aboutsummaryrefslogtreecommitdiff
path: root/proposals/000-index.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-06-03 11:27:52 -0700
committerNick Mathewson <nickm@torproject.org>2018-06-03 11:27:52 -0700
commit005a92b40d6666577572db3986a6a6c8dbe8bb14 (patch)
treea684ddd5b161a2c92c4e4f7e62e25a0683265b73 /proposals/000-index.txt
parent6d601e837d9f7d8a29c8815fea9252d397426020 (diff)
downloadtorspec-005a92b40d6666577572db3986a6a6c8dbe8bb14.tar.gz
torspec-005a92b40d6666577572db3986a6a6c8dbe8bb14.zip
Regenerate index once more.
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r--proposals/000-index.txt13
1 files changed, 7 insertions, 6 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index b1c7fa5..33b7f83 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -146,7 +146,7 @@ Proposals by number:
223 Ace: Improved circuit-creation key exchange [RESERVE]
224 Next-Generation Hidden Services in Tor [CLOSED]
225 Strawman proposal: commit-and-reveal shared rng [SUPERSEDED]
-226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN]
+226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [RESERVE]
227 Include package fingerprints in consensus documents [CLOSED]
228 Cross-certifying identity keys with onion keys [CLOSED]
229 Further SOCKS5 extensions [REJECTED]
@@ -189,8 +189,8 @@ Proposals by number:
266 Removing current obsolete clients from the Tor network [SUPERSEDED]
267 Tor Consensus Transparency [DRAFT]
268 New Guard Selection Behaviour [OBSOLETE]
-269 Transitionally secure hybrid handshakes [DRAFT]
-270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [DRAFT]
+269 Transitionally secure hybrid handshakes [NEEDS-REVISION]
+270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE]
271 Another algorithm for guard selection [CLOSED]
272 Listed routers should be Valid, Running, and treated as such [CLOSED]
273 Exit relay pinning for web services [DRAFT]
@@ -227,17 +227,16 @@ Proposals by status:
254 Padding Negotiation
255 Controller features to allow for load-balancing hidden services
267 Tor Consensus Transparency
- 269 Transitionally secure hybrid handshakes
- 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
273 Exit relay pinning for web services [for n/a]
279 A Name System API for Tor Onion Services
281 Downloading microdescriptors in bulk
294 TLS 1.3 Migration
+ NEEDS-REVISION:
+ 269 Transitionally secure hybrid handshakes
OPEN:
201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
212 Increase Acceptable Consensus Age [for 0.2.4.x+]
219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
- 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
262 Re-keying live circuits with new cryptographic material
275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
@@ -421,11 +420,13 @@ Proposals by status:
261 AEZ for relay cryptography
263 Request to change key exchange protocol for handshake v1.2
268 New Guard Selection Behaviour
+ 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
RESERVE:
133 Incorporate Unreachable ORs into the Tor Network
177 Abstaining from votes on individual flags [for 0.2.4.x]
211 Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
223 Ace: Improved circuit-creation key exchange
+ 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
242 Better performance and usability for the MyFamily option
256 Key revocation for relays and authorities
INFORMATIONAL: