aboutsummaryrefslogtreecommitdiff
path: root/proposals/000-index.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-06-03 11:13:57 -0700
committerNick Mathewson <nickm@torproject.org>2018-06-03 11:13:57 -0700
commite64d1e86b0db15b5d5a463293cbd061713805fa2 (patch)
tree21e90d162ddf525d37ea3d54964cc381b88ef16f /proposals/000-index.txt
parent3161e9023766c85988cd03659a0d2fd631f17964 (diff)
downloadtorspec-e64d1e86b0db15b5d5a463293cbd061713805fa2.tar.gz
torspec-e64d1e86b0db15b5d5a463293cbd061713805fa2.zip
Reindex.
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r--proposals/000-index.txt46
1 files changed, 22 insertions, 24 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 3170365..7ac3b57 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -84,11 +84,11 @@ Proposals by number:
161 Computing Bandwidth Adjustments [CLOSED]
162 Publish the consensus in multiple flavors [CLOSED]
163 Detecting whether a connection comes from a client [SUPERSEDED]
-164 Reporting the status of server votes [OPEN]
-165 Easy migration for voting authority sets [OPEN]
+164 Reporting the status of server votes [OBSOLETE]
+165 Easy migration for voting authority sets [REJECTED]
166 Including Network Statistics in Extra-Info Documents [CLOSED]
167 Vote on network parameters in consensus [CLOSED]
-168 Reduce default circuit window [OPEN]
+168 Reduce default circuit window [REJECTED]
169 Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
170 Configuration options regarding circuit building [SUPERSEDED]
171 Separate streams across circuits by connection metadata [CLOSED]
@@ -110,12 +110,12 @@ Proposals by number:
187 Reserve a cell type to allow client authorization [CLOSED]
188 Bridge Guards and other anti-enumeration defenses [ACCEPTED]
189 AUTHORIZE and AUTHORIZED cells [OPEN]
-190 Bridge Client Authorization Based on a Shared Secret [NEEDS-REVISION]
+190 Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
191 Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
192 Automatically retrieve and store information about bridges [OPEN]
193 Safe cookie authentication for Tor controllers [CLOSED]
194 Mnemonic .onion URLs [SUPERSEDED]
-195 TLS certificate normalization for Tor 0.2.4.x [DRAFT]
+195 TLS certificate normalization for Tor 0.2.4.x [DEAD]
196 Extended ORPort and TransportControlPort [FINISHED]
197 Message-based Inter-Controller IPC Channel [REJECTED]
198 Restore semantics of TLS ClientHello [CLOSED]
@@ -123,7 +123,7 @@ Proposals by number:
200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
201 Make bridges report statistics on daily v3 network status requests [OPEN]
202 Two improved relay encryption protocols for Tor cells [OPEN]
-203 Avoiding censorship by impersonating an HTTPS server [DRAFT]
+203 Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
204 Subdomain support for Hidden Service addresses [CLOSED]
205 Remove global client-side DNS caching [CLOSED]
206 Preconfigured directory sources for bootstrapping [CLOSED]
@@ -150,8 +150,8 @@ Proposals by number:
227 Include package fingerprints in consensus documents [CLOSED]
228 Cross-certifying identity keys with onion keys [CLOSED]
229 Further SOCKS5 extensions [OPEN]
-230 How to change RSA1024 relay identity keys [DRAFT]
-231 Migrating authority RSA1024 identity keys [DRAFT]
+230 How to change RSA1024 relay identity keys [OBSOLETE]
+231 Migrating authority RSA1024 identity keys [OBSOLETE]
232 Pluggable Transport through SOCKS proxy [FINISHED]
233 Making Tor2Web mode faster [OPEN]
234 Adding remittance field to directory specification [OPEN]
@@ -166,14 +166,14 @@ Proposals by number:
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
245 Deprecating and removing the TAP circuit extension protocol [DRAFT]
-246 Merging Hidden Service Directories and Introduction Points [NEEDS-RESEARCH]
+246 Merging Hidden Service Directories and Introduction Points [REJECTED]
247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
248 Remove all RSA identity keys [DRAFT]
