This is an automated email from the git hooks/post-receive script.
dgoulet pushed a change to branch main in repository torspec.
from ffceda4 Merge branch 'netflow_clarification' new ee0c415 prop339: Move to Accepted state new c619a19 tor-spec: Reserve relay command and protover for prop339
The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
Summary of changes: proposals/000-index.txt | 4 ++-- proposals/339-udp-over-tor.md | 2 +- proposals/BY_INDEX.md | 2 +- proposals/README.md | 2 +- tor-spec.txt | 10 ++++++++++ 5 files changed, 15 insertions(+), 5 deletions(-)
This is an automated email from the git hooks/post-receive script.
dgoulet pushed a commit to branch main in repository torspec.
commit ee0c415f8e6d73ee96a3cfb7e966e711b3083c09 Author: David Goulet dgoulet@torproject.org AuthorDate: Tue May 31 10:12:06 2022 -0400
prop339: Move to Accepted state
Signed-off-by: David Goulet dgoulet@torproject.org --- proposals/000-index.txt | 4 ++-- proposals/339-udp-over-tor.md | 2 +- proposals/BY_INDEX.md | 2 +- proposals/README.md | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index bdb5203..c2cc6a9 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -259,7 +259,7 @@ Proposals by number: 336 Randomized schedule for guard retries [ACCEPTED] 337 A simpler way to decide, "Is this guard usable?" [ACCEPTED] 338 Use an 8-byte timestamp in NETINFO cells [ACCEPTED] -339 UDP traffic over Tor [DRAFT] +339 UDP traffic over Tor [ACCEPTED]
Proposals by status: @@ -270,7 +270,6 @@ Proposals by status: 327 A First Take at PoW Over Introduction Circuits 329 Overcoming Tor's Bottlenecks with Traffic Splitting 331 Res tokens: Anonymous Credentials for Onion Service DoS Resilience - 339 UDP traffic over Tor NEEDS-REVISION: 212 Increase Acceptable Consensus Age [for 0.2.4.x+] 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] @@ -312,6 +311,7 @@ Proposals by status: 336 Randomized schedule for guard retries 337 A simpler way to decide, "Is this guard usable?" 338 Use an 8-byte timestamp in NETINFO cells + 339 UDP traffic over Tor META: 000 Index of Tor Proposals 001 The Tor Proposal Process diff --git a/proposals/339-udp-over-tor.md b/proposals/339-udp-over-tor.md index 2dbe3b5..96abf16 100644 --- a/proposals/339-udp-over-tor.md +++ b/proposals/339-udp-over-tor.md @@ -3,7 +3,7 @@ Filename: 339-udp-over-tor.md Title: UDP traffic over Tor Author: Nick Mathewson Created: 11 May 2020 -Status: Draft +Status: Accepted ```
# Introduction diff --git a/proposals/BY_INDEX.md b/proposals/BY_INDEX.md index 0e9aa1d..f55bc61 100644 --- a/proposals/BY_INDEX.md +++ b/proposals/BY_INDEX.md @@ -256,5 +256,5 @@ Below are a list of proposals sorted by their proposal number. See * [`336-randomize-guard-retries.md`](/proposals/336-randomize-guard-retries.md): Randomized schedule for guard retries [ACCEPTED] * [`337-simpler-guard-usability.md`](/proposals/337-simpler-guard-usability.md): A simpler way to decide, "Is this guard usable?" [ACCEPTED] * [`338-netinfo-y2038.md`](/proposals/338-netinfo-y2038.md): Use an 8-byte timestamp in NETINFO cells [ACCEPTED] -* [`339-udp-over-tor.md`](/proposals/339-udp-over-tor.md): UDP traffic over Tor [DRAFT] +* [`339-udp-over-tor.md`](/proposals/339-udp-over-tor.md): UDP traffic over Tor [ACCEPTED]
diff --git a/proposals/README.md b/proposals/README.md index 643cf53..b49573b 100644 --- a/proposals/README.md +++ b/proposals/README.md @@ -58,6 +58,7 @@ implementation. * [`336-randomize-guard-retries.md`](/proposals/336-randomize-guard-retries.md): Randomized schedule for guard retries * [`337-simpler-guard-usability.md`](/proposals/337-simpler-guard-usability.md): A simpler way to decide, "Is this guard usable?" * [`338-netinfo-y2038.md`](/proposals/338-netinfo-y2038.md): Use an 8-byte timestamp in NETINFO cells +* [`339-udp-over-tor.md`](/proposals/339-udp-over-tor.md): UDP traffic over Tor
## FINISHED proposals: implemented, specs not merged @@ -106,7 +107,6 @@ discussion. * [`327-pow-over-intro.txt`](/proposals/327-pow-over-intro.txt): A First Take at PoW Over Introduction Circuits * [`329-traffic-splitting.txt`](/proposals/329-traffic-splitting.txt): Overcoming Tor's Bottlenecks with Traffic Splitting * [`331-res-tokens-for-anti-dos.md`](/proposals/331-res-tokens-for-anti-dos.md): Res tokens: Anonymous Credentials for Onion Service DoS Resilience -* [`339-udp-over-tor.md`](/proposals/339-udp-over-tor.md): UDP traffic over Tor
## NEEDS-REVISION proposals: ideas that we can't implement as-is
This is an automated email from the git hooks/post-receive script.
dgoulet pushed a commit to branch main in repository torspec.
commit c619a19c5e32da013949088fbaac921822860ea8 Author: David Goulet dgoulet@torproject.org AuthorDate: Tue May 31 10:24:30 2022 -0400
tor-spec: Reserve relay command and protover for prop339
Signed-off-by: David Goulet dgoulet@torproject.org --- tor-spec.txt | 10 ++++++++++ 1 file changed, 10 insertions(+)
diff --git a/tor-spec.txt b/tor-spec.txt index 49516f4..234d209 100644 --- a/tor-spec.txt +++ b/tor-spec.txt @@ -1684,6 +1684,8 @@ see tor-design.pdf. 14 -- RELAY_EXTEND2 [forward] [control] 15 -- RELAY_EXTENDED2 [backward] [control]
+ 16..18 -- Reserved for UDP; Not yet in use, see prop339. + 32..40 -- Used for hidden services; see rend-spec-{v2,v3}.txt.
41..42 -- Used for circuit padding; see Section 3 of padding-spec.txt. @@ -2435,3 +2437,11 @@ see tor-design.pdf. "2" -- supports congestion control by the Exits which implies a new SENDME format and algorithm. See proposal 324 for more details. Advertised in tor 0.4.7.3-alpha. + +9.13. "Datagram" + + Describes the UDP protocol capabilities of a relay. + + "1" -- [RESERVED] supports UDP by an Exit as in the relay command + CONNECT_UDP, CONNECTED_UDP and DATAGRAM. See proposal + 339 for more details. (Not yet advertised, reserved)
tor-commits@lists.torproject.org