mirror of
https://github.com/torproject/torspec.git
synced 2024-12-12 04:35:37 +00:00
470 lines
26 KiB
Plaintext
470 lines
26 KiB
Plaintext
Filename: 000-index.txt
|
|
Title: Index of Tor Proposals
|
|
Author: Nick Mathewson
|
|
Created: 26-Jan-2007
|
|
Status: Meta
|
|
|
|
Overview:
|
|
|
|
This document provides an index to Tor proposals.
|
|
|
|
This is an informational document.
|
|
|
|
Everything in this document below the line of '=' signs is automatically
|
|
generated by reindex.py; do not edit by hand.
|
|
|
|
============================================================
|
|
Proposals by number:
|
|
|
|
000 Index of Tor Proposals [META]
|
|
001 The Tor Proposal Process [META]
|
|
098 Proposals that should be written [META]
|
|
099 Miscellaneous proposals [META]
|
|
100 Tor Unreliable Datagram Extension Proposal [DEAD]
|
|
101 Voting on the Tor Directory System [CLOSED]
|
|
102 Dropping "opt" from the directory format [CLOSED]
|
|
103 Splitting identity key from regularly used signing key [CLOSED]
|
|
104 Long and Short Router Descriptors [CLOSED]
|
|
105 Version negotiation for the Tor protocol [CLOSED]
|
|
106 Checking fewer things during TLS handshakes [CLOSED]
|
|
107 Uptime Sanity Checking [CLOSED]
|
|
108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
|
|
109 No more than one server per IP address [CLOSED]
|
|
110 Avoiding infinite length circuits [CLOSED]
|
|
111 Prioritizing local traffic over relayed traffic [CLOSED]
|
|
112 Bring Back Pathlen Coin Weight [SUPERSEDED]
|
|
113 Simplifying directory authority administration [SUPERSEDED]
|
|
114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
|
|
115 Two Hop Paths [DEAD]
|
|
116 Two hop paths from entry guards [DEAD]
|
|
117 IPv6 exits [CLOSED]
|
|
118 Advertising multiple ORPorts at once [SUPERSEDED]
|
|
119 New PROTOCOLINFO command for controllers [CLOSED]
|
|
120 Shutdown descriptors when Tor servers stop [DEAD]
|
|
121 Hidden Service Authentication [CLOSED]
|
|
122 Network status entries need a new Unnamed flag [CLOSED]
|
|
123 Naming authorities automatically create bindings [CLOSED]
|
|
124 Blocking resistant TLS certificate usage [SUPERSEDED]
|
|
125 Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
|
|
126 Getting GeoIP data and publishing usage summaries [CLOSED]
|
|
127 Relaying dirport requests to Tor download site / website [OBSOLETE]
|
|
128 Families of private bridges [DEAD]
|
|
129 Block Insecure Protocols by Default [CLOSED]
|
|
130 Version 2 Tor connection protocol [CLOSED]
|
|
131 Help users to verify they are using Tor [OBSOLETE]
|
|
132 A Tor Web Service For Verifying Correct Browser Configuration [OBSOLETE]
|
|
133 Incorporate Unreachable ORs into the Tor Network [RESERVE]
|
|
134 More robust consensus voting with diverse authority sets [REJECTED]
|
|
135 Simplify Configuration of Private Tor Networks [CLOSED]
|
|
136 Mass authority migration with legacy keys [CLOSED]
|
|
137 Keep controllers informed as Tor bootstraps [CLOSED]
|
|
138 Remove routers that are not Running from consensus documents [CLOSED]
|
|
139 Download consensus documents only when it will be trusted [CLOSED]
|
|
140 Provide diffs between consensuses [CLOSED]
|
|
141 Download server descriptors on demand [OBSOLETE]
|
|
142 Combine Introduction and Rendezvous Points [DEAD]
|
|
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [SUPERSEDED]
|
|
144 Increase the diversity of circuits by detecting nodes belonging the same provider [OBSOLETE]
|
|
145 Separate "suitable as a guard" from "suitable as a new guard" [SUPERSEDED]
