[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] Regenerate index once more.
commit c083575cebc3a9940c9160759116ea9577a395e0
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Sun Jun 3 11:23:29 2018 -0700
Regenerate index once more.
---
proposals/000-index.txt | 64 ++++++++++++++++++++++++-------------------------
1 file changed, 32 insertions(+), 32 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 7ac3b57..b1c7fa5 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -97,22 +97,22 @@ Proposals by number:
174 Optimistic Data for Tor: Server Side [CLOSED]
175 Automatically promoting Tor clients to nodes [REJECTED]
176 Proposed version-3 link handshake for Tor [CLOSED]
-177 Abstaining from votes on individual flags [OPEN]
+177 Abstaining from votes on individual flags [RESERVE]
178 Require majority of authorities to vote for consensus parameters [CLOSED]
179 TLS certificate and parameter normalization [CLOSED]
180 Pluggable transports for circumvention [CLOSED]
181 Optimistic Data for Tor: Client Side [CLOSED]
-182 Credit Bucket [OPEN]
+182 Credit Bucket [OBSOLETE]
183 Refill Intervals [CLOSED]
184 Miscellaneous changes for a v3 Tor link protocol [CLOSED]
185 Directory caches without DirPort [SUPERSEDED]
186 Multiple addresses for one OR or bridge [CLOSED]
187 Reserve a cell type to allow client authorization [CLOSED]
188 Bridge Guards and other anti-enumeration defenses [ACCEPTED]
-189 AUTHORIZE and AUTHORIZED cells [OPEN]
+189 AUTHORIZE and AUTHORIZED cells [OBSOLETE]
190 Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
-191 Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
-192 Automatically retrieve and store information about bridges [OPEN]
+191 Bridge Detection Resistance against MITM-capable Adversaries [OBSOLETE]
+192 Automatically retrieve and store information about bridges [OBSOLETE]
193 Safe cookie authentication for Tor controllers [CLOSED]
194 Mnemonic .onion URLs [SUPERSEDED]
195 TLS certificate normalization for Tor 0.2.4.x [DEAD]
@@ -122,14 +122,14 @@ Proposals by number:
199 Integration of BridgeFinder and BridgeFinderHelper [OBSOLETE]
200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
201 Make bridges report statistics on daily v3 network status requests [OPEN]
-202 Two improved relay encryption protocols for Tor cells [OPEN]
+202 Two improved relay encryption protocols for Tor cells [META]
203 Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
204 Subdomain support for Hidden Service addresses [CLOSED]
205 Remove global client-side DNS caching [CLOSED]
206 Preconfigured directory sources for bootstrapping [CLOSED]
207 Directory guards [CLOSED]
208 IPv6 Exits Redux [CLOSED]
-209 Tuning the Parameters for the Path Bias Defense [OPEN]
+209 Tuning the Parameters for the Path Bias Defense [OBSOLETE]
210 Faster Headless Consensus Bootstrapping [SUPERSEDED]
211 Internal Mapaddress for Tor Configuration Testing [RESERVE]
212 Increase Acceptable Consensus Age [OPEN]
@@ -149,12 +149,12 @@ Proposals by number:
226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN]
227 Include package fingerprints in consensus documents [CLOSED]
228 Cross-certifying identity keys with onion keys [CLOSED]
-229 Further SOCKS5 extensions [OPEN]
+229 Further SOCKS5 extensions [REJECTED]
230 How to change RSA1024 relay identity keys [OBSOLETE]
231 Migrating authority RSA1024 identity keys [OBSOLETE]
232 Pluggable Transport through SOCKS proxy [FINISHED]
-233 Making Tor2Web mode faster [OPEN]
-234 Adding remittance field to directory specification [OPEN]
+233 Making Tor2Web mode faster [REJECTED]
+234 Adding remittance field to directory specification [REJECTED]
235 Stop assigning (and eventually supporting) the Named flag [CLOSED]
236 The move to a single guard node [CLOSED]
237 All relays are directory servers [CLOSED]
@@ -162,7 +162,7 @@ Proposals by number:
239 Consensus Hash Chaining [DRAFT]
240 Early signing key revocation for directory authorities [DRAFT]
241 Resisting guard-turnover attacks [REJECTED]
-242 Better performance and usability for the MyFamily option [OPEN]
+242 Better performance and usability for the MyFamily option [RESERVE]
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
245 Deprecating and removing the TAP circuit extension protocol [DRAFT]
@@ -176,12 +176,12 @@ Proposals by number:
253 Out of Band Circuit HMACs [DEAD]
254 Padding Negotiation [DRAFT]
255 Controller features to allow for load-balancing hidden services [DRAFT]
-256 Key revocation for relays and authorities [OPEN]
+256 Key revocation for relays and authorities [RESERVE]
257 Refactoring authorities and making them more isolated from the net [META]
258 Denial-of-service resistance for directory authorities [ACCEPTED]
259 New Guard Selection Behaviour [OBSOLETE]
260 Rendezvous Single Onion Services [FINISHED]
-261 AEZ for relay cryptography [OPEN]
+261 AEZ for relay cryptography [OBSOLETE]
262 Re-keying live circuits with new cryptographic material [OPEN]
