diff options
Diffstat (limited to 'proposals/000-index.txt')
-rw-r--r-- | proposals/000-index.txt | 100 |
1 files changed, 61 insertions, 39 deletions
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index 4692f07..7e37484 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -1,3 +1,4 @@ +``` Filename: 000-index.txt Title: Index of Tor Proposals Author: Nick Mathewson @@ -18,8 +19,8 @@ Proposals by number: 000 Index of Tor Proposals [META] 001 The Tor Proposal Process [META] -098 Proposals that should be written [META] -099 Miscellaneous proposals [META] +098 Proposals that should be written [OBSOLETE] +099 Miscellaneous proposals [OBSOLETE] 100 Tor Unreliable Datagram Extension Proposal [DEAD] 101 Voting on the Tor Directory System [CLOSED] 102 Dropping "opt" from the directory format [CLOSED] @@ -185,7 +186,7 @@ Proposals by number: 262 Re-keying live circuits with new cryptographic material [RESERVE] 263 Request to change key exchange protocol for handshake v1.2 [OBSOLETE] 264 Putting version numbers on the Tor subprotocols [CLOSED] -265 Load Balancing with Overhead Parameters [ACCEPTED] +265 Load Balancing with Overhead Parameters [OPEN] 266 Removing current obsolete clients from the Tor network [SUPERSEDED] 267 Tor Consensus Transparency [OPEN] 268 New Guard Selection Behaviour [OBSOLETE] @@ -211,24 +212,24 @@ Proposals by number: 288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [RESERVE] 289 Authenticating sendme cells to mitigate bandwidth attacks [CLOSED] 290 Continuously update consensus methods [META] -291 The move to two guard nodes [NEEDS-REVISION] -292 Mesh-based vanguards [ACCEPTED] +291 The move to two guard nodes [FINISHED] +292 Mesh-based vanguards [CLOSED] 293 Other ways for relays to know when to publish [CLOSED] 294 TLS 1.3 Migration [DRAFT] 295 Using ADL for relay cryptography (solving the crypto-tagging attack) [OPEN] -296 Have Directory Authorities expose raw bandwidth list files [OPEN] +296 Have Directory Authorities expose raw bandwidth list files [CLOSED] 297 Relaxing the protover-based shutdown rules [CLOSED] 298 Putting family lines in canonical form [CLOSED] 299 Preferring IPv4 or IPv6 based on IP Version Failure Count [SUPERSEDED] 300 Walking Onions: Scaling and Saving Bandwidth [INFORMATIONAL] -301 Don't include package fingerprints in consensus documents [OPEN] +301 Don't include package fingerprints in consensus documents [CLOSED] 302 Hiding onion service clients using padding [CLOSED] 303 When and how to remove support for protocol versions [OPEN] 304 Extending SOCKS5 Onion Service Error Codes [CLOSED] 305 ESTABLISH_INTRO Cell DoS Defense Extension [CLOSED] 306 A Tor Implementation of IPv6 Happy Eyeballs [OPEN] 307 Onion Balance Support for Onion Service v3 [RESERVE] -308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography [OPEN] +308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography [SUPERSEDED] 309 Optimistic SOCKS Data [OPEN] 310 Towards load-balancing in Prop 271 [CLOSED] 311 Tor Relay IPv6 Reachability [ACCEPTED] @@ -239,27 +240,37 @@ Proposals by number: 316 FlashFlow: A Secure Speed Test for Tor (Parent Proposal) [DRAFT] 317 Improve security aspects of DNS name resolution [NEEDS-REVISION] 318 Limit protover values to 0-63 [CLOSED] -319 RELAY_FRAGMENT cells [OPEN] +319 RELAY_FRAGMENT cells [OBSOLETE] 320 Removing TAP usage from v2 onion services [REJECTED] 321 Better performance and usability for the MyFamily option (v2) [ACCEPTED] 322 Extending link specifiers to include the directory port [OPEN] 323 Specification for Walking Onions [OPEN] -324 RTT-based Congestion Control for Tor [OPEN] -325 Packed relay cells: saving space on small commands [OPEN] +324 RTT-based Congestion Control for Tor [FINISHED] +325 Packed relay cells: saving space on small commands [OBSOLETE] 326 The "tor-relay" Well-Known Resource Identifier [OPEN] -327 A First Take at PoW Over Introduction Circuits [DRAFT] +327 A First Take at PoW Over Introduction Circuits [CLOSED] 328 Make Relays Report When They Are Overloaded [CLOSED] -329 Overcoming Tor's Bottlenecks with Traffic Splitting [DRAFT] +329 Overcoming Tor's Bottlenecks with