|
|
146 Add new flag to reflect long-term stability [SUPERSEDED]
|
|
147 Eliminate the need for v2 directories in generating v3 directories [REJECTED]
|
|
148 Stream end reasons from the client side should be uniform [CLOSED]
|
|
149 Using data from NETINFO cells [SUPERSEDED]
|
|
150 Exclude Exit Nodes from a circuit [CLOSED]
|
|
151 Improving Tor Path Selection [CLOSED]
|
|
152 Optionally allow exit from single-hop circuits [CLOSED]
|
|
153 Automatic software update protocol [SUPERSEDED]
|
|
154 Automatic Software Update Protocol [SUPERSEDED]
|
|
155 Four Improvements of Hidden Service Performance [CLOSED]
|
|
156 Tracking blocked ports on the client side [SUPERSEDED]
|
|
157 Make certificate downloads specific [CLOSED]
|
|
158 Clients download consensus + microdescriptors [CLOSED]
|
|
159 Exit Scanning [INFORMATIONAL]
|
|
160 Authorities vote for bandwidth offsets in consensus [FINISHED]
|
|
161 Computing Bandwidth Adjustments [CLOSED]
|
|
162 Publish the consensus in multiple flavors [CLOSED]
|
|
163 Detecting whether a connection comes from a client [SUPERSEDED]
|
|
164 Reporting the status of server votes [OBSOLETE]
|
|
165 Easy migration for voting authority sets [REJECTED]
|
|
166 Including Network Statistics in Extra-Info Documents [CLOSED]
|
|
167 Vote on network parameters in consensus [CLOSED]
|
|
168 Reduce default circuit window [REJECTED]
|
|
169 Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
|
|
170 Configuration options regarding circuit building [SUPERSEDED]
|
|
171 Separate streams across circuits by connection metadata [CLOSED]
|
|
172 GETINFO controller option for circuit information [RESERVE]
|
|
173 GETINFO Option Expansion [OBSOLETE]
|
|
174 Optimistic Data for Tor: Server Side [CLOSED]
|
|
175 Automatically promoting Tor clients to nodes [REJECTED]
|
|
176 Proposed version-3 link handshake for Tor [CLOSED]
|
|
177 Abstaining from votes on individual flags [RESERVE]
|
|
178 Require majority of authorities to vote for consensus parameters [CLOSED]
|
|
179 TLS certificate and parameter normalization [CLOSED]
|
|
180 Pluggable transports for circumvention [CLOSED]
|
|
181 Optimistic Data for Tor: Client Side [CLOSED]
|
|
182 Credit Bucket [OBSOLETE]
|
|
183 Refill Intervals [CLOSED]
|
|
184 Miscellaneous changes for a v3 Tor link protocol [CLOSED]
|
|
185 Directory caches without DirPort [SUPERSEDED]
|
|
186 Multiple addresses for one OR or bridge [CLOSED]
|
|
187 Reserve a cell type to allow client authorization [CLOSED]
|
|
188 Bridge Guards and other anti-enumeration defenses [ACCEPTED]
|
|
189 AUTHORIZE and AUTHORIZED cells [OBSOLETE]
|
|
190 Bridge Client Authorization Based on a Shared Secret [OBSOLETE]
|
|
191 Bridge Detection Resistance against MITM-capable Adversaries [OBSOLETE]
|
|
192 Automatically retrieve and store information about bridges [OBSOLETE]
|
|
193 Safe cookie authentication for Tor controllers [CLOSED]
|
|
194 Mnemonic .onion URLs [SUPERSEDED]
|
|
195 TLS certificate normalization for Tor 0.2.4.x [DEAD]
|
|
196 Extended ORPort and TransportControlPort [FINISHED]
|
|
197 Message-based Inter-Controller IPC Channel [REJECTED]
|
|
198 Restore semantics of TLS ClientHello [CLOSED]
|
|
199 Integration of BridgeFinder and BridgeFinderHelper [OBSOLETE]
|
|
200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED]
|
|
201 Make bridges report statistics on daily v3 network status requests [OPEN]
|
|
202 Two improved relay encryption protocols for Tor cells [META]
|
|
