[tor-commits] [torspec/master] Regenerate index once more.

nickm at torproject.org nickm at torproject.org
Sun Jun 3 18:27:58 UTC 2018


commit 005a92b40d6666577572db3986a6a6c8dbe8bb14
Author: Nick Mathewson <nickm at torproject.org>
Date:   Sun Jun 3 11:27:52 2018 -0700

    Regenerate index once more.
---
 proposals/000-index.txt | 13 +++++++------
 1 file changed, 7 insertions(+), 6 deletions(-)

diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index b1c7fa5..33b7f83 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -146,7 +146,7 @@ Proposals by number:
 223  Ace: Improved circuit-creation key exchange [RESERVE]
 224  Next-Generation Hidden Services in Tor [CLOSED]
 225  Strawman proposal: commit-and-reveal shared rng [SUPERSEDED]
-226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [OPEN]
+226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [RESERVE]
 227  Include package fingerprints in consensus documents [CLOSED]
 228  Cross-certifying identity keys with onion keys [CLOSED]
 229  Further SOCKS5 extensions [REJECTED]
@@ -189,8 +189,8 @@ Proposals by number:
 266  Removing current obsolete clients from the Tor network [SUPERSEDED]
 267  Tor Consensus Transparency [DRAFT]
 268  New Guard Selection Behaviour [OBSOLETE]
-269  Transitionally secure hybrid handshakes [DRAFT]
-270  RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [DRAFT]
+269  Transitionally secure hybrid handshakes [NEEDS-REVISION]
+270  RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE]
 271  Another algorithm for guard selection [CLOSED]
 272  Listed routers should be Valid, Running, and treated as such [CLOSED]
 273  Exit relay pinning for web services [DRAFT]
@@ -227,17 +227,16 @@ Proposals by status:
    254  Padding Negotiation
    255  Controller features to allow for load-balancing hidden services
    267  Tor Consensus Transparency
-   269  Transitionally secure hybrid handshakes
-   270  RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
    273  Exit relay pinning for web services [for n/a]
    279  A Name System API for Tor Onion Services
    281  Downloading microdescriptors in bulk
    294  TLS 1.3 Migration
+ NEEDS-REVISION:
+   269  Transitionally secure hybrid handshakes
  OPEN:
    201  Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
    212  Increase Acceptable Consensus Age [for 0.2.4.x+]
    219  Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
-   226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
    262  Re-keying live circuits with new cryptographic material
    275  Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
    276  Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
@@ -421,11 +420,13 @@ Proposals by status:
    261  AEZ for relay cryptography
    263  Request to change key exchange protocol for handshake v1.2
    268  New Guard Selection Behaviour
+   270  RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
  RESERVE:
    133  Incorporate Unreachable ORs into the Tor Network
    177  Abstaining from votes on individual flags [for 0.2.4.x]
    211  Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
    223  Ace: Improved circuit-creation key exchange
+   226  "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
    242  Better performance and usability for the MyFamily option
    256  Key revocation for relays and authorities
  INFORMATIONAL:



More information about the tor-commits mailing list