Traffic Splitting [FINISHED] 330 Modernizing authority contact entries [OPEN] 331 Res tokens: Anonymous Credentials for Onion Service DoS Resilience [DRAFT] -332 Ntor protocol with extra data, version 3 [FINISHED] -333 Vanguards lite [FINISHED] +332 Ntor protocol with extra data, version 3 [CLOSED] +333 Vanguards lite [CLOSED] 334 A Directory Authority Flag To Mark Relays As Middle-only [SUPERSEDED] 335 An authority-only design for MiddleOnly [CLOSED] -336 Randomized schedule for guard retries [ACCEPTED] -337 A simpler way to decide, "Is this guard usable?" [ACCEPTED] +336 Randomized schedule for guard retries [CLOSED] +337 A simpler way to decide, "Is this guard usable?" [CLOSED] 338 Use an 8-byte timestamp in NETINFO cells [ACCEPTED] -339 UDP traffic over Tor [DRAFT] +339 UDP traffic over Tor [ACCEPTED] +340 Packed and fragmented relay messages [OPEN] +341 A better algorithm for out-of-sockets eviction [OPEN] +342 Decoupling hs_interval and SRV lifetime [DRAFT] +343 CAA Extensions for the Tor Rendezvous Specification [OPEN] +344 Prioritizing Protocol Information Leaks in Tor [OPEN] +345 Migrating the tor specifications to mdbook [CLOSED] +346 Clarifying and extending the use of protocol versioning [OPEN] +347 Domain separation for certificate signing keys [OPEN] +348 UDP Application Support in Tor [OPEN] +349 Client-Side Command Acceptance Validation [DRAFT] Proposals by status: @@ -267,10 +278,9 @@ Proposals by status: DRAFT: 294 TLS 1.3 Migration 316 FlashFlow: A Secure Speed Test for Tor (Parent Proposal) - 327 A First Take at PoW Over Introduction Circuits - 329 Overcoming Tor's Bottlenecks with Traffic Splitting 331 Res tokens: Anonymous Credentials for Onion Service DoS Resilience - 339 UDP traffic over Tor + 342 Decoupling hs_interval and SRV lifetime + 349 Client-Side Command Acceptance Validation NEEDS-REVISION: 212 Increase Acceptable Consensus Age [for 0.2.4.x+] 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] @@ -278,52 +288,49 @@ Proposals by status: 248 Remove all RSA identity keys 269 Transitionally secure hybrid handshakes 279 A Name System API for Tor Onion Services - 291 The move to two guard nodes 317 Improve security aspects of DNS name resolution OPEN: 239 Consensus Hash Chaining 240 Early signing key revocation for directory authorities + 265 Load Balancing with Overhead Parameters [for arti-dirauth] 267 Tor Consensus Transparency 277 Detect multiple relay instances running with same ID [for 0.3.??] 287 Reduce circuit lifetime without overloading the network 295 Using ADL for relay cryptography (solving the crypto-tagging attack) - 296 Have Directory Authorities expose raw bandwidth list files - 301 Don't include package fingerprints in consensus documents 303 When and how to remove support for protocol versions 306 A Tor Implementation of IPv6 Happy Eyeballs - 308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography 309 Optimistic SOCKS Data - 319 RELAY_FRAGMENT cells 322 Extending link specifiers to include the directory port 323 Specification for Walking Onions - 324 RTT-based Congestion Control for Tor - 325 Packed relay cells: saving space on small commands 326 The "tor-relay" Well-Known Resource Identifier 330 Modernizing authority contact entries + 340 Packed and fragmented relay messages + 341 A better algorithm for out-of-sockets eviction + 343 CAA Extensions for the Tor Rendezvous Specification + 344 Prioritizing Protocol Information Leaks in Tor + 346 Clarifying and extending the use of protocol versioning + 347 Domain separation for certificate signing keys + 348 UDP Application Support in Tor ACCEPTED: - 265 Load Balancing with Overhead Parameters [for 0.2.9.x] - 282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x] - 285 Directory documents should be standardized as UTF-8 - 292 Mesh-based vanguards + 282 Remove "Named" and "Unnamed" handling from consensus voting [for arti-dirauth] + 285 Directory documents should be standardized as UTF-8 [for arti-dirauth] 311 Tor Relay IPv6 Reachability 312 Tor Relay Automatic IPv6 Address Discovery 313 Tor Relay IPv6 Statistics 321 Better performance and usability for the MyFamily option (v2) - 336 Randomized schedule for guard retries - 337 A simpler way to decide, "Is this guard usable?" 