[or-cvs] r9620: Add a motivation section to proposal 105. (in tor/trunk: . doc/spec/proposals)
nickm at seul.org
nickm at seul.org
Fri Feb 23 06:50:37 UTC 2007
Author: nickm
Date: 2007-02-23 01:50:36 -0500 (Fri, 23 Feb 2007)
New Revision: 9620
Modified:
tor/trunk/
tor/trunk/doc/spec/proposals/105-handshake-revision.txt
Log:
r12296 at Kushana: nickm | 2007-02-23 01:50:25 -0500
Add a motivation section to proposal 105.
Property changes on: tor/trunk
___________________________________________________________________
svk:merge ticket from /tor/trunk [r12296] on c95137ef-5f19-0410-b913-86e773d04f59
Modified: tor/trunk/doc/spec/proposals/105-handshake-revision.txt
===================================================================
--- tor/trunk/doc/spec/proposals/105-handshake-revision.txt 2007-02-22 10:57:42 UTC (rev 9619)
+++ tor/trunk/doc/spec/proposals/105-handshake-revision.txt 2007-02-23 06:50:36 UTC (rev 9620)
@@ -15,6 +15,44 @@
This is an open proposal.
+Motivation:
+
+ Our *current* approach to versioning the Tor protocol(s) has been as
+ follows:
+ - All changes must be backward compatible.
+ - It's okay to add new cell types, if they would be ignored by previous
+ versions of Tor.
+ - It's okay to add new data elements to cells, if they would have been
+ ignored by previous versions of Tor.
+ - For forward compatibility, Tor must ignore cell types it doesn't
+ recognize, and ignore data in those cells it doesn't expect.
+ - Clients can inspect the version of Tor declared in the platform line
+ of a router's descriptor, and use that to learn whether a server
+ supports a given feature. Servers, however, aren't assumed to all
+ know about each other, and so don't know the version of who they're
+ talking to.
+
+ This system has these problems:
+ - It's very hard to change fundamental aspects of the protocol, like the
+ cell format, the link protocol, any of the various encryption schemes,
+ and so on.
+ - The router-to-router link protocol has remained more-or-less frozen
+ for a long time, since we can't easily have an OR use new features
+ unless it knows the other OR will understand them.
+
+ We need to resolve these problems because:
+ - Our cipher suite is showing its age: SHA1/AES128/RSA1024/DH1024 will
+ not seem like the best idea for all time.
+ - There are many ideas circulating for multiple cell sizes; while it's
+ not obvious whether these are safe, we can't do them at all without a
+ mechanism to permit them.
+ - There are many ideas circulating for alternative cell relay rules:
+ they don't work unless they can coexist in the current network.
+ - If our protocol changes a lot, it's hard to describe any coherent
+ version of it: we need to say "the version that Tor versions W through
+ X use when talking to versions Y through Z". This makes analysis
+ harder.
+
Proposal:
1.0. Version numbers
More information about the tor-commits
mailing list