203 Avoiding censorship by impersonating an HTTPS server [OBSOLETE]
|
|
204 Subdomain support for Hidden Service addresses [CLOSED]
|
|
205 Remove global client-side DNS caching [CLOSED]
|
|
206 Preconfigured directory sources for bootstrapping [CLOSED]
|
|
207 Directory guards [CLOSED]
|
|
208 IPv6 Exits Redux [CLOSED]
|
|
209 Tuning the Parameters for the Path Bias Defense [OBSOLETE]
|
|
210 Faster Headless Consensus Bootstrapping [SUPERSEDED]
|
|
211 Internal Mapaddress for Tor Configuration Testing [RESERVE]
|
|
212 Increase Acceptable Consensus Age [NEEDS-REVISION]
|
|
213 Remove stream-level sendmes from the design [DEAD]
|
|
214 Allow 4-byte circuit IDs in a new link protocol [CLOSED]
|
|
215 Let the minimum consensus method change with time [CLOSED]
|
|
216 Improved circuit-creation key exchange [CLOSED]
|
|
217 Tor Extended ORPort Authentication [FINISHED]
|
|
218 Controller events to better understand connection/circuit usage [CLOSED]
|
|
219 Support for full DNS and DNSSEC resolution in Tor [NEEDS-REVISION]
|
|
220 Migrate server identity keys to Ed25519 [CLOSED]
|
|
221 Stop using CREATE_FAST [CLOSED]
|
|
222 Stop sending client timestamps [CLOSED]
|
|
223 Ace: Improved circuit-creation key exchange [RESERVE]
|
|
224 Next-Generation Hidden Services in Tor [CLOSED]
|
|
225 Strawman proposal: commit-and-reveal shared rng [SUPERSEDED]
|
|
226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS" [RESERVE]
|
|
227 Include package fingerprints in consensus documents [CLOSED]
|
|
228 Cross-certifying identity keys with onion keys [CLOSED]
|
|
229 Further SOCKS5 extensions [REJECTED]
|
|
230 How to change RSA1024 relay identity keys [OBSOLETE]
|
|
231 Migrating authority RSA1024 identity keys [OBSOLETE]
|
|
232 Pluggable Transport through SOCKS proxy [FINISHED]
|
|
233 Making Tor2Web mode faster [REJECTED]
|
|
234 Adding remittance field to directory specification [REJECTED]
|
|
235 Stop assigning (and eventually supporting) the Named flag [CLOSED]
|
|
236 The move to a single guard node [CLOSED]
|
|
237 All relays are directory servers [CLOSED]
|
|
238 Better hidden service stats from Tor relays [CLOSED]
|
|
239 Consensus Hash Chaining [OPEN]
|
|
240 Early signing key revocation for directory authorities [DRAFT]
|
|
241 Resisting guard-turnover attacks [REJECTED]
|
|
242 Better performance and usability for the MyFamily option [RESERVE]
|
|
243 Give out HSDir flag only to relays with Stable flag [CLOSED]
|
|
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [CLOSED]
|
|
245 Deprecating and removing the TAP circuit extension protocol [NEEDS-REVISION]
|
|
246 Merging Hidden Service Directories and Introduction Points [REJECTED]
|
|
247 Defending Against Guard Discovery Attacks using Vanguards [SUPERSEDED]
|
|
248 Remove all RSA identity keys [NEEDS-REVISION]
|
|
249 Allow CREATE cells with >505 bytes of handshake data [ACCEPTED]
|
|
250 Random Number Generation During Tor Voting [CLOSED]
|
|
251 Padding for netflow record resolution reduction [CLOSED]
|
|
252 Single Onion Services [SUPERSEDED]
|
|
253 Out of Band Circuit HMACs [DEAD]
|
|
254 Padding Negotiation [NEEDS-REVISION]
|
|
255 Controller features to allow for load-balancing hidden services [RESERVE]
|
|
256 Key revocation for relays and authorities [RESERVE]
|
|
257 Refactoring authorities and making them more isolated from the net [META]
|
|
258 Denial-of-service resistance for directory authorities [DEAD]
|
|
259 New Guard Selection Behaviour [OBSOLETE]
|
|
260 Rendezvous Single Onion Services [FINISHED]
|
|