338 Use an 8-byte timestamp in NETINFO cells + 339 UDP traffic over Tor META: 000 Index of Tor Proposals 001 The Tor Proposal Process - 098 Proposals that should be written - 099 Miscellaneous proposals 202 Two improved relay encryption protocols for Tor cells 257 Refactoring authorities and making them more isolated from the net 290 Continuously update consensus methods FINISHED: 260 Rendezvous Single Onion Services [in 0.2.9.3-alpha] - 332 Ntor protocol with extra data, version 3 - 333 Vanguards lite [in 0.4.7.1-alpha] + 291 The move to two guard nodes + 324 RTT-based Congestion Control for Tor + 329 Overcoming Tor's Bottlenecks with Traffic Splitting CLOSED: 101 Voting on the Tor Directory System [in 0.2.0.x] 102 Dropping "opt" from the directory format [in 0.2.0.x] @@ -409,14 +416,17 @@ Proposals by status: 271 Another algorithm for guard selection [in 0.3.0.1-alpha] 272 Listed routers should be Valid, Running, and treated as such [in 0.2.9.3-alpha, 0.2.9.4-alpha] 274 Rotate onion keys less frequently [in 0.3.1.1-alpha] - 275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha] [in 0.4.7.3-alpha] + 275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha] [in 0.4.8.1-alpha] 278 Directory Compression Scheme Negotiation [in 0.3.1.1-alpha] 283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha] 284 Hidden Service v3 Control Port 289 Authenticating sendme cells to mitigate bandwidth attacks [in 0.4.1.1-alpha] + 292 Mesh-based vanguards 293 Other ways for relays to know when to publish [for 0.3.5] [in 0.4.0.1-alpha] + 296 Have Directory Authorities expose raw bandwidth list files [in 0.4.0.1-alpha] 297 Relaxing the protover-based shutdown rules [for 0.3.5.x] [in 0.4.0.x] 298 Putting family lines in canonical form [for 0.3.6.x] [in 0.4.0.1-alpha] + 301 Don't include package fingerprints in consensus documents 302 Hiding onion service clients using padding [in 0.4.1.1-alpha] 304 Extending SOCKS5 Onion Service Error Codes 305 ESTABLISH_INTRO Cell DoS Defense Extension @@ -424,8 +434,14 @@ Proposals by status: 314 Allow Markdown for proposal format 315 Updating the list of fields required in directory documents [in 0.4.5.1-alpha] 318 Limit protover values to 0-63 [in 0.4.5.1-alpha] + 327 A First Take at PoW Over Introduction Circuits 328 Make Relays Report When They Are Overloaded + 332 Ntor protocol with extra data, version 3 + 333 Vanguards lite [in 0.4.7.1-alpha] 335 An authority-only design for MiddleOnly [in 0.4.7.2-alpha] + 336 Randomized schedule for guard retries + 337 A simpler way to decide, "Is this guard usable?" + 345 Migrating the tor specifications to mdbook SUPERSEDED: 112 Bring Back Pathlen Coin Weight 113 Simplifying directory authority administration @@ -452,6 +468,7 @@ Proposals by status: 266 Removing current obsolete clients from the Tor network 280 Privacy-Preserving Statistics with Privcount in Tor 299 Preferring IPv4 or IPv6 based on IP Version Failure Count + 308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography 334 A Directory Authority Flag To Mark Relays As Middle-only DEAD: 100 Tor Unreliable Datagram Extension Proposal @@ -480,6 +497,8 @@ Proposals by status: 286 Controller APIs for hibernation access on mobile 320 Removing TAP usage from v2 onion services OBSOLETE: + 098 Proposals that should be written + 099 Miscellaneous proposals 127 Relaying dirport requests to Tor download site / website 131 Help users to verify they are using Tor 132 A Tor Web Service For Verifying Correct Browser Configuration @@ -502,6 +521,8 @@ Proposals by status: 263 Request to change key exchange protocol for handshake v1.2 268 New Guard Selection Behaviour 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope + 319 RELAY_FRAGMENT cells + 325 Packed relay cells: saving space on small commands RESERVE: 133 Incorporate Unreachable ORs into the Tor Network 172 GETINFO controller option for circuit information @@ -521,3 +542,4 @@ Proposals by status: INFORMATIONAL: 159 Exit Scanning 300 Walking Onions: Scaling and Saving Bandwidth +``` |