date when the software was released, it must not connect to the
+ network. This implements a "safe forward shutdown" mechanism for
+ zombie clients.
- If a client or relay has a cached consensus telling it that a given
protocol is required, and it does not implement that protocol, it
SHOULD NOT try to fetch a newer consensus.
+ Software release dates SHOULD be automatically updated as part of the
+ release process, to prevent forgetting to move them forward. Software
+ release dates MAY be manually adjusted by maintainers if necessary.
+
Starting in version 0.2.9.4-alpha, the initial required protocols for
clients that we will Recommend and Require are:
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits