commit 005a92b40d6666577572db3986a6a6c8dbe8bb14 Author: Nick Mathewson nickm@torproject.org Date: Sun Jun 3 11:27:52 2018 -0700
Regenerate index once more. --- proposals/000-index.txt | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt index b1c7fa5..33b7f83 100644 --- a/proposals/000-index.txt +++ b/proposals/000-index.txt @@ -146,7 +146,7 @@ Proposals by number: 223 Ace: Improved circuit-creation key exchange [RESERVE] 224 Next-Generation Hidden Services in Tor [CLOSED] 225 Strawman proposal: commit-and-reveal shared rng [SUPERSEDED] -226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN] +226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [RESERVE] 227 Include package fingerprints in consensus documents [CLOSED] 228 Cross-certifying identity keys with onion keys [CLOSED] 229 Further SOCKS5 extensions [REJECTED] @@ -189,8 +189,8 @@ Proposals by number: 266 Removing current obsolete clients from the Tor network [SUPERSEDED] 267 Tor Consensus Transparency [DRAFT] 268 New Guard Selection Behaviour [OBSOLETE] -269 Transitionally secure hybrid handshakes [DRAFT] -270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [DRAFT] +269 Transitionally secure hybrid handshakes [NEEDS-REVISION] +270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE] 271 Another algorithm for guard selection [CLOSED] 272 Listed routers should be Valid, Running, and treated as such [CLOSED] 273 Exit relay pinning for web services [DRAFT] @@ -227,17 +227,16 @@ Proposals by status: 254 Padding Negotiation 255 Controller features to allow for load-balancing hidden services 267 Tor Consensus Transparency - 269 Transitionally secure hybrid handshakes - 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope 273 Exit relay pinning for web services [for n/a] 279 A Name System API for Tor Onion Services 281 Downloading microdescriptors in bulk 294 TLS 1.3 Migration + NEEDS-REVISION: + 269 Transitionally secure hybrid handshakes OPEN: 201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x] 212 Increase Acceptable Consensus Age [for 0.2.4.x+] 219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x] - 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" 262 Re-keying live circuits with new cryptographic material 275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha] 276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha] @@ -421,11 +420,13 @@ Proposals by status: 261 AEZ for relay cryptography 263 Request to change key exchange protocol for handshake v1.2 268 New Guard Selection Behaviour + 270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope RESERVE: 133 Incorporate Unreachable ORs into the Tor Network 177 Abstaining from votes on individual flags [for 0.2.4.x] 211 Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+] 223 Ace: Improved circuit-creation key exchange + 226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" 242 Better performance and usability for the MyFamily option 256 Key revocation for relays and authorities INFORMATIONAL:
tor-commits@lists.torproject.org