[tor-commits] [torspec/master] Update status on proposals 198, 205, 207

nickm at torproject.org nickm at torproject.org
Wed Dec 26 04:26:20 UTC 2012


commit aa1fbf4cb30054584ee1535c8326725d9eb74f64
Author: Nick Mathewson <nickm at torproject.org>
Date:   Tue Dec 25 23:26:16 2012 -0500

    Update status on proposals 198, 205, 207
---
 proposals/000-index.txt                         |   12 ++++++------
 proposals/198-restore-clienthello-semantics.txt |    2 +-
 proposals/205-local-dnscache.txt                |   10 +++++++++-
 proposals/207-directory-guards.txt              |   13 +++----------
 4 files changed, 19 insertions(+), 18 deletions(-)

diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 49a1985..7307eb5 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -118,16 +118,16 @@ Proposals by number:
 195  TLS certificate normalization for Tor 0.2.4.x [DRAFT]
 196  Extended ORPort and TransportControlPort [OPEN]
 197  Message-based Inter-Controller IPC Channel [OPEN]
-198  Restore semantics of TLS ClientHello [ACCEPTED]
+198  Restore semantics of TLS ClientHello [FINISHED]
 199  Integration of BridgeFinder and BridgeFinderHelper [OPEN]
 200  Adding new, extensible CREATE, EXTEND, and related cells [OPEN]
 201  Make bridges report statistics on daily v3 network status requests [OPEN]
 202  Two improved relay encryption protocols for Tor cells [OPEN]
 203  Avoiding censorship by impersonating an HTTPS server [DRAFT]
 204  Subdomain support for Hidden Service addresses [OPEN]
-205  Remove global client-side DNS caching [OPEN]
+205  Remove global client-side DNS caching [CLOSED]
 206  Preconfigured directory sources for bootstrapping [CLOSED]
-207  Directory guards [OPEN]
+207  Directory guards [CLOSED]
 208  IPv6 Exits Redux [FINISHED]
 209  Tuning the Parameters for the Path Bias Defense [OPEN]
 210  Faster Headless Consensus Bootstrapping [OPEN]
@@ -179,8 +179,6 @@ Proposals by status:
    201  Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
    202  Two improved relay encryption protocols for Tor cells
    204  Subdomain support for Hidden Service addresses
-   205  Remove global client-side DNS caching
-   207  Directory guards [for 0.2.4.x]
    209  Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
    210  Faster Headless Consensus Bootstrapping [for 0.2.4.x+]
    211  Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
@@ -197,7 +195,6 @@ Proposals by status:
    172  GETINFO controller option for circuit information
    173  GETINFO Option Expansion
    186  Multiple addresses for one OR or bridge [for 0.2.4.x+]
-   198  Restore semantics of TLS ClientHello [for 0.2.4.x]
  META:
    000  Index of Tor Proposals
    001  The Tor Proposal Process
@@ -213,6 +210,7 @@ Proposals by status:
    161  Computing Bandwidth Adjustments [for 0.2.1.x]
    162  Publish the consensus in multiple flavors [in 0.2.3.1-alpha]
    180  Pluggable transports for circumvention [in 0.2.3.x]
+   198  Restore semantics of TLS ClientHello [for 0.2.4.x]
    208  IPv6 Exits Redux [for 0.2.4.x] [in 0.2.4.7-alpha]
  CLOSED:
    101  Voting on the Tor Directory System [in 0.2.0.x]
@@ -254,7 +252,9 @@ Proposals by status:
    184  Miscellaneous changes for a v3 Tor link protocol [for 0.2.3.x]
    187  Reserve a cell type to allow client authorization [for 0.2.3.x]
    193  Safe cookie authentication for Tor controllers
+   205  Remove global client-side DNS caching [in 0.2.4.7-alpha.]
    206  Preconfigured directory sources for bootstrapping [in 0.2.4.7-alpha]
+   207  Directory guards [for 0.2.4.x]
  SUPERSEDED:
    112  Bring Back Pathlen Coin Weight
    113  Simplifying directory authority administration
diff --git a/proposals/198-restore-clienthello-semantics.txt b/proposals/198-restore-clienthello-semantics.txt
index c3b74c6..c40da64 100644
--- a/proposals/198-restore-clienthello-semantics.txt
+++ b/proposals/198-restore-clienthello-semantics.txt
@@ -2,7 +2,7 @@ Filename: 198-restore-clienthello-semantics.txt
 Title: Restore semantics of TLS ClientHello
 Author: Nick Mathewson
 Created: 19-Mar-2012
-Status: Accepted
+Status: Finished
 Target: 0.2.4.x
 
 Status:
diff --git a/proposals/205-local-dnscache.txt b/proposals/205-local-dnscache.txt
index e25e456..624e793 100644
--- a/proposals/205-local-dnscache.txt
+++ b/proposals/205-local-dnscache.txt
@@ -2,9 +2,17 @@ Filename: 205-local-dnscache.txt
 Title: Remove global client-side DNS caching
 Author: Nick Mathewson
 Created: 20 July 2012
-Status: Open
+Implemented-In: 0.2.4.7-alpha.
+Status: Closed
 
 
+-1. STATUS
+
+   In 0.2.4.7-alpha, client-side DNS caching is off by default; there
+   didn't seem to be much benefit in having per-circuit caches.  I'm
+   leaving the original proposal below in tact for historical reasons.
+     -Nick
+
 0. Overview
 
    This proposal suggests that, for reasons of security, we move
diff --git a/proposals/207-directory-guards.txt b/proposals/207-directory-guards.txt
index d0563be..8d21d3e 100644
--- a/proposals/207-directory-guards.txt
+++ b/proposals/207-directory-guards.txt
@@ -2,7 +2,7 @@ Filename: 207-directory-guards.txt
 Title: Directory guards
 Author: Nick Mathewson
 Created: 10-Oct-2012
-Status: Open
+Status: Closed
 Target: 0.2.4.x
 
 
@@ -21,8 +21,8 @@ Proposal:
    guards as those nodes are down, clients should also pick a small-ish set
    of directory guard nodes, to persist in Tor's state file.
 
-   Clients should not pick their own guards as directory guards, or pick
-   their directory guards as regular guards.
+   Clients should, as much as possible, use their regular guards as their
+   directory guards.
 
    When downloading a regular directory object (that is, not a hidden
    service descriptor), clients should prefer their directory guards
@@ -36,13 +36,6 @@ Proposal:
    guards and try them, and then use their directory guards to fetch multiple
    descriptors in parallel.
 
-Discussion:
-
-   The rule that the set of guards and the set of directory guards need to
-   be disjoint, and the rule that multiple directory guards need to be
-   providing descriptors, are both attempts to make it harder for a
-   single node to capture a route.
-
 Open questions and notes:
 
    What properties does a node need to be a suitable directory guard?



More information about the tor-commits mailing list