[tor-commits] [torspec/master] Reindex.

nickm at torproject.org nickm at torproject.org
Sun Jun 3 18:23:35 UTC 2018


commit e64d1e86b0db15b5d5a463293cbd061713805fa2
Author: Nick Mathewson <nickm at torproject.org>
Date:   Sun Jun 3 11:13:57 2018 -0700

    Reindex.
---
 proposals/000-index.txt                         | 46 ++++++++++++-------------
 proposals/231-migrate-authority-rsa1024-ids.txt |  2 +-
 2 files changed, 23 insertions(+), 25 deletions(-)

diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 3170365..7ac3b57 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -84,11 +84,11 @@ Proposals by number:
 161  Computing Bandwidth Adjustments [CLOSED]
 162  Publish the consensus in multiple flavors [CLOSED]
 163  Detecting whether a connection comes from a client [SUPERSEDED]
-164  Reporting the status of server votes [OPEN]
-165  Easy migration for voting authority sets [OPEN]
+164  Reporting the status of server votes [OBSOLETE]
+165  Easy migration for voting authority sets [REJECTED]
 166  Including Network Statistics in Extra-Info Documents [CLOSED]
 167  Vote on network parameters in consensus [CLOSED]
-168  Reduce default circuit window [OPEN]
+168  Reduce default circuit window [REJECTED]
 169  Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
 170  Configuration options regarding circuit building [SUPERSEDED]
 171  Separate streams across circuits by connection metadata [CLOSED]
@@ -110,12 +110,12 @@ Proposals by number:
 187  Reserve a cell type to allow client authorization [CLOSED]
 188  Bridge Guards and other anti-enumeration defenses [ACCEPTED]
 189  AUTHORIZE and AUTHORIZED cells [OPEN]
-190  Bridge Client Authorization Based on a Shared Secret [NEEDS-REVISION]
+190  Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
 191  Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
 192  Automatically retrieve and store information about bridges [OPEN]
 193  Safe cookie authentication for Tor controllers [CLOSED]
 194  Mnemonic .onion URLs [SUPERSEDED]
-195  TLS certificate normalization for Tor 0.2.4.x [DRAFT]
+195  TLS certificate normalization for Tor 0.2.4.x [DEAD]
 196  Extended ORPort and TransportControlPort [FINISHED]
 197  Message-based Inter-Controller IPC Channel [REJECTED]
 198  Restore semantics of TLS ClientHello [CLOSED]
@@ -123,7 +123,7 @@ Proposals by number:
 200  Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
 201  Make bridges report statistics on daily v3 network status requests [OPEN]
 202  Two improved relay encryption protocols for Tor cells [OPEN]
-203  Avoiding censorship by impersonating an HTTPS server [DRAFT]
+203  Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
 204  Subdomain support for Hidden Service addresses [CLOSED]
 205  Remove global client-side DNS caching [CLOSED]
 206  Preconfigured directory sources for bootstrapping [CLOSED]
@@ -150,8 +150,8 @@ Proposals by number:
 227  Include package fingerprints in consensus documents [CLOSED]
 228  Cross-certifying identity keys with onion keys [CLOSED]
 229  Further SOCKS5 extensions [OPEN]
-230  How to change RSA1024 relay identity keys [DRAFT]
-231  Migrating authority RSA1024 identity keys [DRAFT]
+230  How to change RSA1024 relay identity keys [OBSOLETE]
+231  Migrating authority RSA1024 identity keys [OBSOLETE]
 232  Pluggable Transport through SOCKS proxy [FINISHED]
 233  Making Tor2Web mode faster [OPEN]
 234  Adding remittance field to directory specification [OPEN]
@@ -166,14 +166,14 @@ Proposals by number:
 243  Give out HSDir flag only to relays with Stable flag [CLOSED]
 244  Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
 245  Deprecating and removing the TAP circuit extension protocol [DRAFT]
-246  Merging Hidden Service Directories and Introduction Points [NEEDS-RESEARCH]
+246  Merging Hidden Service Directories and Introduction Points [REJECTED]
 247  Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
 248  Remove all RSA identity keys [DRAFT]
 249  Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
 250  Random Number Generation During Tor Voting [CLOSED]
 251  Padding for netflow record resolution reduction [CLOSED]
 252  Single Onion Services [SUPERSEDED]
-253  Out of Band Circuit HMACs [DRAFT]
+253  Out of Band Circuit HMACs [DEAD]
 254  Padding Negotiation [DRAFT]
 255  Controller features to allow for load-balancing hidden services [DRAFT]
 256  Key revocation for relays and authorities [OPEN]
@@ -208,7 +208,7 @@ Proposals by number:
 285  Directory documents should be standardized as UTF-8 [OPEN]
 286  Controller APIs for hibernation access on mobile [OPEN]
 287  Reduce circuit lifetime without overloading the network [OPEN]
-288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [DRAFT]
+288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
 289  Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
 290  Continuously update consensus methods [OPEN]
 291  The move to two guard nodes [OPEN]
@@ -220,15 +220,10 @@ Proposals by number:
 Proposals by status:
 