249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
250 Random Number Generation During Tor Voting [CLOSED]
251 Padding for netflow record resolution reduction [CLOSED]
252 Single Onion Services [SUPERSEDED]
-253 Out of Band Circuit HMACs [DRAFT]
+253 Out of Band Circuit HMACs [DEAD]
254 Padding Negotiation [DRAFT]
255 Controller features to allow for load-balancing hidden services [DRAFT]
256 Key revocation for relays and authorities [OPEN]
@@ -208,7 +208,7 @@ Proposals by number:
285 Directory documents should be standardized as UTF-8 [OPEN]
286 Controller APIs for hibernation access on mobile [OPEN]
287 Reduce circuit lifetime without overloading the network [OPEN]
-288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [DRAFT]
+288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
290 Continuously update consensus methods [OPEN]
291 The move to two guard nodes [OPEN]
@@ -220,15 +220,10 @@ Proposals by number:
Proposals by status:
DRAFT:
- 195 TLS certificate normalization for Tor 0.2.4.x [for 0.2.4.x]
- 203 Avoiding censorship by impersonating an HTTPS server
- 230 How to change RSA1024 relay identity keys [for 0.2.?]
- 231 Migrating authority RSA1024 identity keys [for 0.2.?]
239 Consensus Hash Chaining
240 Early signing key revocation for directory authorities
245 Deprecating and removing the TAP circuit extension protocol
248 Remove all RSA identity keys
- 253 Out of Band Circuit HMACs
254 Padding Negotiation
255 Controller features to allow for load-balancing hidden services
267 Tor Consensus Transparency
@@ -237,16 +232,8 @@ Proposals by status:
273 Exit relay pinning for web services [for n/a]
279 A Name System API for Tor Onion Services
281 Downloading microdescriptors in bulk
- 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
294 TLS 1.3 Migration
- NEEDS-REVISION:
- 190 Bridge Client Authorization Based on a Shared Secret
- NEEDS-RESEARCH:
- 246 Merging Hidden Service Directories and Introduction Points
OPEN:
- 164 Reporting the status of server votes
- 165 Easy migration for voting authority sets
- 168 Reduce default circuit window
177 Abstaining from votes on individual flags [for 0.2.4.x]
182 Credit Bucket
189 AUTHORIZE and AUTHORIZED cells
@@ -285,6 +272,7 @@ Proposals by status:
258 Denial-of-service resistance for directory authorities
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
+ 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
META:
000 Index of Tor Proposals
001 The Tor Proposal Process
@@ -409,20 +397,30 @@ Proposals by status:
120 Shutdown descriptors when Tor servers stop
128 Families of private bridges
142 Combine Introduction and Rendezvous Points
+ 195 TLS certificate normalization for Tor 0.2.4.x
213 Remove stream-level sendmes from the design
+ 253 Out of Band Circuit HMACs
REJECTED:
134 More robust consensus voting with diverse authority sets
147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.4.x]
+ 165 Easy migration for voting authority sets
+ 168 Reduce default circuit window
175 Automatically promoting Tor clients to nodes
197 Message-based Inter-Controller IPC Channel
241 Resisting guard-turnover attacks
+ 246 Merging Hidden Service Directories and Introduction Points
OBSOLETE:
127 Relaying dirport requests to Tor download site / website
131 Help users to verify they are using Tor
132 A Tor Web Service For Verifying Correct Browser Configuration
141 Download server descriptors on demand
144 Increase the diversity of circuits by detecting nodes belonging the same provider
+ 164 Reporting the status of server votes
+ 190 Bridge Client Authorization Based on a Shared Secret
199 Integration of BridgeFinder and BridgeFinderHelper
+ 203 Avoiding censorship by impersonating an HTTPS server
+ 230 How to change RSA1024 relay identity keys [for 0.2.?]
+ 231 Migrating authority RSA1024 identity keys [for 0.2.?]
259 New Guard Selection Behaviour
263 Request to change key exchange protocol for handshake v1.2
268 New Guard Selection Behaviour