263 Request to change key exchange protocol for handshake v1.2 [OBSOLETE]
264 Putting version numbers on the Tor subprotocols [CLOSED]
@@ -206,13 +206,13 @@ Proposals by number:
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [ACCEPTED]
284 Hidden Service v3 Control Port [CLOSED]
285 Directory documents should be standardized as UTF-8 [OPEN]
-286 Controller APIs for hibernation access on mobile [OPEN]
+286 Controller APIs for hibernation access on mobile [REJECTED]
287 Reduce circuit lifetime without overloading the network [OPEN]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
-290 Continuously update consensus methods [OPEN]
+290 Continuously update consensus methods [META]
291 The move to two guard nodes [OPEN]
-292 Mesh-based vanguards [OPEN]
+292 Mesh-based vanguards [ACCEPTED]
293 Other ways for relays to know when to publish [OPEN]
294 TLS 1.3 Migration [DRAFT]
@@ -234,35 +234,19 @@ Proposals by status:
281 Downloading microdescriptors in bulk
294 TLS 1.3 Migration
OPEN:
- 177 Abstaining from votes on individual flags [for 0.2.4.x]
- 182 Credit Bucket
- 189 AUTHORIZE and AUTHORIZED cells
- 191 Bridge Detection Resistance against MITM-capable Adversaries
- 192 Automatically retrieve and store information about bridges [for 0.2.[45].x]
201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
- 202 Two improved relay encryption protocols for Tor cells
- 209 Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
212 Increase Acceptable Consensus Age [for 0.2.4.x+]
219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
- 229 Further SOCKS5 extensions
- 233 Making Tor2Web mode faster
- 234 Adding remittance field to directory specification
- 242 Better performance and usability for the MyFamily option
- 256 Key revocation for relays and authorities
- 261 AEZ for relay cryptography
262 Re-keying live circuits with new cryptographic material
275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
277 Detect multiple relay instances running with same ID [for 0.3.??]
282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x]
285 Directory documents should be standardized as UTF-8
- 286 Controller APIs for hibernation access on mobile
287 Reduce circuit lifetime without overloading the network
289 Authenticating sendme cells to mitigate bandwidth attacks
- 290 Continuously update consensus methods
291 The move to two guard nodes
- 292 Mesh-based vanguards
293 Other ways for relays to know when to publish [for 0.3.5]
ACCEPTED:
172 GETINFO controller option for circuit information
@@ -273,12 +257,15 @@ Proposals by status:
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
+ 292 Mesh-based vanguards
META:
000 Index of Tor Proposals
001 The Tor Proposal Process
098 Proposals that should be written
099 Miscellaneous proposals
+ 202 Two improved relay encryption protocols for Tor cells
257 Refactoring authorities and making them more isolated from the net
+ 290 Continuously update consensus methods
FINISHED:
160 Authorities vote for bandwidth offsets in consensus [for 0.2.1.x]
196 Extended ORPort and TransportControlPort [in 0.2.5.2-alpha]
@@ -407,8 +394,12 @@ Proposals by status:
168 Reduce default circuit window
175 Automatically promoting Tor clients to nodes
197 Message-based Inter-Controller IPC Channel
+ 229 Further SOCKS5 extensions
+ 233 Making Tor2Web mode faster
+ 234 Adding remittance field to directory specification
241 Resisting guard-turnover attacks
246 Merging Hidden Service Directories and Introduction Points
+ 286 Controller APIs for hibernation access on mobile
OBSOLETE:
127 Relaying dirport requests to Tor download site / website
131 Help users to verify they are using Tor
@@ -416,17 +407,26 @@ Proposals by status:
141 Download server descriptors on demand
144 Increase the diversity of circuits by detecting nodes belonging the same provider
164 Reporting the status of server votes
+ 182 Credit Bucket
+ 189 AUTHORIZE and AUTHORIZED cells
190 Bridge Client Authorization Based on a Shared Secret
+ 191 Bridge Detection Resistance against MITM-capable Adversaries
+ 192 Automatically retrieve and store information about bridges [for 0.2.[45].x]
199 Integration of BridgeFinder and BridgeFinderHelper
203 Avoiding censorship by impersonating an HTTPS server
+ 209 Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
230 How to change RSA1024 relay identity keys [for 0.2.?]
231 Migrating authority RSA1024 identity keys [for 0.2.?]
259 New Guard Selection Behaviour
+ 261 AEZ for relay cryptography
263 Request to change key exchange protocol for handshake v1.2
268 New Guard Selection Behaviour
RESERVE:
133 Incorporate Unreachable ORs into the Tor Network
+ 177 Abstaining from votes on individual flags [for 0.2.4.x]
211 Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
223 Ace: Improved circuit-creation key exchange
+ 242 Better performance and usability for the MyFamily option
+ 256 Key revocation for relays and authorities
INFORMATIONAL:
159 Exit Scanning
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits