[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] Regenerate index once more.
commit 005a92b40d6666577572db3986a6a6c8dbe8bb14
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Sun Jun 3 11:27:52 2018 -0700
Regenerate index once more.
---
proposals/000-index.txt | 13 +++++++------
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index b1c7fa5..33b7f83 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -146,7 +146,7 @@ Proposals by number:
223 Ace: Improved circuit-creation key exchange [RESERVE]
224 Next-Generation Hidden Services in Tor [CLOSED]
225 Strawman proposal: commit-and-reveal shared rng [SUPERSEDED]
-226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN]
+226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [RESERVE]
227 Include package fingerprints in consensus documents [CLOSED]
228 Cross-certifying identity keys with onion keys [CLOSED]
229 Further SOCKS5 extensions [REJECTED]
@@ -189,8 +189,8 @@ Proposals by number:
266 Removing current obsolete clients from the Tor network [SUPERSEDED]
267 Tor Consensus Transparency [DRAFT]
268 New Guard Selection Behaviour [OBSOLETE]
-269 Transitionally secure hybrid handshakes [DRAFT]
-270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [DRAFT]
+269 Transitionally secure hybrid handshakes [NEEDS-REVISION]
+270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE]
271 Another algorithm for guard selection [CLOSED]
272 Listed routers should be Valid, Running, and treated as such [CLOSED]
273 Exit relay pinning for web services [DRAFT]
@@ -227,17 +227,16 @@ Proposals by status:
254 Padding Negotiation
255 Controller features to allow for load-balancing hidden services
267 Tor Consensus Transparency
- 269 Transitionally secure hybrid handshakes
- 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
273 Exit relay pinning for web services [for n/a]
279 A Name System API for Tor Onion Services
281 Downloading microdescriptors in bulk
294 TLS 1.3 Migration
+ NEEDS-REVISION:
+ 269 Transitionally secure hybrid handshakes
OPEN:
201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
212 Increase Acceptable Consensus Age [for 0.2.4.x+]
219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
- 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
262 Re-keying live circuits with new cryptographic material
275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
@@ -421,11 +420,13 @@ Proposals by status:
261 AEZ for relay cryptography
263 Request to change key exchange protocol for handshake v1.2
268 New Guard Selection Behaviour
+ 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
RESERVE:
133 Incorporate Unreachable ORs into the Tor Network
177 Abstaining from votes on individual flags [for 0.2.4.x]
211 Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
223 Ace: Improved circuit-creation key exchange
+ 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
242 Better performance and usability for the MyFamily option
256 Key revocation for relays and authorities
INFORMATIONAL:
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits