[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [torspec/master] Add two small proposals



commit 0c856b58719133110d09f35ca8eb47728d42748c
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Tue Sep 20 15:34:48 2011 -0400

    Add two small proposals
---
 proposals/184-v3-link-protocol.txt    |   82 +++++++++++++++++++++++++++++++++
 proposals/185-dir-without-dirport.txt |   41 ++++++++++++++++
 2 files changed, 123 insertions(+), 0 deletions(-)

diff --git a/proposals/184-v3-link-protocol.txt b/proposals/184-v3-link-protocol.txt
new file mode 100644
index 0000000..910f223
--- /dev/null
+++ b/proposals/184-v3-link-protocol.txt
@@ -0,0 +1,82 @@
+Filename: 184-v3-link-protocol.txt
+Title: Miscellaneous changes for a v3 Tor link protocol
+Author: Nick Mathewson
+Created: 19-Sep-2011
+Status: Open
+Target: 0.2.3.x
+
+Overview:
+
+  When proposals 176 and 179 are implemented, Tor will have a new
+  link protocol.  I propose two simple improvements for the v3 link
+  protocol: a more partitioned set of which types indicate
+  variable-length cells, and a better way to handle link padding if
+  and when we come up with a decent scheme for it.
+
+Motivation:
+
+  We're getting a new link protocol in 0.2.3.x, thanks (again) to
+  TLS fingerprinting concerns.  When we do, it'd be nice to take
+  care of some small issues that require a link protocol version
+  increment.
+
+  First, our system for introducing new variable-length cell types
+  has required a protocol increment for each one.  Unlike
+  fixed-length (512 byte) cells, we can't add new variable-length
+  cells in the existing link protocols and just let older clients
+  ignore them, because unless the recipient knows which cells are
+  variable-length, it will treat them as 512-byte cells and discard
+  too much of the stream or too little.  In the past, it's been
+  useful to be able to introduce new cell types without having to
+  increment the link protocol version.
+
+  Second, once we have our new TLS handshake in place, we will want
+  a good way to address the remaining fingerprinting opportunities.
+  Some of those will likely involve traffic volume.  We can't fix
+  that easily with our existing PADDING cell type, since PADDING
+  cells are fixed-length, and wouldn't be so easy to use to break up
+  our TLS record sizes.
+
+Design: Indicating variable-length cells.
+
+  Beginning with the v3 link protocol, we specify that all cell
+  types in the range 128..255 indicate variable-length cells.
+  Cell types in the range 0..127 are still used for 512-byte
+  cells, except that the VERSIONS cell type (7) also indicates a
+  variable-length cell (for backward compatibility).
+
+  As before, all Tor instances must ignore cells with types that
+  they don't recognize.
+
+Design: Variable-length padding.
+
+  We add a new variable-length cell type, "VPADDING", to be used for
+  padding.  All Tor instances may send a DROP cell at any point that
+  a VERSIONS cell is not required; a VPADDING cell's body may be any
+  length; the body of a VPADDING cell MAY have any content.  Upon
+  receiving a VPADDING cell, the recipient should drop it, as with a
+  PADDING cell.
+
+Interaction with proposal 176:
+
+  Proposal 176 says that during the v3 handshake, no cells other
+  than VERSIONS, AUTHENTICATE, AUTH_CHALLENGE, CERT, and NETINFO are
+  allowed, and those are only allowed in their standard order.  If
+  this proposal is accepted, then VPADDING cells should also be
+  allowed in the handshake at any point after the VERSIONS cell.
+  They should be included when computing the "SLOG" and "CLOG"
+  handshake-digest fields of the AUTHENTICATE cell.
+
+Notes on future-proofing:
+
+  It may be in the future we need a new cell format that is neither the
+  original 512-byte format nor the variable-length format.  If we
+  do, we can just increment the link protocol version number again.
+
+  Right now we have 10 cell types; with this proposal and proposal
+  176, we will have 14.  It's unlikely that we'll run out any time
+  soon, but if we start to approach the number 64 with fixed-length
+  cell types or 196 with var-length cell types, we should consider
+  tweaking the link protocol to have a variable-length cell type
+  encoding.
+
diff --git a/proposals/185-dir-without-dirport.txt b/proposals/185-dir-without-dirport.txt
new file mode 100644
index 0000000..c84ec35
--- /dev/null
+++ b/proposals/185-dir-without-dirport.txt
@@ -0,0 +1,41 @@
+Filename: 185-dir-without-dirport.txt
+Title: Directory caches without DirPort
+Author: Nick Mathewson
+Created: 20-Sep-2011
+Status: Open
+
+Overview:
+
+  Exposing a directory port is no longer necessary for running as a
+  directory cache.  This proposal suggests that we eliminate that
+  requirement, and describes how.
+
+Motivation:
+
+  Now that we tunnel directory connections by default, it is no
+  longer necessary to have a DirPort to be a directory cache.  In
+  fact, bridges act as directory caches but do not actually have a
+  DirPort exposed.  It would be nice and tidy to expand that
+  property to the rest of the network.
+
+Configuration:
+
+  Add a new torrc option, "DirCache".  Its values can be "0", "1",
+  and "auto".  If it is 0, we never act as a directory cache, even
+  if DirPort is set.  If it is 1, then we act as a directory cache
+  according to same rules as those used for nodes that set a
+  DirPort.  If it is "auto", then Tor decides whether to act as a
+  directory cache.
+
+Advertising cache status:
+
+  Nodes which are running as a directory cache but which do not have
+  a DirPort set should set the entry "dir-cache 1" in their router
+  descriptors.
+
+Consensus:
+
+  Authorities should assign a "DirCache" flag to all nodes running
+  as a directory cache that do not set a DirPort.
+
+  This does not require a new version of the consensus algorithm.



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits