[or-cvs] r17216: {tor} some changes i found in my other sandbox (in tor/trunk/doc: . spec/proposals)

arma at seul.org arma at seul.org
Sat Nov 8 06:33:44 UTC 2008


Author: arma
Date: 2008-11-08 01:33:43 -0500 (Sat, 08 Nov 2008)
New Revision: 17216

Modified:
   tor/trunk/doc/TODO.021
   tor/trunk/doc/spec/proposals/124-tls-certificates.txt
Log:
some changes i found in my other sandbox


Modified: tor/trunk/doc/TODO.021
===================================================================
--- tor/trunk/doc/TODO.021	2008-11-08 06:32:46 UTC (rev 17215)
+++ tor/trunk/doc/TODO.021	2008-11-08 06:33:43 UTC (rev 17216)
@@ -110,6 +110,8 @@
   - Did we actually apply Steven's dkimproxy patch?
   - Brainstorm about safe but effective ways for vidalia to
     auto-update its user's bridges via Tor in the background.
+  - it doesn't count as successfully opening a circuit if it's not
+    an exit circuit.
 
 Mike:
   - Roger wants to get an email every time there's a blog change,
@@ -190,6 +192,8 @@
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
     - 147: Eliminate the need for v2 directories in generating v3 directories
+R     - authorities should initiate a reachability test upon first
+        glimpsing a new descriptor.
     - 148: Stream end reasons from the client side should be uniform.
 K   - 155: Four Improvements of Hidden Service Performance
 

Modified: tor/trunk/doc/spec/proposals/124-tls-certificates.txt
===================================================================
--- tor/trunk/doc/spec/proposals/124-tls-certificates.txt	2008-11-08 06:32:46 UTC (rev 17215)
+++ tor/trunk/doc/spec/proposals/124-tls-certificates.txt	2008-11-08 06:33:43 UTC (rev 17216)
@@ -143,7 +143,7 @@
         Cert_Length  [2 bytes]
         Certificate  [<cert_length> bytes]
 
-  Each certificate MUST sign the one prececeding it. The initator MUST
+  Each certificate MUST sign the one preceding it. The initator MUST
   place its connection certificate first; the responder, having
   already sent its connection certificate as part of the TLS handshake
   MUST place its identity certificate first.



More information about the tor-commits mailing list