[or-cvs] r15845: Mark proposal 150 accepted; add risks section; revise Englis (in tor/trunk: . doc/spec/proposals)

nickm at seul.org nickm at seul.org
Fri Jul 11 19:13:36 UTC 2008


Author: nickm
Date: 2008-07-11 15:13:36 -0400 (Fri, 11 Jul 2008)
New Revision: 15845

Modified:
   tor/trunk/
   tor/trunk/doc/spec/proposals/000-index.txt
   tor/trunk/doc/spec/proposals/150-exclude-exit-nodes.txt
Log:
 r16923 at tombo:  nickm | 2008-07-11 15:12:12 -0400
 Mark proposal 150 accepted; add risks section; revise English a bit.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r16923] on 49666b30-7950-49c5-bedf-9dc8f3168102

Modified: tor/trunk/doc/spec/proposals/000-index.txt
===================================================================
--- tor/trunk/doc/spec/proposals/000-index.txt	2008-07-11 19:01:48 UTC (rev 15844)
+++ tor/trunk/doc/spec/proposals/000-index.txt	2008-07-11 19:13:36 UTC (rev 15845)
@@ -72,7 +72,7 @@
 147  Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
 148  Stream end reasons from the client side should be uniform [ACCEPTED]
 149  Using data from NETINFO cells [OPEN]
-150  Exclude Exit Nodes from a circuit [DRAFT]
+150  Exclude Exit Nodes from a circuit [ACCEPTED]
 151  Improving Tor Path Selection [DRAFT]
 
 
@@ -84,7 +84,6 @@
    133  Incorporate Unreachable ORs into the Tor Network
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the
-   150  Exclude Exit Nodes from a circuit
    151  Improving Tor Path Selection
  OPEN:
    121  Hidden Service Authentication
@@ -105,6 +104,7 @@
    140  Provide diffs between consensuses
    147  Eliminate the need for v2 directories in generating v3 directories
    148  Stream end reasons from the client side should be uniform
+   150  Exclude Exit Nodes from a circuit
  META:
    000  Index of Tor Proposals
    001  The Tor Proposal Process

Modified: tor/trunk/doc/spec/proposals/150-exclude-exit-nodes.txt
===================================================================
--- tor/trunk/doc/spec/proposals/150-exclude-exit-nodes.txt	2008-07-11 19:01:48 UTC (rev 15844)
+++ tor/trunk/doc/spec/proposals/150-exclude-exit-nodes.txt	2008-07-11 19:13:36 UTC (rev 15845)
@@ -3,34 +3,45 @@
 Version: $Revision$
 Author: Mfr
 Created: 2008-06-15
-Status: Draft
+Status: Accepted
 
 Overview
 
-   Right now, Tor user can manually exclude a node of all the part of
-   circuits created using the directive ExcludeNodes.  
-   This proposal makes this exclusion, less restrictive, allowing to 
-   exclude a node only on the exit part of a circuit.
+   Right now, Tor users can manually exclude a node from all positions
+   in their circuits created using the directive ExcludeNodes.
+   This proposal makes this exclusion less restrictive, allowing users to
+   exclude a node only from the exit part of a circuit.
 
 Motivation
 
-   Helping the integration into vidalia (tor exit branch)or other tools,
-   of features to exclude a country for exit without reducing 
-   circuits possibilities, an privacy.
-   This feature could help people from a country were many sites 
-   are blocked to exclude this country for browsing, giving them a 
-   more stable navigation.
-   Add the possibility for the user to exclude the current used exit
-   node. 
-   
-   
+   This feature would Help the integration into vidalia (tor exit
+   branch) or other tools, of features to exclude a country for exit
+   without reducing circuits possibilities, and privacy.  This feature
+   could help people from a country were many sites are blocked to
+   exclude this country for browsing, giving them a more stable
+   navigation.  It could also add the possibility for the user to
+   exclude a currently used exit node.
+
 Implementation
 
    ExcludeExitNodes is similar to ExcludeNodes except it's only
    the exit node which is excluded for circuit build.
-   
+
    Tor doesn't warn if node from this list is not an exit node.
 
 Security implications:
 
-   Open also possibilities for a future user bad exit reporting.
\ No newline at end of file
+   Open also possibilities for a future user bad exit reporting
+
+Risks:
+
+   Use of this option can make users partitionable under certain attak
+   assumptions.  However, ExitNodes already creates this possibility,
+   so there isn't much increased risk in ExcludeExitNods.
+
+   We should still encourage people who exclude an exit node because
+   of bad behavior to report it instead of just adding it to their
+   ExcludeExit list.  It would be unfortunate if we didn't find out
+   about broken exits because of this option.  This issue can probably
+   be addressed sufficiently with documentation.
+



More information about the tor-commits mailing list