261 AEZ for relay cryptography [OBSOLETE]
|
|
262 Re-keying live circuits with new cryptographic material [OPEN]
|
|
263 Request to change key exchange protocol for handshake v1.2 [OBSOLETE]
|
|
264 Putting version numbers on the Tor subprotocols [CLOSED]
|
|
265 Load Balancing with Overhead Parameters [ACCEPTED]
|
|
266 Removing current obsolete clients from the Tor network [SUPERSEDED]
|
|
267 Tor Consensus Transparency [OPEN]
|
|
268 New Guard Selection Behaviour [OBSOLETE]
|
|
269 Transitionally secure hybrid handshakes [NEEDS-REVISION]
|
|
270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope [OBSOLETE]
|
|
271 Another algorithm for guard selection [CLOSED]
|
|
272 Listed routers should be Valid, Running, and treated as such [CLOSED]
|
|
273 Exit relay pinning for web services [DRAFT]
|
|
274 Rotate onion keys less frequently [CLOSED]
|
|
275 Stop including meaningful "published" time in microdescriptor consensus [OPEN]
|
|
276 Report bandwidth with lower granularity in consensus documents [OPEN]
|
|
277 Detect multiple relay instances running with same ID [OPEN]
|
|
278 Directory Compression Scheme Negotiation [CLOSED]
|
|
279 A Name System API for Tor Onion Services [NEEDS-REVISION]
|
|
280 Privacy-Preserving Statistics with Privcount in Tor [SUPERSEDED]
|
|
281 Downloading microdescriptors in bulk [RESERVE]
|
|
282 Remove "Named" and "Unnamed" handling from consensus voting [ACCEPTED]
|
|
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [CLOSED]
|
|
284 Hidden Service v3 Control Port [CLOSED]
|
|
285 Directory documents should be standardized as UTF-8 [OPEN]
|
|
286 Controller APIs for hibernation access on mobile [REJECTED]
|
|
287 Reduce circuit lifetime without overloading the network [OPEN]
|
|
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version) [ACCEPTED]
|
|
289 Authenticating sendme cells to mitigate bandwidth attacks [CLOSED]
|
|
290 Continuously update consensus methods [META]
|
|
291 The move to two guard nodes [NEEDS-REVISION]
|
|
292 Mesh-based vanguards [ACCEPTED]
|
|
293 Other ways for relays to know when to publish [CLOSED]
|
|
294 TLS 1.3 Migration [DRAFT]
|
|
295 Using ADL for relay cryptography (solving the crypto-tagging attack) [OPEN]
|
|
296 Have Directory Authorities expose raw bandwidth list files [OPEN]
|
|
297 Relaxing the protover-based shutdown rules [CLOSED]
|
|
298 Putting family lines in canonical form [CLOSED]
|
|
299 Preferring IPv4 or IPv6 based on IP Version Failure Count [OPEN]
|
|
300 Walking Onions: Scaling and Saving Bandwidth [DRAFT]
|
|
301 Don't include package fingerprints in consensus documents [ACCEPTED]
|
|
302 Hiding onion service clients using padding [CLOSED]
|
|
303 When and how to remove support for protocol versions [DRAFT]
|
|
304 Extending SOCKS5 Onion Service Error Codes [CLOSED]
|
|
305 ESTABLISH_INTRO Cell DoS Defense Extension [CLOSED]
|
|
306 A Tor Implementation of IPv6 Happy Eyeballs [OPEN]
|
|
307 Onion Balance Support for Onion Service v3 [DRAFT]
|
|
308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography [DRAFT]
|
|
309 Optimistic SOCKS Data [DRAFT]
|
|
310 Towards load-balancing in Prop 271 [OPEN]
|
|
311 Tor Relay IPv6 Reachability [DRAFT]
|
|
312 Tor Relay Automatic IPv6 Address Discovery [DRAFT]
|
|
|
|
|
|
Proposals by status:
|
|
|
|
DRAFT:
|
|
240 Early signing key revocation for directory authorities
|
|
273 Exit relay pinning for web services [for n/a]
|
|
294 TLS 1.3 Migration
|
|
300 Walking Onions: Scaling and Saving Bandwidth
|
|
