aboutsummaryrefslogtreecommitdiff
path: root/proposals/000-index.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-06-03 11:43:16 -0700
committerNick Mathewson <nickm@torproject.org>2018-06-03 11:43:16 -0700
commitd6ce1851e853bdd217e1a72ac554dcdbc303b848 (patch)
tree17a4782dfb9be575c66a4ddaf7010ca739654678 /proposals/000-index.txt
parentabb0dc909d10fd6b9dbd47dd80e12f22811eded1 (diff)
downloadtorspec-d6ce1851e853bdd217e1a72ac554dcdbc303b848.tar.gz
torspec-d6ce1851e853bdd217e1a72ac554dcdbc303b848.zip
Mark more items as accepted/needs-rev
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r--proposals/000-index.txt48
1 files changed, 24 insertions, 24 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 221137e..6865f58 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -132,14 +132,14 @@ Proposals by number:
209 Tuning the Parameters for the Path Bias Defense [OBSOLETE]
210 Faster Headless Consensus Bootstrapping [SUPERSEDED]
211 Internal Mapaddress for Tor Configuration Testing [RESERVE]
-212 Increase Acceptable Consensus Age [OPEN]
+212 Increase Acceptable Consensus Age [NEEDS-REVISION]
213 Remove stream-level sendmes from the design [DEAD]
214 Allow 4-byte circuit IDs in a new link protocol [CLOSED]
215 Let the minimum consensus method change with time [CLOSED]
216 Improved circuit-creation key exchange [CLOSED]
217 Tor Extended ORPort Authentication [FINISHED]
218 Controller events to better understand connection/circuit usage [CLOSED]
-219 Support for full DNS and DNSSEC resolution in Tor [OPEN]
+219 Support for full DNS and DNSSEC resolution in Tor [NEEDS-REVISION]
220 Migrate server identity keys to Ed25519 [CLOSED]
221 Stop using CREATE_FAST [CLOSED]
222 Stop sending client timestamps [CLOSED]
@@ -159,22 +159,22 @@ Proposals by number:
236 The move to a single guard node [CLOSED]
237 All relays are directory servers [CLOSED]
238 Better hidden service stats from Tor relays [CLOSED]
-239 Consensus Hash Chaining [DRAFT]
+239 Consensus Hash Chaining [OPEN]
240 Early signing key revocation for directory authorities [DRAFT]
241 Resisting guard-turnover attacks [REJECTED]
242 Better performance and usability for the MyFamily option [RESERVE]
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
-245 Deprecating and removing the TAP circuit extension protocol [DRAFT]
+245 Deprecating and removing the TAP circuit extension protocol [NEEDS-REVISION]
246 Merging Hidden Service Directories and Introduction Points [REJECTED]
247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
-248 Remove all RSA identity keys [DRAFT]
+248 Remove all RSA identity keys [NEEDS-REVISION]
249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
250 Random Number Generation During Tor Voting [CLOSED]
251 Padding for netflow record resolution reduction [CLOSED]
252 Single Onion Services [SUPERSEDED]
253 Out of Band Circuit HMACs [DEAD]
-254 Padding Negotiation [DRAFT]
+254 Padding Negotiation [NEEDS-REVISION]
255 Controller features to allow for load-balancing hidden services [RESERVE]
256 Key revocation for relays and authorities [RESERVE]
257 Refactoring authorities and making them more isolated from the net [META]
@@ -187,7 +187,7 @@ Proposals by number:
264 Putting version numbers on the Tor subprotocols [CLOSED]
265 Load Balancing with Overhead Parameters [ACCEPTED]
266 Removing current obsolete clients from the Tor network [SUPERSEDED]
-267 Tor Consensus Transparency [DRAFT]
+267 Tor Consensus Transparency [OPEN]
268 New Guard Selection Behaviour [OBSOLETE]
269 Transitionally secure hybrid handshakes [NEEDS-REVISION]
270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE]
@@ -199,19 +199,19 @@ Proposals by number:
276 Report bandwidth with lower granularity in consensus documents [OPEN]
277 Detect multiple relay instances running with same ID [OPEN]
278 Directory Compression Scheme Negotiation [CLOSED]
-279 A Name System API for Tor Onion Services [DRAFT]
+279 A Name System API for Tor Onion Services [NEEDS-REVISION]
280 Privacy-Preserving Statistics with Privcount in Tor [SUPERSEDED]
-281 Downloading microdescriptors in bulk [DRAFT]
-282 Remove "Named" and "Unnamed" handling from consensus voting [OPEN]
+281 Downloading microdescriptors in bulk [RESERVE]
+282 Remove "Named" and "Unnamed" handling from consensus voting [ACCEPTED]
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [CLOSED]
284 Hidden Service v3 Control Port [CLOSED]
285 Directory documents should be standardized as UTF-8 [OPEN]
286 Controller APIs for hibernation access on mobile [REJECTED]
287 Reduce circuit lifetime without overloading the network [OPEN]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
-289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
+289 Authenticating sendme cells to mitigate bandwidth attacks [NEEDS-REVISION]
290 Continuously update consensus methods [META]
-291 The move to two guard nodes [OPEN]
+291 The move to two guard nodes [NEEDS-REVISION]
292 Mesh-based vanguards [ACCEPTED]
293 Other ways for relays to know when to publish [OPEN]
294 TLS 1.3 Migration [DRAFT]
@@ -220,36 +220,35 @@ Proposals by number:
Proposals by status:
DRAFT:
- 239 Consensus Hash Chaining
240 Early signing key revocation for directory authorities
- 245 Deprecating and removing the TAP circuit extension protocol
- 248 Remove all RSA identity keys
- 254 Padding Negotiation
- 267 Tor Consensus Transparency
273 Exit relay pinning for web services [for n/a]
- 279 A Name System API for Tor Onion Services
- 281 Downloading microdescriptors in bulk
294 TLS 1.3 Migration
NEEDS-REVISION:
+ 212 Increase Acceptable Consensus Age [for 0.2.4.x+]
+ 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
+ 245 Deprecating and removing the TAP circuit extension protocol
+ 248 Remove all RSA identity keys
+ 254 Padding Negotiation
269 Transitionally secure hybrid handshakes
+ 279 A Name System API for Tor Onion Services
+ 289 Authenticating sendme cells to mitigate bandwidth attacks
+ 291 The move to two guard nodes
OPEN:
201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
- 212 Increase Acceptable Consensus Age [for 0.2.4.x+]
- 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
+ 239 Consensus Hash Chaining
262 Re-keying live circuits with new cryptographic material
+ 267 Tor Consensus Transparency
275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
277 Detect multiple relay instances running with same ID [for 0.3.??]
- 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x]
285 Directory documents should be standardized as UTF-8
287 Reduce circuit lifetime without overloading the network
- 289 Authenticating sendme cells to mitigate bandwidth attacks
- 291 The move to two guard nodes
293 Other ways for relays to know when to publish [for 0.3.5]
ACCEPTED:
188 Bridge Guards and other anti-enumeration defenses
249 Allow CREATE cells with >505 bytes of handshake data
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
+ 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
292 Mesh-based vanguards
META:
@@ -429,5 +428,6 @@ Proposals by status:
242 Better performance and usability for the MyFamily option
255 Controller features to allow for load-balancing hidden services
256 Key revocation for relays and authorities
+ 281 Downloading microdescriptors in bulk
INFORMATIONAL:
159 Exit Scanning