This commit is contained in:
Nick Mathewson 2018-06-03 11:13:57 -07:00
parent 3161e90237
commit e64d1e86b0
2 changed files with 23 additions and 25 deletions

View File

@ -84,11 +84,11 @@ Proposals by number:
161 Computing Bandwidth Adjustments [CLOSED]
162 Publish the consensus in multiple flavors [CLOSED]
163 Detecting whether a connection comes from a client [SUPERSEDED]
164 Reporting the status of server votes [OPEN]
165 Easy migration for voting authority sets [OPEN]
164 Reporting the status of server votes [OBSOLETE]
165 Easy migration for voting authority sets [REJECTED]
166 Including Network Statistics in Extra-Info Documents [CLOSED]
167 Vote on network parameters in consensus [CLOSED]
168 Reduce default circuit window [OPEN]
168 Reduce default circuit window [REJECTED]
169 Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
170 Configuration options regarding circuit building [SUPERSEDED]
171 Separate streams across circuits by connection metadata [CLOSED]
@ -110,12 +110,12 @@ Proposals by number:
187 Reserve a cell type to allow client authorization [CLOSED]
188 Bridge Guards and other anti-enumeration defenses [ACCEPTED]
189 AUTHORIZE and AUTHORIZED cells [OPEN]
190 Bridge Client Authorization Based on a Shared Secret [NEEDS-REVISION]
190 Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
191 Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
192 Automatically retrieve and store information about bridges [OPEN]
193 Safe cookie authentication for Tor controllers [CLOSED]
194 Mnemonic .onion URLs [SUPERSEDED]
195 TLS certificate normalization for Tor 0.2.4.x [DRAFT]
195 TLS certificate normalization for Tor 0.2.4.x [DEAD]
196 Extended ORPort and TransportControlPort [FINISHED]
197 Message-based Inter-Controller IPC Channel [REJECTED]
198 Restore semantics of TLS ClientHello [CLOSED]
@ -123,7 +123,7 @@ Proposals by number:
200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
201 Make bridges report statistics on daily v3 network status requests [OPEN]
202 Two improved relay encryption protocols for Tor cells [OPEN]
203 Avoiding censorship by impersonating an HTTPS server [DRAFT]
203 Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
204 Subdomain support for Hidden Service addresses [CLOSED]
205 Remove global client-side DNS caching [CLOSED]
206 Preconfigured directory sources for bootstrapping [CLOSED]
@ -150,8 +150,8 @@ Proposals by number:
227 Include package fingerprints in consensus documents [CLOSED]
228 Cross-certifying identity keys with onion keys [CLOSED]
229 Further SOCKS5 extensions [OPEN]
230 How to change RSA1024 relay identity keys [DRAFT]
231 Migrating authority RSA1024 identity keys [DRAFT]
230 How to change RSA1024 relay identity keys [OBSOLETE]
231 Migrating authority RSA1024 identity keys [OBSOLETE]
232 Pluggable Transport through SOCKS proxy [FINISHED]
233 Making Tor2Web mode faster [OPEN]
234 Adding remittance field to directory specification [OPEN]
@ -166,14 +166,14 @@ Proposals by number:
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
245 Deprecating and removing the TAP circuit extension protocol [DRAFT]
246 Merging Hidden Service Directories and Introduction Points [NEEDS-RESEARCH]
246 Merging Hidden Service Directories and Introduction Points [REJECTED]
247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
248 Remove all RSA identity keys [DRAFT]
249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
250 Random Number Generation During Tor Voting [CLOSED]
251 Padding for netflow record resolution reduction [CLOSED]
252 Single Onion Services [SUPERSEDED]
253 Out of Band Circuit HMACs [DRAFT]
253 Out of Band Circuit HMACs [DEAD]
254 Padding Negotiation [DRAFT]
255 Controller features to allow for load-balancing hidden services [DRAFT]
256 Key revocation for relays and authorities [OPEN]
@ -208,7 +208,7 @@ Proposals by number:
285 Directory documents should be standardized as UTF-8 [OPEN]
286 Controller APIs for hibernation access on mobile [OPEN]
287 Reduce circuit lifetime without overloading the network [OPEN]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [DRAFT]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
289 Authenticating sendme cells to mitigate bandwidth attacks [OPEN]
290 Continuously update consensus methods [OPEN]
291 The move to two guard nodes [OPEN]
@ -220,15 +220,10 @@ Proposals by number:
Proposals by status:
DRAFT:
195 TLS certificate normalization for Tor 0.2.4.x [for 0.2.4.x]
203 Avoiding censorship by impersonating an HTTPS server
230 How to change RSA1024 relay identity keys [for 0.2.?]
231 Migrating authority RSA1024 identity keys [for 0.2.?]
239 Consensus Hash Chaining
240 Early signing key revocation for directory authorities
245 Deprecating and removing the TAP circuit extension protocol
248 Remove all RSA identity keys
253 Out of Band Circuit HMACs
254 Padding Negotiation
255 Controller features to allow for load-balancing hidden services
267 Tor Consensus Transparency
@ -237,16 +232,8 @@ Proposals by status:
273 Exit relay pinning for web services [for n/a]
279 A Name System API for Tor Onion Services
281 Downloading microdescriptors in bulk
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
294 TLS 1.3 Migration
NEEDS-REVISION:
190 Bridge Client Authorization Based on a Shared Secret
NEEDS-RESEARCH:
246 Merging Hidden Service Directories and Introduction Points
OPEN:
164 Reporting the status of server votes
165 Easy migration for voting authority sets
168 Reduce default circuit window
177 Abstaining from votes on individual flags [for 0.2.4.x]
182 Credit Bucket
189 AUTHORIZE and AUTHORIZED cells
@ -285,6 +272,7 @@ Proposals by status:
258 Denial-of-service resistance for directory authorities
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
META:
000 Index of Tor Proposals
001 The Tor Proposal Process
@ -409,20 +397,30 @@ Proposals by status:
120 Shutdown descriptors when Tor servers stop
128 Families of private bridges
142 Combine Introduction and Rendezvous Points
195 TLS certificate normalization for Tor 0.2.4.x
213 Remove stream-level sendmes from the design
253 Out of Band Circuit HMACs
REJECTED:
134 More robust consensus voting with diverse authority sets
147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.4.x]
165 Easy migration for voting authority sets
168 Reduce default circuit window
175 Automatically promoting Tor clients to nodes
197 Message-based Inter-Controller IPC Channel
241 Resisting guard-turnover attacks
246 Merging Hidden Service Directories and Introduction Points
OBSOLETE:
127 Relaying dirport requests to Tor download site / website
131 Help users to verify they are using Tor
132 A Tor Web Service For Verifying Correct Browser Configuration
141 Download server descriptors on demand
144 Increase the diversity of circuits by detecting nodes belonging the same provider
164 Reporting the status of server votes
190 Bridge Client Authorization Based on a Shared Secret
199 Integration of BridgeFinder and BridgeFinderHelper
203 Avoiding censorship by impersonating an HTTPS server
230 How to change RSA1024 relay identity keys [for 0.2.?]
231 Migrating authority RSA1024 identity keys [for 0.2.?]
259 New Guard Selection Behaviour
263 Request to change key exchange protocol for handshake v1.2
268 New Guard Selection Behaviour

View File

@ -3,7 +3,7 @@ Title: Migrating authority RSA1024 identity keys
Authors: Nick Mathewson
Created: 8 April 2014
Target: 0.2.?
Status: Obsolete:
Status: Obsolete
Note: Obsoleted by Ed25519 ID keys; superseded by 240 and 256.