commit f6d98d50c9f4b25ca190fd3242007721656b580d Author: Nick Mathewson nickm@torproject.org Date: Mon Aug 12 10:46:08 2013 -0400
Tweak 219 a little more --- proposals/219-expanded-dns.txt | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/proposals/219-expanded-dns.txt b/proposals/219-expanded-dns.txt index b43e63e..76e7987 100644 --- a/proposals/219-expanded-dns.txt +++ b/proposals/219-expanded-dns.txt @@ -3,6 +3,7 @@ Title: Support for full DNS and DNSSEC resolution in Tor Authors: Ondrej Mikle Created: 4 February 2012 Modified: 2 August 2013 +Target: 0.2.5.x Status: Draft
0. Overview @@ -59,7 +60,7 @@ Status: Draft The FLAGS field is reserved, and should be set to 0 by all clients.
Because of the maximum length of the RELAY cell, the DNS packet may - not be longer than 496 bytes. [XXXX Is this enough?] + not be longer than 496 bytes. [XXXX Is this enough? -NM]
Some fields in the query must be omitted or set to zero: see section 3 below. @@ -89,8 +90,6 @@ Status: Draft cells, with contents: [00 04 00] R2[0:495], [00] R2[495:992], and [01] R2[992:1024] respectively.
- The server should {XXXXX}. - [NOTE: I'm using the length field and the is-this-the-last-cell field to allow multi-packet responses in the future. -NM]