  DRAFT:
-   195  TLS certificate normalization for Tor 0.2.4.x [for 0.2.4.x]
-   203  Avoiding censorship by impersonating an HTTPS server
-   230  How to change RSA1024 relay identity keys [for 0.2.?]
-   231  Migrating authority RSA1024 identity keys [for 0.2.?]
    239  Consensus Hash Chaining
    240  Early signing key revocation for directory authorities
    245  Deprecating and removing the TAP circuit extension protocol
    248  Remove all RSA identity keys
-   253  Out of Band Circuit HMACs
    254  Padding Negotiation
    255  Controller features to allow for load-balancing hidden services
    267  Tor Consensus Transparency
@@ -237,16 +232,8 @@ Proposals by status:
    273  Exit relay pinning for web services [for n/a]
    279  A Name System API for Tor Onion Services
    281  Downloading microdescriptors in bulk
-   288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
    294  TLS 1.3 Migration
- NEEDS-REVISION:
-   190  Bridge Client Authorization Based on a Shared Secret
- NEEDS-RESEARCH:
-   246  Merging Hidden Service Directories and Introduction Points
  OPEN:
-   164  Reporting the status of server votes
-   165  Easy migration for voting authority sets
-   168  Reduce default circuit window
    177  Abstaining from votes on individual flags [for 0.2.4.x]
    182  Credit Bucket
    189  AUTHORIZE and AUTHORIZED cells
@@ -285,6 +272,7 @@ Proposals by status:
    258  Denial-of-service resistance for directory authorities
    265  Load Balancing with Overhead Parameters [for 0.2.9.x]
    283  Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
+   288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
  META:
    000  Index of Tor Proposals
    001  The Tor Proposal Process
@@ -409,20 +397,30 @@ Proposals by status:
    120  Shutdown descriptors when Tor servers stop
    128  Families of private bridges
    142  Combine Introduction and Rendezvous Points
+   195  TLS certificate normalization for Tor 0.2.4.x
    213  Remove stream-level sendmes from the design
+   253  Out of Band Circuit HMACs
  REJECTED:
    134  More robust consensus voting with diverse authority sets
    147  Eliminate the need for v2 directories in generating v3 directories [for 0.2.4.x]
+   165  Easy migration for voting authority sets
+   168  Reduce default circuit window
    175  Automatically promoting Tor clients to nodes
    197  Message-based Inter-Controller IPC Channel
    241  Resisting guard-turnover attacks
+   246  Merging Hidden Service Directories and Introduction Points
  OBSOLETE:
    127  Relaying dirport requests to Tor download site / website
    131  Help users to verify they are using Tor
    132  A Tor Web Service For Verifying Correct Browser Configuration
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the same provider
+   164  Reporting the status of server votes
+   190  Bridge Client Authorization Based on a Shared Secret
    199  Integration of BridgeFinder and BridgeFinderHelper
+   203  Avoiding censorship by impersonating an HTTPS server
+   230  How to change RSA1024 relay identity keys [for 0.2.?]
+   231  Migrating authority RSA1024 identity keys [for 0.2.?]
    259  New Guard Selection Behaviour
    263  Request to change key exchange protocol for handshake v1.2
    268  New Guard Selection Behaviour
diff --git a/proposals/231-migrate-authority-rsa1024-ids.txt b/proposals/231-migrate-authority-rsa1024-ids.txt
index a3887f2..0388cf0 100644
--- a/proposals/231-migrate-authority-rsa1024-ids.txt
+++ b/proposals/231-migrate-authority-rsa1024-ids.txt
@@ -3,7 +3,7 @@ Title: Migrating authority RSA1024 identity keys
 Authors: Nick Mathewson
 Created: 8 April 2014
 Target: 0.2.?
-Status: Obsolete:
+Status: Obsolete
 
 Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256.
 





More information about the tor-commits mailing list