diff options
author | Nick Mathewson <nickm@torproject.org> | 2018-06-03 11:43:16 -0700 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-06-03 11:43:16 -0700 |
commit | d6ce1851e853bdd217e1a72ac554dcdbc303b848 (patch) | |
tree | 17a4782dfb9be575c66a4ddaf7010ca739654678 /proposals/000-index.txt | |
parent | abb0dc909d10fd6b9dbd47dd80e12f22811eded1 (diff) | |
download | torspec-d6ce1851e853bdd217e1a72ac554dcdbc303b848.tar.gz torspec-d6ce1851e853bdd217e1a72ac554dcdbc303b848.zip |
Mark more items as accepted/needs-rev
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r-- | proposals/000-index.txt | 48 |
1 files changed, 24 insertions, 24 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index 221137e..6865f58 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -132,14 +132,14 @@ Proposals by number: 209 Tuning the Parameters for the Path Bias Defense [OBSOLETE] 210 Faster Headless Consensus Bootstrapping [SUPERSEDED] 211 Internal Mapaddress for Tor Configuration Testing [RESERVE] -212 Increase Acceptable Consensus Age [OPEN] +212 Increase Acceptable Consensus Age [NEEDS-REVISION] 213 Remove stream-level sendmes from the design [DEAD] 214 Allow 4-byte circuit IDs in a new link protocol [CLOSED] 215 Let the minimum consensus method change with time [CLOSED] 216 Improved circuit-creation key exchange [CLOSED] 217 Tor Extended ORPort Authentication [FINISHED] 218 Controller events to better understand connection/circuit usage [CLOSED] -219 Support for full DNS and DNSSEC resolution in Tor [OPEN] +219 Support for full DNS and DNSSEC resolution in Tor [NEEDS-REVISION] 220 Migrate server identity keys to Ed25519 [CLOSED] 221 Stop using CREATE_FAST [CLOSED] 222 Stop sending client timestamps [CLOSED] @@ -159,22 +159,22 @@ Proposals by number: 236 The move to a single guard node [CLOSED] 237 All relays are directory servers [CLOSED] 238 Better hidden service stats from Tor relays [CLOSED] -239 Consensus Hash Chaining [DRAFT] +239 Consensus Hash Chaining [OPEN] 240 Early signing key revocation for directory authorities [DRAFT] 241 Resisting guard-turnover attacks [REJECTED] 242 Better performance and usability for the MyFamily option [RESERVE] 243 Give out HSDir flag only to relays with Stable flag [CLOSED] 244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED] -245 Deprecating and removing the TAP circuit extension protocol [DRAFT] +245 Deprecating and removing the TAP circuit extension protocol [NEEDS-REVISION] 246 Merging Hidden Service Directories and Introduction Points [REJECTED] 247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED] -248 Remove all RSA identity keys [DRAFT] +248 Remove all RSA identity keys [NEEDS-REVISION] 249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED] 250 Random Number Generation During Tor Voting [CLOSED] 251 Padding for netflow record resolution reduction [CLOSED] 252 Single Onion Services [SUPERSEDED] 253 Out of Band Circuit HMACs [DEAD] -254 Padding Negotiation [DRAFT] +254 Padding Negotiation [NEEDS-REVISION] 255 Controller features to allow for load-balancing hidden services [RESERVE] 256 Key revocation for relays and authorities [RESERVE] 257 Refactoring authorities and making them more isolated from the net [META] @@ -187,7 +187,7 @@ Proposals by number: 264 Putting version numbers on the Tor subprotocols [CLOSED] 265 Load Balancing with Overhead Parameters [ACCEPTED] 266 Removing current obsolete clients from the Tor network [SUPERSEDED] -267 Tor Consensus Transparency [DRAFT] +267 Tor Consensus Transparency [OPEN] 268 New Guard Selection Behaviour [OBSOLETE] 269 Transitionally secure hybrid handshakes [NEEDS-REVISION] 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE] @@ -199,19 +199,19 @@ Proposals by number: 276 Report bandwidth with lower granularity in consensus documents [OPEN] 277 Detect multiple relay instances running with same ID [OPEN] 278 Directory Compression Scheme Negotiation [CLOSED] -279 A Name System API for Tor Onion Services [DRAFT] +279 A Name System API for Tor Onion Services [NEEDS-REVISION] 280 Privacy-Preserving Statistics with Privcount in Tor [SUPERSEDED] -281 Downloading microdescriptors in bulk [DRAFT] -282 Remove "Named" and "Unnamed" handling from consensus voting [OPEN] +281 Downloading microdescriptors in bulk [RESERVE] +282 Remove "Named" and "Unnamed" handling from consensus voting [ACCEPTED] 283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [CLOSED] 284 Hidden Service v3 Control Port [CLOSED] 285 Directory documents should be standardized as UTF-8 [OPEN] 286 Controller APIs for hibernation access on mobile [REJECTED] 287 Reduce circuit lifetime without overloading the network [OPEN] 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED] -289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN] +289 Authenticating sendme cells to mitigate bandwidth attacks [NEEDS-REVISION] 290 Continuously update consensus methods [META] -291 The move to two guard nodes [OPEN] +291 The move to two guard nodes [NEEDS-REVISION] 292 Mesh-based vanguards [ACCEPTED] 293 Other ways for relays to know when to publish [OPEN] 294 TLS 1.3 Migration [DRAFT] @@ -220,36 +220,35 @@ Proposals by number: Proposals by status: DRAFT: - 239 Consensus Hash Chaining 240 Early signing key revocation for directory authorities - 245 Deprecating and removing the TAP circuit extension protocol - 248 Remove all RSA identity keys - 254 Padding Negotiation - 267 Tor Consensus Transparency 273 Exit relay pinning for web services [for n/a] - 279 A Name System API for Tor Onion Services - 281 Downloading microdescriptors in bulk 294 TLS 1.3 Migration NEEDS-REVISION: + 212 Increase Acceptable Consensus Age [for 0.2.4.x+] + 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] + 245 Deprecating and removing the TAP circuit extension protocol + 248 Remove all RSA identity keys + 254 Padding Negotiation 269 Transitionally secure hybrid handshakes + 279 A Name System API for Tor Onion Services + 289 Authenticating sendme cells to mitigate bandwidth attacks + 291 The move to two guard nodes OPEN: 201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x] - 212 Increase Acceptable Consensus Age [for 0.2.4.x+] - 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] + 239 Consensus Hash Chaining 262 Re-keying live circuits with new cryptographic material + 267 Tor Consensus Transparency 275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha] 276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha] 277 Detect multiple relay instances running with same ID [for 0.3.??] - 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x] 285 Directory documents should be standardized as UTF-8 287 Reduce circuit lifetime without overloading the network - 289 Authenticating sendme cells to mitigate bandwidth attacks - 291 The move to two guard nodes 293 Other ways for relays to know when to publish [for 0.3.5] ACCEPTED: 188 Bridge Guards and other anti-enumeration defenses 249 Allow CREATE cells with >505 bytes of handshake data 265 Load Balancing with Overhead Parameters [for 0.2.9.x] + 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x] 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) 292 Mesh-based vanguards META: @@ -429,5 +428,6 @@ Proposals by status: 242 Better performance and usability for the MyFamily option 255 Controller features to allow for load-balancing hidden services 256 Key revocation for relays and authorities + 281 Downloading microdescriptors in bulk INFORMATIONAL: 159 Exit Scanning |