[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [torspec/master] update proposal status



commit d19dc71e0dfc3738a1018dc12825d4da7b3cee62
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Wed Aug 12 15:03:45 2015 -0400

    update proposal status
---
 proposals/220-ecc-id-keys.txt                   |    5 ++++-
 proposals/228-cross-certification-onionkeys.txt |    2 +-
 2 files changed, 5 insertions(+), 2 deletions(-)

diff --git a/proposals/220-ecc-id-keys.txt b/proposals/220-ecc-id-keys.txt
index 793ef90..165f3cc 100644
--- a/proposals/220-ecc-id-keys.txt
+++ b/proposals/220-ecc-id-keys.txt
@@ -3,12 +3,15 @@ Title: Migrate server identity keys to Ed25519
 Authors: Nick Mathewson
 Created: 12 August 2013
 Target: 0.2.x.x
-Status: Draft
+Status: Open
 
    [Note: This is a draft proposal; I've probably made some important
    mistakes, and there are parts that need more thinking.  I'm
    publishing it now so that we can do the thinking together.]
 
+   (Sections 0-3 are currently implemented, except for section 2.3.  Sections
+   4-8 are a work in progress.)
+
 0. Introduction
 
    In current Tor designs, router identity keys are limited to
diff --git a/proposals/228-cross-certification-onionkeys.txt b/proposals/228-cross-certification-onionkeys.txt
index 09ec33b..64fe5f6 100644
--- a/proposals/228-cross-certification-onionkeys.txt
+++ b/proposals/228-cross-certification-onionkeys.txt
@@ -2,7 +2,7 @@ Filename: 228-cross-certification-onionkeys.txt
 Title: Cross-certifying identity keys with onion keys
 Author: Nick Mathewson
 Created: 25 February 2014
-Status: Open
+Status: Closed
 
 
 0. Abstract

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits