[tor-commits] [torspec/master] Keep proposals/proposal-status.txt up to date.

asn at torproject.org asn at torproject.org
Fri Dec 2 17:25:28 UTC 2016


commit f930be377f829c63bc85a15df0f6bb7d84223774
Author: George Kadianakis <desnacked at riseup.net>
Date:   Fri Dec 2 12:23:27 2016 -0500

    Keep proposals/proposal-status.txt up to date.
---
 proposals/001-process.txt           |  3 ++
 proposals/259-guard-selection.txt   |  3 +-
 proposals/260-rend-single-onion.txt |  2 +-
 proposals/268-guard-selection.txt   |  4 +-
 proposals/proposal-status.txt       | 93 +++++++++++++++++++++++++++++++++++++
 5 files changed, 102 insertions(+), 3 deletions(-)

diff --git a/proposals/001-process.txt b/proposals/001-process.txt
index 6cddb47..ba65211 100644
--- a/proposals/001-process.txt
+++ b/proposals/001-process.txt
@@ -184,6 +184,9 @@ Proposal status:
       It isn't going to turn into a spec unless somebody copy-and-pastes
       it into a new spec for a new subsystem.
 
+   Obsolete: This proposal was flawed and has been superseded by another
+     proposal. See comments in the document for details.
+
    The editors maintain the correct status of proposals, based on rough
    consensus and their own discretion.
 
diff --git a/proposals/259-guard-selection.txt b/proposals/259-guard-selection.txt
index bb5e81c..30bdcfa 100644
--- a/proposals/259-guard-selection.txt
+++ b/proposals/259-guard-selection.txt
@@ -2,9 +2,10 @@ Filename: 259-guard-selection.txt
 Title: New Guard Selection Behaviour
 Author: Isis Lovecruft, George Kadianakis
 Created: 2015-10-28
-Status: Draft
+Status: Obsolete
 Extends: 241-suspicious-guard-turnover.txt
 
+This proposal was made obsolete by proposal #271.
 
 §1. Overview
 
diff --git a/proposals/260-rend-single-onion.txt b/proposals/260-rend-single-onion.txt
index 48aa794..9777e0a 100644
--- a/proposals/260-rend-single-onion.txt
+++ b/proposals/260-rend-single-onion.txt
@@ -2,7 +2,7 @@ Filename: 260-rend-single-onion.txt
 Title: Rendezvous Single Onion Services
 Author: Tim Wilson-Brown, John Brooks, Aaron Johnson, Rob Jansen, George Kadianakis, Paul Syverson, Roger Dingledine
 Created: 2015-10-17
-Status: Draft
+Status: Finished
 
 1. Overview
 
diff --git a/proposals/268-guard-selection.txt b/proposals/268-guard-selection.txt
index 9277dd8..3417b54 100644
--- a/proposals/268-guard-selection.txt
+++ b/proposals/268-guard-selection.txt
@@ -2,13 +2,15 @@ Filename: 268-guard-selection.txt
 Title: New Guard Selection Behaviour
 Author: Isis Lovecruft, George Kadianakis, [Ola Bini]
 Created: 2015-10-28
-Status: Draft
+Status: Obsolete
 
   (Editorial note: this was origianlly written as a revision of
   proposal 259, but it diverges so substantially that it seemed
   better to assign it a new number for reference, so that we
   aren't always talking about "The old 259" and "the new 259". -NM)
 
+  This proposal has been obsoleted by proposal #271.
+
 §1. Overview
 
   Tor uses entry guards to prevent an attacker who controls some
diff --git a/proposals/proposal-status.txt b/proposals/proposal-status.txt
index dc0b332..105dca4 100644
--- a/proposals/proposal-status.txt
+++ b/proposals/proposal-status.txt
@@ -438,6 +438,82 @@ again to remind me!
      against both website traffic fingerprinting as well as hidden service
      circuit setup fingerprinting. (9/2015)
 
+255  Controller features to allow for load-balancing hidden services [DRAFT]
+
+     Specifies a technique to improve the scalability of hidden services by
+     decoupling the introduction and rendezvous functionality so that they can
+     be performed in separate physical machines.
+
+256  Key revocation for relays and authorities [OPEN]
+
+     Specifies how directory authorities and relays can revoke compromised
+     long-term identity keys.
+
+257  Refactoring authorities and making them more isolated from the net [META]
+
+     Describes a strategy for making directory authorities less vulnerable to
+     DoS by reducing their exposure to the network.
+
+258  Denial-of-service resistance for directory authorities [ACCEPTED]
+
+     Describes heuristics that directory authorities can deploy to reduce the
+     threat of DoS due to large directory connection volumes.
+
+259  New Guard Selection Behaviour [OBSOLETE]
+
+     Specifies an improved guard-picking algorithm that is capable of defending
+     against targetted attacks. The proposal has since been obsoleted by
+     proposal 271.
+
+260  Rendezvous Single Onion Services [FINISHED]
+
+     Specifies a performance optimization for hidden service that do not care
+     about location anonymity, so that they build 1-hop circuits instead of
+     3-hop circuits to reduce communication latency.
+
+261  AEZ for relay cryptography [OPEN]
+
+     Specifies a circuit encryption scheme that is resistant to tagging
+     end-to-end correlation attacks.
+
+262  Re-keying live circuits with new cryptographic material [OPEN]
+
+     Specifies a way to rekey our circuit crypto so that we allow greater
+     amounts of encrypted data through them.
+
+263  Request to change key exchange protocol for handshake v1.2 [OBSOLETE]
+
+     Specifies a quantum-safe key agreement algorithm for Tor circuits. The
+     proposal was supereceded by proposal 269.
+
+264  Putting version numbers on the Tor subprotocols [CLOSED]
+
+     Specifies a way for relays to do versioning using their descriptors. In
+     the past we used the Tor version string for versioning, which is not an
+     elegant approach.
+
+265  Load Balancing with Overhead Parameters [ACCEPTED]
+
+     The proposal provides new load balancing equations for Tor which are
+     capable of taking into account non-standard traffic like padding or
+     directory and hidden service traffic.
+
+266  Removing current obsolete clients from the Tor network [DRAFT]
+
+     Specifies ways to disable outdated and insecure Tor clients.
+
+267  Tor Consensus Transparency [DRAFT]
+
+     Specifies how to apply the certificate transparency approach of TLS to Tor
+     consensus and vote documents, in an attempt to make attacks more easily
+     detectable.
+
+268  New Guard Selection Behaviour [DRAFT]
+
+     Specifies an improved guard-picking algorithm that is capable of defending
+     against targetted attacks. The proposal has since been obsoleted by
+     proposal 271.
+
 269  Transitionally secure hybrid handshakes [DRAFT]
 
      Describes a generalised protocol for composing X25519 key exchanges with
@@ -448,3 +524,20 @@ again to remind me!
      Describes a hybrid handshake based on the ntor handshake and the
      NewHope post-quantum key exchange.  Currently needs revision to
      specify how this proposal depends upon prop#269.
+
+271  Another algorithm for guard selection [OPEN]
+
+     Specifies an improved guard-picking algorithm that is capable of defending
+     against targetted attacks.
+
+272  Listed routers should be Valid, Running, and treated as such [FINISHED]
+
+     This proposal describes a change in how clients understand consensus
+     flags, and how authorities vote on consensuses.
+
+273  Exit relay pinning for web services [DRAFT]
+
+     The proposal specifies a scheme for websites to prevent additional
+     security against malicious exit nodes, by specifying their own set of exit
+     nodes.
+



More information about the tor-commits mailing list