[tor-commits] [torspec/master] Regenerate index once more.

nickm at torproject.org nickm at torproject.org
Sun Jun 3 18:23:36 UTC 2018


commit c083575cebc3a9940c9160759116ea9577a395e0
Author: Nick Mathewson <nickm at torproject.org>
Date:   Sun Jun 3 11:23:29 2018 -0700

    Regenerate index once more.
---
 proposals/000-index.txt | 64 ++++++++++++++++++++++++-------------------------
 1 file changed, 32 insertions(+), 32 deletions(-)

diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 7ac3b57..b1c7fa5 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -97,22 +97,22 @@ Proposals by number:
 174  Optimistic Data for Tor: Server Side [CLOSED]
 175  Automatically promoting Tor clients to nodes [REJECTED]
 176  Proposed version-3 link handshake for Tor [CLOSED]
-177  Abstaining from votes on individual flags [OPEN]
+177  Abstaining from votes on individual flags [RESERVE]
 178  Require majority of authorities to vote for consensus parameters [CLOSED]
 179  TLS certificate and parameter normalization [CLOSED]
 180  Pluggable transports for circumvention [CLOSED]
 181  Optimistic Data for Tor: Client Side [CLOSED]
-182  Credit Bucket [OPEN]
+182  Credit Bucket [OBSOLETE]
 183  Refill Intervals [CLOSED]
 184  Miscellaneous changes for a v3 Tor link protocol [CLOSED]
 185  Directory caches without DirPort [SUPERSEDED]
 186  Multiple addresses for one OR or bridge [CLOSED]
 187  Reserve a cell type to allow client authorization [CLOSED]
 188  Bridge Guards and other anti-enumeration defenses [ACCEPTED]
-189  AUTHORIZE and AUTHORIZED cells [OPEN]
+189  AUTHORIZE and AUTHORIZED cells [OBSOLETE]
 190  Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
-191  Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
-192  Automatically retrieve and store information about bridges [OPEN]
+191  Bridge Detection Resistance against MITM-capable Adversaries [OBSOLETE]
+192  Automatically retrieve and store information about bridges [OBSOLETE]
 193  Safe cookie authentication for Tor controllers [CLOSED]
 194  Mnemonic .onion URLs [SUPERSEDED]
 195  TLS certificate normalization for Tor 0.2.4.x [DEAD]
@@ -122,14 +122,14 @@ Proposals by number:
 199  Integration of BridgeFinder and BridgeFinderHelper [OBSOLETE]
 200  Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
 201  Make bridges report statistics on daily v3 network status requests [OPEN]
-202  Two improved relay encryption protocols for Tor cells [OPEN]
+202  Two improved relay encryption protocols for Tor cells [META]
 203  Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
 204  Subdomain support for Hidden Service addresses [CLOSED]
 205  Remove global client-side DNS caching [CLOSED]
 206  Preconfigured directory sources for bootstrapping [CLOSED]
 207  Directory guards [CLOSED]
 208  IPv6 Exits Redux [CLOSED]
-209  Tuning the Parameters for the Path Bias Defense [OPEN]
+209  Tuning the Parameters for the Path Bias Defense [OBSOLETE]
 210  Faster Headless Consensus Bootstrapping [SUPERSEDED]
 211  Internal Mapaddress for Tor Configuration Testing [RESERVE]
 212  Increase Acceptable Consensus Age [OPEN]
@@ -149,12 +149,12 @@ Proposals by number:
 226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN]
 227  Include package fingerprints in consensus documents [CLOSED]
 228  Cross-certifying identity keys with onion keys [CLOSED]
-229  Further SOCKS5 extensions [OPEN]
+229  Further SOCKS5 extensions [REJECTED]
 230  How to change RSA1024 relay identity keys [OBSOLETE]
 231  Migrating authority RSA1024 identity keys [OBSOLETE]
 232  Pluggable Transport through SOCKS proxy [FINISHED]
-233  Making Tor2Web mode faster [OPEN]
-234  Adding remittance field to directory specification [OPEN]
+233  Making Tor2Web mode faster [REJECTED]
+234  Adding remittance field to directory specification [REJECTED]
 235  Stop assigning (and eventually supporting) the Named flag [CLOSED]
 236  The move to a single guard node [CLOSED]
 237  All relays are directory servers [CLOSED]
@@ -162,7 +162,7 @@ Proposals by number:
 239  Consensus Hash Chaining [DRAFT]
 240  Early signing key revocation for directory authorities [DRAFT]
 241  Resisting guard-turnover attacks [REJECTED]
-242  Better performance and usability for the MyFamily option [OPEN]
+242  Better performance and usability for the MyFamily option [RESERVE]
 243  Give out HSDir flag only to relays with Stable flag [CLOSED]
 244  Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
 245  Deprecating and removing the TAP circuit extension protocol [DRAFT]
@@ -176,12 +176,12 @@ Proposals by number:
 253  Out of Band Circuit HMACs [DEAD]
 254  Padding Negotiation [DRAFT]
 255  Controller features to allow for load-balancing hidden services [DRAFT]
-256  Key revocation for relays and authorities [OPEN]
+256  Key revocation for relays and authorities [RESERVE]
 257  Refactoring authorities and making them more isolated from the net [META]
 258  Denial-of-service resistance for directory authorities [ACCEPTED]
 259  New Guard Selection Behaviour [OBSOLETE]
 260  Rendezvous Single Onion Services [FINISHED]
-261  AEZ for relay cryptography [OPEN]
+261  AEZ for relay cryptography [OBSOLETE]
 262  Re-keying live circuits with new cryptographic material [OPEN]
 263  Request to change key exchange protocol for handshake v1.2 [OBSOLETE]
 264  Putting version numbers on the Tor subprotocols [CLOSED]
@@ -206,13 +206,13 @@ Proposals by number:
 283  Move IPv6 ORPorts from microdescriptors to the microdesc consensus [ACCEPTED]
 284  Hidden Service v3 Control Port [CLOSED]
 285  Directory documents should be standardized as UTF-8 [OPEN]
-286  Controller APIs for hibernation access on mobile [OPEN]
+286  Controller APIs for hibernation access on mobile [REJECTED]
 287  Reduce circuit lifetime without overloading the network [OPEN]
 288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
 289  Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
-290  Continuously update consensus methods [OPEN]
+290  Continuously update consensus methods [META]
 291  The move to two guard nodes [OPEN]
-292  Mesh-based vanguards [OPEN]
+292  Mesh-based vanguards [ACCEPTED]
 293  Other ways for relays to know when to publish [OPEN]
 294  TLS 1.3 Migration [DRAFT]
 
