[or-cvs] r17546: {tor} the bridge family proposal really resembles 'dead' more than (tor/trunk/doc/spec/proposals)

arma at seul.org arma at seul.org
Tue Dec 9 23:51:02 UTC 2008


Author: arma
Date: 2008-12-09 18:51:02 -0500 (Tue, 09 Dec 2008)
New Revision: 17546

Modified:
   tor/trunk/doc/spec/proposals/000-index.txt
   tor/trunk/doc/spec/proposals/128-bridge-families.txt
Log:
the bridge family proposal really resembles 'dead' more than it resembles
'finished'.


Modified: tor/trunk/doc/spec/proposals/000-index.txt
===================================================================
--- tor/trunk/doc/spec/proposals/000-index.txt	2008-12-09 23:50:35 UTC (rev 17545)
+++ tor/trunk/doc/spec/proposals/000-index.txt	2008-12-09 23:51:02 UTC (rev 17546)
@@ -50,7 +50,7 @@
 125  Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
 126  Getting GeoIP data and publishing usage summaries [CLOSED]
 127  Relaying dirport requests to Tor download site / website [DRAFT]
-128  Families of private bridges [FINISHED]
+128  Families of private bridges [DEAD]
 129  Block Insecure Protocols by Default [CLOSED]
 130  Version 2 Tor connection protocol [CLOSED]
 131  Help users to verify they are using Tor [NEEDS-REVISION]
@@ -115,7 +115,6 @@
    099  Miscellaneous proposals
  FINISHED:
    121  Hidden Service Authentication [in 0.2.1.x]
-   128  Families of private bridges [in 0.2.0.x]
    155  Four Improvements of Hidden Service Performance [in 0.2.1.x]
  CLOSED:
    101  Voting on the Tor Directory System [in 0.2.0.x]
@@ -154,4 +153,5 @@
    115  Two Hop Paths
    116  Two hop paths from entry guards
    120  Shutdown descriptors when Tor servers stop
+   128  Families of private bridges
    142  Combine Introduction and Rendezvous Points

Modified: tor/trunk/doc/spec/proposals/128-bridge-families.txt
===================================================================
--- tor/trunk/doc/spec/proposals/128-bridge-families.txt	2008-12-09 23:50:35 UTC (rev 17545)
+++ tor/trunk/doc/spec/proposals/128-bridge-families.txt	2008-12-09 23:51:02 UTC (rev 17546)
@@ -4,12 +4,8 @@
 Last-Modified: $Date$
 Author: Roger Dingledine
 Created: 2007-12-xx
-Status: Finished
-Implemented-In: 0.2.0.x
+Status: Dead
 
-  [This proposal is part implemented, and part dead (won't-implement).
-  Roger should add a note and merge it into the spec.]
-
 1. Overview
 
   Proposal 125 introduced the basic notion of how bridge authorities,
@@ -31,21 +27,40 @@
   out the details of how these volunteers find each other and decide to
   set up a family.
 
+2. Other notes.
 
-somebody needs to run a bridge authority
+  somebody needs to run a bridge authority
 
-it needs to have a torrc option to publish networkstatuses of its bridges
+  it needs to have a torrc option to publish networkstatuses of its bridges
 
-it should also do reachability testing just of those bridges
+  it should also do reachability testing just of those bridges
 
-people ask for the bridge networkstatus by asking for a url that
-contains a password. (it's safe to do this because of begin_dir.)
+  people ask for the bridge networkstatus by asking for a url that
+  contains a password. (it's safe to do this because of begin_dir.)
 
-so the bridge users need to know a) a password, and b) a bridge
-authority line.
+  so the bridge users need to know a) a password, and b) a bridge
+  authority line.
 
-the bridge users need to know the bridge authority line.
+  the bridge users need to know the bridge authority line.
 
-the bridge authority needs to know the password.
+  the bridge authority needs to know the password.
 
+3. Current state
 
+  I implemented a BridgePassword config option. Bridge authorities
+  should set it, and users who want to use those bridge authorities
+  should set it.
+
+  Now there is a new directory URL "/tor/networkstatus-bridges" that
+  directory mirrors serve if BridgeAuthoritativeDir is set and it's a
+  begin_dir connection. It looks for the header
+    Authorization: Basic %s
+  where %s is the base-64 bridge password.
+
+  I never got around to teaching clients how to set the header though,
+  so it may or may not, and may or may not do what we ultimate want.
+
+  I've marked this proposal dead; it really never should have left the
+  ideas/ directory. Somebody should pick it up sometime and finish the
+  design and implementation.
+



More information about the tor-commits mailing list