aboutsummaryrefslogtreecommitdiff
path: root/proposals/proposal-status.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-02-25 11:19:11 -0500
committerNick Mathewson <nickm@torproject.org>2014-02-28 13:05:02 -0500
commit4203039b103551b946fb0c586bc305626d032257 (patch)
treeb8317990ccf60d4974c3f6a6b14be8899baccc9f /proposals/proposal-status.txt
parent2f9156263dde7db016f2a030d3d75ad415356705 (diff)
downloadtorspec-4203039b103551b946fb0c586bc305626d032257.tar.gz
torspec-4203039b103551b946fb0c586bc305626d032257.zip
Bring proposal-status.txt up to date
This is the version I'm sending out today.
Diffstat (limited to 'proposals/proposal-status.txt')
-rw-r--r--proposals/proposal-status.txt82
1 files changed, 65 insertions, 17 deletions
diff --git a/proposals/proposal-status.txt b/proposals/proposal-status.txt
index 36f9fdc..43c8e4a 100644
--- a/proposals/proposal-status.txt
+++ b/proposals/proposal-status.txt
@@ -4,35 +4,49 @@ December[0], based on the one I did in November[1] based on the
one I did in June of 2012[2], based on the one I did in May[3] of 2011.
Future versions of this document will be maintained in the torspec
-repository.
+repository as "proposals/proposal-status.txt". I'll still send them
+to tor-dev periodically.
If you're looking for something to review, think about, or comment
on:
Review 212 (using older consensuses) or 215 (obsoleting
- consensus methods) if you understand the directory system even a
- little bit; they are quite simple.
+ consensus methods) if you understand the directory system even
+ a little bit; they are quite simple.
Review 219 if you're a DNS geek, or you'd like Tor to work
better with more DNS types.
- Review 220 (ed25519 identity keys) if you like designing
- signature things, if you have good ideas about future-proofing
- key type migration, or if you care about making Tor servers'
- identity keys stronger.
+ Review 220 (ed25519 identity keys) and 228
+ (cross-certification) if you like designing signature things,
+ if you have good ideas about future-proofing key type
+ migration, or if you care about making Tor servers' identity
+ keys stronger.
- Review 223 (ACE handshake) if you're a cryptographer, or a cryptography
- implementer, and you'd like an even faster replacement for the
- ntor handshake.
+ Review 223 (ACE handshake) if you're a cryptographer, or a
+ cryptography implementer, and you'd like an even faster
+ replacement for the ntor handshake.
Review 224 if you want to look through a big, complex protocol
with a lot of pieces. Also review it if you care about hidden
services and making them better.
+ Review 226 if you're interested in bridgedb development.
+
Review something else if you want to take a possibly good idea
that needs more momentum and promote it, fix it up, or finally
kill it off.
+I note in passing that many of the proposals below seem stalled,
+perhaps permanently: some because we don't know how to answer their
+open questions, others because we're not sure if they're a good
+idea, others because they don't seem implementable yet. Is that the
+best way to characterize it? Should we have a new "stalled"
+proposal status or something? Should we have a
+"rejected-pending-revision" status that we use effectively for
+everything that doesn't seem likely to get revised or implemented
+any time soon? Other suggestions would be welcome.
+
Finally: if you've sent something to tor-dev or to me that should
have a proposal number, but doesn't have one yet, please ping me
again to remind me!
@@ -386,17 +400,17 @@ again to remind me!
220 Migrate server identity keys to Ed25519
- This one is an intial design to migrate server identity keys to
+ This one is a design to migrate server identity keys to
Ed25519 for improved security margin. It needs more analysis of
long-term migration to other signing key types -- what do we do
- if we want to add support for EdDSA over Curve2617 or something?
+ if we want to add support for EdDSA over Curve3617 or something?
Can we make it easier than this? And it also needs analysis to
make sure it enables us to eventually drop RSA1024 keys
entirely.
I've started building this, though, so we'd better figure out
out fairly soon. Other proposals, like 224, depend on this one.
- (12/2013)
+ (2/2014)
223 Ace: Improved circuit-creation key exchange
@@ -436,12 +450,46 @@ again to remind me!
something better. Some alternatives have already been discussed
on tor-dev; more work is needed, though. (12/2013)
-226 (writeme)
+226 Scalability and Stability Improvements to BridgeDB:
+ Switching to a Distributed Database System and RDBMS
+
+ This one outlines design and behavior changes for a seriously
+ refactored bridgedb. (2/2014)
+
+227 Include package fingerprints in consensus documents
+
+ Here we outline a scheme for including the digests of the latest
+ versions of Tor software in consensuses, to help with update
+ security. (2/2014)
+
+228 Cross-certifying identity keys with onion keys
+
+ This proposal signs each server's identity key with its onion
+ keys, to prove onion key ownership in the router descriptor.
+ It's not clear that this actually improves security, but it
+ fixes an annoying gap in our key authentication. (2/2014)
+229 Further SOCKS5 extensions
-227 (writeme)
+ Here's a nice idea for how we can support a new SOCKS5 protocol
+ extension to relay information between clients and Tor, and
+ between Tor and pluggable transports, more effectively. It
+ also adds some additional SOCKS5 error codes. There are some
+ open questions to answer. (2/2014)
Since last time:
- 147 was closed as unnecessary. See discussion in the new "Reasons for
- Rejection" section at the end of that proprosal.
+ 147 was closed as unnecessary. See discussion in the new "Reasons
+ for Rejection" section at the end of that proprosal.
+
+ 165 got clarified a little.
+
+ 185 has been tweaked based on commentary from Karsten: the flag it
+ proposes now works a little differently.
+
+ 220 has been revised to have a more unified certificate format.
+
+ 224 has been cleaned up, expanded, revised, and tightened.
+
+ Proposals 226, 227, 228, and 229 are new.
+