diff options
author | David Goulet <dgoulet@torproject.org> | 2023-09-27 15:21:20 +0000 |
---|---|---|
committer | David Goulet <dgoulet@torproject.org> | 2023-09-27 15:21:20 +0000 |
commit | 6e08e3f80ca2ff2d732bcc3d4bc74747fd70be85 (patch) | |
tree | d2dcec7e419d00bb8620900b71c2e8336abe942a /proposals/000-index.txt | |
parent | 5f85fc315b6529024db6de0873e24876d4dfb854 (diff) | |
parent | 92b596009012860898ee0975e7b626245632dace (diff) | |
download | torspec-6e08e3f80ca2ff2d732bcc3d4bc74747fd70be85.tar.gz torspec-6e08e3f80ca2ff2d732bcc3d4bc74747fd70be85.zip |
Merge branch 'ticket211' into 'main'
Ticket211
See merge request tpo/core/torspec!168
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r-- | proposals/000-index.txt | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index 3cee3ae..ff6bf8b 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -185,7 +185,7 @@ Proposals by number: 262 Re-keying live circuits with new cryptographic material [RESERVE] 263 Request to change key exchange protocol for handshake v1.2 [OBSOLETE] 264 Putting version numbers on the Tor subprotocols [CLOSED] -265 Load Balancing with Overhead Parameters [ACCEPTED] +265 Load Balancing with Overhead Parameters [OPEN] 266 Removing current obsolete clients from the Tor network [SUPERSEDED] 267 Tor Consensus Transparency [OPEN] 268 New Guard Selection Behaviour [OBSOLETE] @@ -211,7 +211,7 @@ Proposals by number: 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [RESERVE] 289 Authenticating sendme cells to mitigate bandwidth attacks [CLOSED] 290 Continuously update consensus methods [META] -291 The move to two guard nodes [NEEDS-REVISION] +291 The move to two guard nodes [FINISHED] 292 Mesh-based vanguards [ACCEPTED] 293 Other ways for relays to know when to publish [CLOSED] 294 TLS 1.3 Migration [DRAFT] @@ -244,12 +244,12 @@ Proposals by number: 321 Better performance and usability for the MyFamily option (v2) [ACCEPTED] 322 Extending link specifiers to include the directory port [OPEN] 323 Specification for Walking Onions [OPEN] -324 RTT-based Congestion Control for Tor [OPEN] +324 RTT-based Congestion Control for Tor [FINISHED] 325 Packed relay cells: saving space on small commands [OBSOLETE] 326 The "tor-relay" Well-Known Resource Identifier [OPEN] -327 A First Take at PoW Over Introduction Circuits [DRAFT] +327 A First Take at PoW Over Introduction Circuits [FINISHED] 328 Make Relays Report When They Are Overloaded [CLOSED] -329 Overcoming Tor's Bottlenecks with Traffic Splitting [NEEDS-REVISION] +329 Overcoming Tor's Bottlenecks with Traffic Splitting [FINISHED] 330 Modernizing authority contact entries [OPEN] 331 Res tokens: Anonymous Credentials for Onion Service DoS Resilience [DRAFT] 332 Ntor protocol with extra data, version 3 [FINISHED] @@ -272,7 +272,6 @@ Proposals by status: DRAFT: 294 TLS 1.3 Migration 316 FlashFlow: A Secure Speed Test for Tor (Parent Proposal) - 327 A First Take at PoW Over Introduction Circuits 331 Res tokens: Anonymous Credentials for Onion Service DoS Resilience 342 Decoupling hs_interval and SRV lifetime NEEDS-REVISION: @@ -282,12 +281,11 @@ Proposals by status: 248 Remove all RSA identity keys 269 Transitionally secure hybrid handshakes 279 A Name System API for Tor Onion Services - 291 The move to two guard nodes 317 Improve security aspects of DNS name resolution - 329 Overcoming Tor's Bottlenecks with Traffic Splitting OPEN: 239 Consensus Hash Chaining 240 Early signing key revocation for directory authorities + 265 Load Balancing with Overhead Parameters [for arti-dirauth] 267 Tor Consensus Transparency 277 Detect multiple relay instances running with same ID [for 0.3.??] 287 Reduce circuit lifetime without overloading the network @@ -297,7 +295,6 @@ Proposals by status: 309 Optimistic SOCKS Data 322 Extending link specifiers to include the directory port 323 Specification for Walking Onions - 324 RTT-based Congestion Control for Tor 326 The "tor-relay" Well-Known Resource Identifier 330 Modernizing authority contact entries 340 Packed and fragmented relay messages @@ -305,9 +302,8 @@ Proposals by status: 343 CAA Extensions for the Tor Rendezvous Specification 344 Prioritizing Protocol Information Leaks in Tor ACCEPTED: - 265 Load Balancing with Overhead Parameters [for 0.2.9.x] - 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x] - 285 Directory documents should be standardized as UTF-8 + 282 Remove "Named" and "Unnamed" handling from consensus voting [for arti-dirauth] + 285 Directory documents should be standardized as UTF-8 [for arti-dirauth] 292 Mesh-based vanguards 301 Don't include package fingerprints in consensus documents 311 Tor Relay IPv6 Reachability @@ -324,6 +320,10 @@ Proposals by status: 290 Continuously update consensus methods FINISHED: 260 Rendezvous Single Onion Services [in 0.2.9.3-alpha] + 291 The move to two guard nodes + 324 RTT-based Congestion Control for Tor + 327 A First Take at PoW Over Introduction Circuits + 329 Overcoming Tor's Bottlenecks with Traffic Splitting 332 Ntor protocol with extra data, version 3 333 Vanguards lite [in 0.4.7.1-alpha] CLOSED: |