aboutsummaryrefslogtreecommitdiff
path: root/proposals
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-01-22 05:15:05 +0000
committerNick Mathewson <nickm@torproject.org>2008-01-22 05:15:05 +0000
commit1f40b59170f2dd574678e182594e1de62c0f6d9d (patch)
tree0a7c18df921a3002b2e0b1627d0649f9011acef8 /proposals
parenta9865dabf1c7f546f73d28c552a39ad9ee54adf9 (diff)
downloadtorspec-1f40b59170f2dd574678e182594e1de62c0f6d9d.tar.gz
torspec-1f40b59170f2dd574678e182594e1de62c0f6d9d.zip
r17723@catbus: nickm | 2008-01-22 00:14:57 -0500
Make idea proposal into proposal 130; answer question by sjmurdoch; mark 124 superseded; reindex svn:r13222
Diffstat (limited to 'proposals')
-rw-r--r--proposals/000-index.txt8
-rw-r--r--proposals/124-tls-certificates.txt2
-rw-r--r--proposals/130-v2-conn-protocol.txt (renamed from proposals/ideas/xxx-v2-conn-protocol.txt)8
3 files changed, 12 insertions, 6 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index e8d59a5..f6fe49a 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -46,11 +46,13 @@ Proposals by number:
121 Hidden Service Authentication [OPEN]
122 Network status entries need a new Unnamed flag [CLOSED]
123 Naming authorities automatically create bindings [OPEN]
-124 Blocking resistant TLS certificate usage [ACCEPTED]
+124 Blocking resistant TLS certificate usage [SUPERSEDED]
125 Behavior for bridge users, bridge relays, and bridge authorities [OPEN]
126 Getting GeoIP data and publishing usage summaries [OPEN]
127 Relaying dirport requests to Tor download site / website [DRAFT]
128 Families of private bridges [DRAFT]
+129 Block Insecure Protocols by Default [OPEN]
+130 Version 2 Tor connection protocol [OPEN]
Proposals by status:
@@ -66,9 +68,10 @@ Proposals by status:
123 Naming authorities automatically create bindings
125 Behavior for bridge users, bridge relays, and bridge authorities
126 Getting GeoIP data and publishing usage summaries
+ 129 Block Insecure Protocols by Default
+ 130 Version 2 Tor connection protocol
ACCEPTED:
105 Version negotiation for the Tor protocol
- 124 Blocking resistant TLS certificate usage
NEEDS-RESEARCH:
118 Advertising multiple ORPorts at once
META:
@@ -92,6 +95,7 @@ Proposals by status:
122 Network status entries need a new Unnamed flag
SUPERSEDED:
112 Bring Back Pathlen Coin Weight
+ 124 Blocking resistant TLS certificate usage
DEAD:
100 Tor Unreliable Datagram Extension Proposal
DRAFT:
diff --git a/proposals/124-tls-certificates.txt b/proposals/124-tls-certificates.txt
index bbad5af..3f10149 100644
--- a/proposals/124-tls-certificates.txt
+++ b/proposals/124-tls-certificates.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: Steven J. Murdoch
Created: 2007-10-25
-Status: Accepted
+Status: Superseded
Overview:
diff --git a/proposals/ideas/xxx-v2-conn-protocol.txt b/proposals/130-v2-conn-protocol.txt
index 9816cba..c17c982 100644
--- a/proposals/ideas/xxx-v2-conn-protocol.txt
+++ b/proposals/130-v2-conn-protocol.txt
@@ -1,10 +1,10 @@
-Filename: xxx-v2-conn-protocol.txt
+Filename: 130-v2-conn-protocol.txt
Title: Version 2 Tor connection protocol
Version: $Revision$
Last-Modified: $Date$
Author: Nick Mathewson
Created: 2007-10-25
-Status: Draft
+Status: Open
Overview:
@@ -98,7 +98,9 @@ Proposal:
renegotiation. This time, the server continues with two certificates
as usual, and asks for certificates so that the client will send
certificates of its own. Because the TLS connection has been
- established, all of this is encrypted.
+ established, all of this is encrypted. (The certificate sent by the
+ server in the renegotiated connection need not be the same that
+ as sentin the original connection.)
The server MUST NOT write any data until the client has renegotiated.