[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] update proposal status
commit d19dc71e0dfc3738a1018dc12825d4da7b3cee62
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Wed Aug 12 15:03:45 2015 -0400
update proposal status
---
proposals/220-ecc-id-keys.txt | 5 ++++-
proposals/228-cross-certification-onionkeys.txt | 2 +-
2 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt
index 793ef90..165f3cc 100644
--- a/proposals/220-ecc-id-keys.txt
+++ b/proposals/220-ecc-id-keys.txt
@@ -3,12 +3,15 @@ Title: Migrate server identity keys to Ed25519
Authors: Nick Mathewson
Created: 12 August 2013
Target: 0.2.x.x
-Status: Draft
+Status: Open
[Note: This is a draft proposal; I've probably made some important
mistakes, and there are parts that need more thinking. I'm
publishing it now so that we can do the thinking together.]
+ (Sections 0-3 are currently implemented, except for section 2.3. Sections
+ 4-8 are a work in progress.)
+
0. Introduction
In current Tor designs, router identity keys are limited to
diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt
index 09ec33b..64fe5f6 100644
--- a/proposals/228-cross-certification-onionkeys.txt
+++ b/proposals/228-cross-certification-onionkeys.txt
@@ -2,7 +2,7 @@ Filename: 228-cross-certification-onionkeys.txt
Title: Cross-certifying identity keys with onion keys
Author: Nick Mathewson
Created: 25 February 2014
-Status: Open
+Status: Closed
0. Abstract
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits