mirror of
https://github.com/torproject/torspec.git
synced 2025-03-03 14:18:28 +00:00
Reindex.
This commit is contained in:
parent
3161e90237
commit
e64d1e86b0
@ -84,11 +84,11 @@ Proposals by number:
|
||||
161 Computing Bandwidth Adjustments [CLOSED]
|
||||
162 Publish the consensus in multiple flavors [CLOSED]
|
||||
163 Detecting whether a connection comes from a client [SUPERSEDED]
|
||||
164 Reporting the status of server votes [OPEN]
|
||||
165 Easy migration for voting authority sets [OPEN]
|
||||
164 Reporting the status of server votes [OBSOLETE]
|
||||
165 Easy migration for voting authority sets [REJECTED]
|
||||
166 Including Network Statistics in Extra-Info Documents [CLOSED]
|
||||
167 Vote on network parameters in consensus [CLOSED]
|
||||
168 Reduce default circuit window [OPEN]
|
||||
168 Reduce default circuit window [REJECTED]
|
||||
169 Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
|
||||
170 Configuration options regarding circuit building [SUPERSEDED]
|
||||
171 Separate streams across circuits by connection metadata [CLOSED]
|
||||
@ -110,12 +110,12 @@ Proposals by number:
|
||||
187 Reserve a cell type to allow client authorization [CLOSED]
|
||||
188 Bridge Guards and other anti-enumeration defenses [ACCEPTED]
|
||||
189 AUTHORIZE and AUTHORIZED cells [OPEN]
|
||||
190 Bridge Client Authorization Based on a Shared Secret [NEEDS-REVISION]
|
||||
190 Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
|
||||
191 Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
|
||||
192 Automatically retrieve and store information about bridges [OPEN]
|
||||
193 Safe cookie authentication for Tor controllers [CLOSED]
|
||||
194 Mnemonic .onion URLs [SUPERSEDED]
|
||||
195 TLS certificate normalization for Tor 0.2.4.x [DRAFT]
|
||||
195 TLS certificate normalization for Tor 0.2.4.x [DEAD]
|
||||
196 Extended ORPort and TransportControlPort [FINISHED]
|
||||
197 Message-based Inter-Controller IPC Channel [REJECTED]
|
||||
198 Restore semantics of TLS ClientHello [CLOSED]
|
||||
@ -123,7 +123,7 @@ Proposals by number:
|
||||
200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
|
||||
201 Make bridges report statistics on daily v3 network status requests [OPEN]
|
||||
202 Two improved relay encryption protocols for Tor cells [OPEN]
|
||||
203 Avoiding censorship by impersonating an HTTPS server [DRAFT]
|
||||
203 Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
|
||||
204 Subdomain support for Hidden Service addresses [CLOSED]
|
||||
205 Remove global client-side DNS caching [CLOSED]
|
||||
206 Preconfigured directory sources for bootstrapping [CLOSED]
|
||||
@ -150,8 +150,8 @@ Proposals by number:
|
||||
227 Include package fingerprints in consensus documents [CLOSED]
|
||||
228 Cross-certifying identity keys with onion keys [CLOSED]
|
||||
229 Further SOCKS5 extensions [OPEN]
|
||||
230 How to change RSA1024 relay identity keys [DRAFT]
|
||||
231 Migrating authority RSA1024 identity keys [DRAFT]
|
||||
230 How to change RSA1024 relay identity keys [OBSOLETE]
|
||||
231 Migrating authority RSA1024 identity keys [OBSOLETE]
|
||||
232 Pluggable Transport through SOCKS proxy [FINISHED]
|
||||
233 Making Tor2Web mode faster [OPEN]
|
||||
234 Adding remittance field to directory specification [OPEN]
|
||||
@ -166,14 +166,14 @@ Proposals by number:
|
||||
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
|
||||
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
|
||||
245 Deprecating and removing the TAP circuit extension protocol [DRAFT]
|
||||
246 Merging Hidden Service Directories and Introduction Points [NEEDS-RESEARCH]
|
||||
246 Merging Hidden Service Directories and Introduction Points [REJECTED]
|
||||
247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
|
||||
248 Remove all RSA identity keys [DRAFT]
|
||||
249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
|
||||
250 Random Number Generation During Tor Voting [CLOSED]
|
||||
251 Padding for netflow record resolution reduction [CLOSED]
|
||||
252 Single Onion Services [SUPERSEDED]
|
||||
253 Out of Band Circuit HMACs [DRAFT]
|
||||
253 Out of Band Circuit HMACs [DEAD]
|
||||
254 Padding Negotiation [DRAFT]
|
||||
255 Controller features to allow for load-balancing hidden services [DRAFT]
|
||||
256 Key revocation for relays and authorities [OPEN]
|
||||
@ -208,7 +208,7 @@ Proposals by number:
|
||||
285 Directory documents should be standardized as UTF-8 [OPEN]
|
||||
286 Controller APIs for hibernation access on mobile [OPEN]
|
||||
287 Reduce circuit lifetime without overloading the network [OPEN]
|
||||
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [DRAFT]
|
||||
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
|
||||
289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
|
||||
290 Continuously update consensus methods [OPEN]
|
||||
291 The move to two guard nodes [OPEN]
|
||||
@ -220,15 +220,10 @@ Proposals by number:
|
||||
Proposals by status:
|
||||
|
||||
DRAFT:
|
||||
195 TLS certificate normalization for Tor 0.2.4.x [for 0.2.4.x]
|
||||
203 Avoiding censorship by impersonating an HTTPS server
|
||||
230 How to change RSA1024 relay identity keys [for 0.2.?]
|
||||
231 Migrating authority RSA1024 identity keys [for 0.2.?]
|
||||
239 Consensus Hash Chaining
|
||||
240 Early signing key revocation for directory authorities
|
||||
245 Deprecating and removing the TAP circuit extension protocol
|
||||
248 Remove all RSA identity keys
|
||||
253 Out of Band Circuit HMACs
|
||||
254 Padding Negotiation
|
||||
255 Controller features to allow for load-balancing hidden services
|
||||
267 Tor Consensus Transparency
|
||||
@ -237,16 +232,8 @@ Proposals by status:
|
||||
273 Exit relay pinning for web services [for n/a]
|
||||
279 A Name System API for Tor Onion Services
|
||||
281 Downloading microdescriptors in bulk
|
||||
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
|
||||
294 TLS 1.3 Migration
|
||||
NEEDS-REVISION:
|
||||
190 Bridge Client Authorization Based on a Shared Secret
|
||||
NEEDS-RESEARCH:
|
||||
246 Merging Hidden Service Directories and Introduction Points
|
||||
OPEN:
|
||||
164 Reporting the status of server votes
|
||||
165 Easy migration for voting authority sets
|
||||
168 Reduce default circuit window
|
||||
177 Abstaining from votes on individual flags [for 0.2.4.x]
|
||||
182 Credit Bucket
|
||||
189 AUTHORIZE and AUTHORIZED cells
|
||||
@ -285,6 +272,7 @@ Proposals by status:
|
||||
258 Denial-of-service resistance for directory authorities
|
||||
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
|
||||
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
|
||||
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
|
||||
META:
|
||||
000 Index of Tor Proposals
|
||||
001 The Tor Proposal Process
|
||||
@ -409,20 +397,30 @@ Proposals by status:
|
||||
120 Shutdown descriptors when Tor servers stop
|
||||
128 Families of private bridges
|
||||
142 Combine Introduction and Rendezvous Points
|
||||
195 TLS certificate normalization for Tor 0.2.4.x
|
||||
213 Remove stream-level sendmes from the design
|
||||
253 Out of Band Circuit HMACs
|
||||
REJECTED:
|
||||
134 More robust consensus voting with diverse authority sets
|
||||
147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.4.x]
|
||||
165 Easy migration for voting authority sets
|
||||
168 Reduce default circuit window
|
||||
175 Automatically promoting Tor clients to nodes
|
||||
197 Message-based Inter-Controller IPC Channel
|
||||
241 Resisting guard-turnover attacks
|
||||
246 Merging Hidden Service Directories and Introduction Points
|
||||
OBSOLETE:
|
||||
127 Relaying dirport requests to Tor download site / website
|
||||
131 Help users to verify they are using Tor
|
||||
132 A Tor Web Service For Verifying Correct Browser Configuration
|
||||
141 Download server descriptors on demand
|
||||
144 Increase the diversity of circuits by detecting nodes belonging the same provider
|
||||
164 Reporting the status of server votes
|
||||
190 Bridge Client Authorization Based on a Shared Secret
|
||||
199 Integration of BridgeFinder and BridgeFinderHelper
|
||||
203 Avoiding censorship by impersonating an HTTPS server
|
||||
230 How to change RSA1024 relay identity keys [for 0.2.?]
|
||||
231 Migrating authority RSA1024 identity keys [for 0.2.?]
|
||||
259 New Guard Selection Behaviour
|
||||
263 Request to change key exchange protocol for handshake v1.2
|
||||
268 New Guard Selection Behaviour
|
||||
|
@ -3,7 +3,7 @@ Title: Migrating authority RSA1024 identity keys
|
||||
Authors: Nick Mathewson
|
||||
Created: 8 April 2014
|
||||
Target: 0.2.?
|
||||
Status: Obsolete:
|
||||
Status: Obsolete
|
||||
|
||||
Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user