commit 4ade9a3dbcdc8cca3d2afc036adbbd412a953a7c Author: Nick Mathewson nickm@torproject.org Date: Mon Feb 27 09:57:16 2017 -0500
Upgrade prop224 to accepted and 249 to open --- proposals/000-index.txt | 8 ++++---- proposals/224-rend-spec-ng.txt | 2 +- proposals/249-large-create-cells.txt | 2 +- 3 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index 9915b0a..e08816d 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -144,7 +144,7 @@ Proposals by number: 221 Stop using CREATE_FAST [CLOSED] 222 Stop sending client timestamps [CLOSED] 223 Ace: Improved circuit-creation key exchange [RESERVE] -224 Next-Generation Hidden Services in Tor [OPEN] +224 Next-Generation Hidden Services in Tor [ACCEPTED] 225 Strawman proposal: commit-and-reveal shared rng [SUPERSEDED] 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN] 227 Include package fingerprints in consensus documents [CLOSED] @@ -169,7 +169,7 @@ Proposals by number: 246 Merging Hidden Service Directories and Introduction Points [NEEDS-RESEARCH] 247 Defending Against Guard Discovery Attacks using Vanguards [DRAFT] 248 Remove all RSA identity keys [DRAFT] -249 Allow CREATE cells with >505 bytes of handshake data [DRAFT] +249 Allow CREATE cells with >505 bytes of handshake data [OPEN] 250 Random Number Generation During Tor Voting [CLOSED] 251 Padding for netflow record resolution reduction [DRAFT] 252 Single Onion Services [SUPERSEDED] @@ -212,7 +212,6 @@ Proposals by status: 245 Deprecating and removing the TAP circuit extension protocol 247 Defending Against Guard Discovery Attacks using Vanguards 248 Remove all RSA identity keys - 249 Allow CREATE cells with >505 bytes of handshake data 251 Padding for netflow record resolution reduction 253 Out of Band Circuit HMACs 254 Padding Negotiation @@ -240,12 +239,12 @@ Proposals by status: 210 Faster Headless Consensus Bootstrapping [for 0.2.8.x+] 212 Increase Acceptable Consensus Age [for 0.2.4.x+] 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] - 224 Next-Generation Hidden Services in Tor 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" 229 Further SOCKS5 extensions 233 Making Tor2Web mode faster 234 Adding remittance field to directory specification 242 Better performance and usability for the MyFamily option + 249 Allow CREATE cells with >505 bytes of handshake data 256 Key revocation for relays and authorities 261 AEZ for relay cryptography 262 Re-keying live circuits with new cryptographic material @@ -258,6 +257,7 @@ Proposals by status: 172 GETINFO controller option for circuit information 173 GETINFO Option Expansion 188 Bridge Guards and other anti-enumeration defenses + 224 Next-Generation Hidden Services in Tor 258 Denial-of-service resistance for directory authorities 265 Load Balancing with Overhead Parameters [for 0.2.9.x] META: diff --git a/proposals/224-rend-spec-ng.txt b/proposals/224-rend-spec-ng.txt index 69cd7c6..50bbdd3 100644 --- a/proposals/224-rend-spec-ng.txt +++ b/proposals/224-rend-spec-ng.txt @@ -2,7 +2,7 @@ Filename: 224-rend-spec-ng.txt Title: Next-Generation Hidden Services in Tor Author: Nick Mathewson Created: 2013-11-29 -Status: Open +Status: Accepted
Table of contents:
diff --git a/proposals/249-large-create-cells.txt b/proposals/249-large-create-cells.txt index e04b4c0..b7505c6 100644 --- a/proposals/249-large-create-cells.txt +++ b/proposals/249-large-create-cells.txt @@ -2,7 +2,7 @@ Filename: 249-large-create-cells.txt Title: Allow CREATE cells with >505 bytes of handshake data Authors: Nick Mathewson Created: 23 July 15 -Status: Draft +Status: Open
1. Summary