@@ -234,35 +234,19 @@ Proposals by status:
    281  Downloading microdescriptors in bulk
    294  TLS 1.3 Migration
  OPEN:
-   177  Abstaining from votes on individual flags [for 0.2.4.x]
-   182  Credit Bucket
-   189  AUTHORIZE and AUTHORIZED cells
-   191  Bridge Detection Resistance against MITM-capable Adversaries
-   192  Automatically retrieve and store information about bridges [for 0.2.[45].x]
    201  Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
-   202  Two improved relay encryption protocols for Tor cells
-   209  Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
    212  Increase Acceptable Consensus Age [for 0.2.4.x+]
    219  Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
    226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
-   229  Further SOCKS5 extensions
-   233  Making Tor2Web mode faster
-   234  Adding remittance field to directory specification
-   242  Better performance and usability for the MyFamily option
-   256  Key revocation for relays and authorities
-   261  AEZ for relay cryptography
    262  Re-keying live circuits with new cryptographic material
    275  Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
    276  Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
    277  Detect multiple relay instances running with same ID [for 0.3.??]
    282  Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x]
    285  Directory documents should be standardized as UTF-8
-   286  Controller APIs for hibernation access on mobile
    287  Reduce circuit lifetime without overloading the network
    289  Authenticating sendme cells to mitigate bandwidth attacks
-   290  Continuously update consensus methods
    291  The move to two guard nodes
-   292  Mesh-based vanguards
    293  Other ways for relays to know when to publish [for 0.3.5]
  ACCEPTED:
    172  GETINFO controller option for circuit information
@@ -273,12 +257,15 @@ Proposals by status:
    265  Load Balancing with Overhead Parameters [for 0.2.9.x]
    283  Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
    288  Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
+   292  Mesh-based vanguards
  META:
    000  Index of Tor Proposals
    001  The Tor Proposal Process
    098  Proposals that should be written
    099  Miscellaneous proposals
+   202  Two improved relay encryption protocols for Tor cells
    257  Refactoring authorities and making them more isolated from the net
+   290  Continuously update consensus methods
  FINISHED:
    160  Authorities vote for bandwidth offsets in consensus [for 0.2.1.x]
    196  Extended ORPort and TransportControlPort [in 0.2.5.2-alpha]
@@ -407,8 +394,12 @@ Proposals by status:
    168  Reduce default circuit window
    175  Automatically promoting Tor clients to nodes
    197  Message-based Inter-Controller IPC Channel
+   229  Further SOCKS5 extensions
+   233  Making Tor2Web mode faster
+   234  Adding remittance field to directory specification
    241  Resisting guard-turnover attacks
    246  Merging Hidden Service Directories and Introduction Points
+   286  Controller APIs for hibernation access on mobile
  OBSOLETE:
    127  Relaying dirport requests to Tor download site / website
    131  Help users to verify they are using Tor
@@ -416,17 +407,26 @@ Proposals by status:
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the same provider
    164  Reporting the status of server votes
+   182  Credit Bucket
+   189  AUTHORIZE and AUTHORIZED cells
    190  Bridge Client Authorization Based on a Shared Secret
+   191  Bridge Detection Resistance against MITM-capable Adversaries
+   192  Automatically retrieve and store information about bridges [for 0.2.[45].x]
    199  Integration of BridgeFinder and BridgeFinderHelper
    203  Avoiding censorship by impersonating an HTTPS server
+   209  Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
    230  How to change RSA1024 relay identity keys [for 0.2.?]
    231  Migrating authority RSA1024 identity keys [for 0.2.?]
    259  New Guard Selection Behaviour
+   261  AEZ for relay cryptography
    263  Request to change key exchange protocol for handshake v1.2
    268  New Guard Selection Behaviour
  RESERVE:
    133  Incorporate Unreachable ORs into the Tor Network
+   177  Abstaining from votes on individual flags [for 0.2.4.x]
    211  Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
    223  Ace: Improved circuit-creation key exchange
+   242  Better performance and usability for the MyFamily option
+   256  Key revocation for relays and authorities
  INFORMATIONAL:
    159  Exit Scanning



More information about the tor-commits mailing list