aboutsummaryrefslogtreecommitdiff
path: root/proposals
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-07-11 17:08:11 +0000
committerNick Mathewson <nickm@torproject.org>2008-07-11 17:08:11 +0000
commitbb38b2e4576ac4cd048727ce185cb461893193e3 (patch)
tree928bb35f9d6e7fe1ec9adcee2dc08849ea569054 /proposals
parentee615255599df3972b41b7cf4ba0e205f4a3e5e7 (diff)
downloadtorspec-bb38b2e4576ac4cd048727ce185cb461893193e3.tar.gz
torspec-bb38b2e4576ac4cd048727ce185cb461893193e3.zip
r16919@tombo: nickm | 2008-07-11 13:04:28 -0400
Update proposal statuses for 0.2.1.x. svn:r15843
Diffstat (limited to 'proposals')
-rw-r--r--proposals/000-index.txt40
-rw-r--r--proposals/117-ipv6-exits.txt3
-rw-r--r--proposals/120-shutdown-descriptors.txt2
-rw-r--r--proposals/128-bridge-families.txt5
-rw-r--r--proposals/134-robust-voting.txt2
-rw-r--r--proposals/137-bootstrap-phases.txt2
-rw-r--r--proposals/140-consensus-diffs.txt2
-rw-r--r--proposals/145-newguard-flag.txt3
-rw-r--r--proposals/148-uniform-client-end-reason.txt2
9 files changed, 34 insertions, 27 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index b414ba8..95fe650 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -32,17 +32,17 @@ Proposals by number:
107 Uptime Sanity Checking [CLOSED]
108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
109 No more than one server per IP address [CLOSED]
-110 Avoiding infinite length circuits [NEEDS-REVISION]
+110 Avoiding infinite length circuits [ACCEPTED]
111 Prioritizing local traffic over relayed traffic [FINISHED]
112 Bring Back Pathlen Coin Weight [SUPERSEDED]
113 Simplifying directory authority administration [SUPERSEDED]
114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
115 Two Hop Paths [DEAD]
116 Two hop paths from entry guards [DEAD]
-117 IPv6 exits [NEEDS-REVISION]
-118 Advertising multiple ORPorts at once [DRAFT]
+117 IPv6 exits [ACCEPTED]
+118 Advertising multiple ORPorts at once [ACCEPTED]
119 New PROTOCOLINFO command for controllers [CLOSED]
-120 Shutdown descriptors when Tor servers stop [OPEN]
+120 Shutdown descriptors when Tor servers stop [DEAD]
121 Hidden Service Authentication [OPEN]
122 Network status entries need a new Unnamed flag [CLOSED]
123 Naming authorities automatically create bindings [CLOSED]
@@ -50,27 +50,27 @@ Proposals by number:
125 Behavior for bridge users, bridge relays, and bridge authorities [FINISHED]
126 Getting GeoIP data and publishing usage summaries [CLOSED]
127 Relaying dirport requests to Tor download site / website [DRAFT]
-128 Families of private bridges [DRAFT]
+128 Families of private bridges [FINISHED]
129 Block Insecure Protocols by Default [CLOSED]
130 Version 2 Tor connection protocol [CLOSED]
131 Help users to verify they are using Tor [NEEDS-REVISION]
132 A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
133 Incorporate Unreachable ORs into the Tor Network [DRAFT]
-134 More robust consensus voting with diverse authority sets [DRAFT]
+134 More robust consensus voting with diverse authority sets [ACCEPTED]
135 Simplify Configuration of Private Tor Networks [ACCEPTED]
136 Mass authority migration with legacy keys [FINISHED]
-137 Keep controllers informed as Tor bootstraps [OPEN]
+137 Keep controllers informed as Tor bootstraps [FINISHED]
138 Remove routers that are not Running from consensus documents [CLOSED]
139 Download consensus documents only when it will be trusted [CLOSED]
-140 Provide diffs between consensuses [OPEN]
+140 Provide diffs between consensuses [ACCEPTED]
141 Download server descriptors on demand [DRAFT]
142 Combine Introduction and Rendezvous Points [OPEN]
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
144 Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
145 Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
146 Add new flag to reflect long-term stability [OPEN]
-147 Eliminate the need for v2 directories in generating v3 directories [OPEN]
-148 Stream end reasons from the client side should be uniform [OPEN]
+147 Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
+148 Stream end reasons from the client side should be uniform [ACCEPTED]
149 Using data from NETINFO cells [OPEN]
150 Exclude Exit Nodes from a circuit [DRAFT]
151 Improving Tor Path Selection [DRAFT]
@@ -79,35 +79,32 @@ Proposals by number:
Proposals by status:
DRAFT:
- 118 Advertising multiple ORPorts at once
127 Relaying dirport requests to Tor download site / website
- 128 Families of private bridges
132 A Tor Web Service For Verifying Correct Browser Configuration
133 Incorporate Unreachable ORs into the Tor Network
- 134 More robust consensus voting with diverse authority sets
141 Download server descriptors on demand
144 Increase the diversity of circuits by detecting nodes belonging the
150 Exclude Exit Nodes from a circuit
151 Improving Tor Path Selection
OPEN:
- 120 Shutdown descriptors when Tor servers stop
121 Hidden Service Authentication
- 137 Keep controllers informed as Tor bootstraps
- 140 Provide diffs between consensuses
142 Combine Introduction and Rendezvous Points
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors
145 Separate "suitable as a guard" from "suitable as a new guard"
146 Add new flag to reflect long-term stability
- 147 Eliminate the need for v2 directories in generating v3 directories
- 148 Stream end reasons from the client side should be uniform
149 Using data from NETINFO cells
NEEDS-REVISION:
- 110 Avoiding infinite length circuits
- 117 IPv6 exits
131 Help users to verify they are using Tor
NEEDS-RESEARCH:
ACCEPTED:
+ 110 Avoiding infinite length circuits
+ 117 IPv6 exits
+ 118 Advertising multiple ORPorts at once
+ 134 More robust consensus voting with diverse authority sets
135 Simplify Configuration of Private Tor Networks
+ 140 Provide diffs between consensuses
+ 147 Eliminate the need for v2 directories in generating v3 directories
+ 148 Stream end reasons from the client side should be uniform
META:
000 Index of Tor Proposals
001 The Tor Proposal Process
@@ -116,7 +113,9 @@ Proposals by status:
FINISHED:
111 Prioritizing local traffic over relayed traffic
125 Behavior for bridge users, bridge relays, and bridge authorities
+ 128 Families of private bridges
136 Mass authority migration with legacy keys
+ 137 Keep controllers informed as Tor bootstraps
CLOSED:
101 Voting on the Tor Directory System
102 Dropping "opt" from the directory format
@@ -144,3 +143,4 @@ Proposals by status:
100 Tor Unreliable Datagram Extension Proposal
115 Two Hop Paths
116 Two hop paths from entry guards
+ 120 Shutdown descriptors when Tor servers stop
diff --git a/proposals/117-ipv6-exits.txt b/proposals/117-ipv6-exits.txt
index b63dbc8..2b72090 100644
--- a/proposals/117-ipv6-exits.txt
+++ b/proposals/117-ipv6-exits.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: coderman
Created: 10-Jul-2007
-Status: Needs-Revision
+Status: Accepted
Overview
@@ -214,6 +214,7 @@ Contents
type that can hold an ipv6 address, since the way we encode ipv6
addresses elsewhere ("0.0.0.0 indicates that the next 16 bytes are ipv6")
is a bit dumb. -nickm]
+ [Actually, the length field lets us distinguish EXITPOLICY. -nickm]
2.2. Directory specification
diff --git a/proposals/120-shutdown-descriptors.txt b/proposals/120-shutdown-descriptors.txt
index f078050..f8b9e70 100644
--- a/proposals/120-shutdown-descriptors.txt
+++ b/proposals/120-shutdown-descriptors.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: Roger Dingledine
Created: 15-Aug-2007
-Status: Open
+Status: Dead
Overview:
diff --git a/proposals/128-bridge-families.txt b/proposals/128-bridge-families.txt
index f0915b0..0141bb7 100644
--- a/proposals/128-bridge-families.txt
+++ b/proposals/128-bridge-families.txt
@@ -4,7 +4,10 @@ Version: $Revision$
Last-Modified: $Date$
Author: Roger Dingledine
Created: 2007-12-xx
-Status: Draft
+Status: Finished
+
+ [This proposal is part implemented, and part dead (won't-implement).
+ Roger should add a note and merge it into the spec.]
1. Overview
diff --git a/proposals/134-robust-voting.txt b/proposals/134-robust-voting.txt
index 8e2173d..4cedd16 100644
--- a/proposals/134-robust-voting.txt
+++ b/proposals/134-robust-voting.txt
@@ -2,7 +2,7 @@ Filename: 134-robust-voting.txt
Title: More robust consensus voting with diverse authority sets
Author: Peter Palfrader
Created: 2008-04-01
-Status: Draft
+Status: Accepted
Overview:
diff --git a/proposals/137-bootstrap-phases.txt b/proposals/137-bootstrap-phases.txt
index fb949f8..4f6626d 100644
--- a/proposals/137-bootstrap-phases.txt
+++ b/proposals/137-bootstrap-phases.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: Roger Dingledine
Created: 07-Jun-2008
-Status: Open
+Status: Finished
1. Overview.
diff --git a/proposals/140-consensus-diffs.txt b/proposals/140-consensus-diffs.txt
index e2f0edc..2dfd3dc 100644
--- a/proposals/140-consensus-diffs.txt
+++ b/proposals/140-consensus-diffs.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: Peter Palfrader
Created: 13-Jun-2008
-Status: Open
+Status: Accepted
1. Overview.
diff --git a/proposals/145-newguard-flag.txt b/proposals/145-newguard-flag.txt
index 6e901fc..170bf06 100644
--- a/proposals/145-newguard-flag.txt
+++ b/proposals/145-newguard-flag.txt
@@ -6,6 +6,9 @@ Author: Nick Mathewson
Created: 1-Jul-2008
Status: Open
+[This could be obsoleted by proposal 141, which could replace NewGuard
+with a Guard weight.]
+
Overview
Right now, Tor has one flag that clients use both to tell which
diff --git a/proposals/148-uniform-client-end-reason.txt b/proposals/148-uniform-client-end-reason.txt
index 0ccfcd2..5399f3f 100644
--- a/proposals/148-uniform-client-end-reason.txt
+++ b/proposals/148-uniform-client-end-reason.txt
@@ -4,7 +4,7 @@ Version: $Revision$
Last-Modified: $Date$
Author: Roger Dingledine
Created: 2-Jul-2008
-Status: Open
+Status: Accepted
Overview