303 When and how to remove support for protocol versions
|
|
307 Onion Balance Support for Onion Service v3
|
|
308 Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
|
|
309 Optimistic SOCKS Data
|
|
311 Tor Relay IPv6 Reachability
|
|
312 Tor Relay Automatic IPv6 Address Discovery
|
|
NEEDS-REVISION:
|
|
212 Increase Acceptable Consensus Age [for 0.2.4.x+]
|
|
219 Support for full DNS and DNSSEC resolution in Tor [for 0.2.5.x]
|
|
245 Deprecating and removing the TAP circuit extension protocol
|
|
248 Remove all RSA identity keys
|
|
254 Padding Negotiation
|
|
269 Transitionally secure hybrid handshakes
|
|
279 A Name System API for Tor Onion Services
|
|
291 The move to two guard nodes
|
|
OPEN:
|
|
201 Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
|
|
239 Consensus Hash Chaining
|
|
262 Re-keying live circuits with new cryptographic material
|
|
267 Tor Consensus Transparency
|
|
275 Stop including meaningful "published" time in microdescriptor consensus [for 0.3.1.x-alpha]
|
|
276 Report bandwidth with lower granularity in consensus documents [for 0.3.1.x-alpha]
|
|
277 Detect multiple relay instances running with same ID [for 0.3.??]
|
|
285 Directory documents should be standardized as UTF-8
|
|
287 Reduce circuit lifetime without overloading the network
|
|
295 Using ADL for relay cryptography (solving the crypto-tagging attack)
|
|
296 Have Directory Authorities expose raw bandwidth list files
|
|
299 Preferring IPv4 or IPv6 based on IP Version Failure Count
|
|
306 A Tor Implementation of IPv6 Happy Eyeballs
|
|
310 Towards load-balancing in Prop 271
|
|
ACCEPTED:
|
|
188 Bridge Guards and other anti-enumeration defenses
|
|
249 Allow CREATE cells with >505 bytes of handshake data
|
|
265 Load Balancing with Overhead Parameters [for 0.2.9.x]
|
|
282 Remove "Named" and "Unnamed" handling from consensus voting [for 0.3.3.x]
|
|
288 Privacy-Preserving Statistics with Privcount in Tor (Shamir version)
|
|
292 Mesh-based vanguards
|
|
301 Don't include package fingerprints in consensus documents
|
|
META:
|
|
000 Index of Tor Proposals
|
|
001 The Tor Proposal Process
|
|
098 Proposals that should be written
|
|
099 Miscellaneous proposals
|
|
202 Two improved relay encryption protocols for Tor cells
|
|
257 Refactoring authorities and making them more isolated from the net
|
|
290 Continuously update consensus methods
|
|
FINISHED:
|
|
160 Authorities vote for bandwidth offsets in consensus [for 0.2.1.x]
|
|
196 Extended ORPort and TransportControlPort [in 0.2.5.2-alpha]
|
|
217 Tor Extended ORPort Authentication [for 0.2.5.x]
|
|
232 Pluggable Transport through SOCKS proxy [in 0.2.6]
|
|
260 Rendezvous Single Onion Services [in 0.2.9.3-alpha]
|
|
CLOSED:
|
|
101 Voting on the Tor Directory System [in 0.2.0.x]
|
|
102 Dropping "opt" from the directory format [in 0.2.0.x]
|
|
103 Splitting identity key from regularly used signing key [in 0.2.0.x]
|
|
104 Long and Short Router Descriptors [in 0.2.0.x]
|
|
105 Version negotiation for the Tor protocol [in 0.2.0.x]
|
|
106 Checking fewer things during TLS handshakes [in 0.2.0.x]
|
|
107 Uptime Sanity Checking [in 0.2.0.x]
|
|
108 Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
|
|
109 No more than one server per IP address [in 0.2.0.x]
|
|
110 Avoiding infinite length circuits [for 0.2.3.x] [in 0.2.1.3-alpha, 0.2.3.11-alpha]
|
|
111 Prioritizing local traffic over relayed traffic [in 0.2.0.x]
|
|
114 Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
|
|
117 IPv6 exits [for 0.2.4.x] [in 0.2.4.7-alpha]
|
|
119 New PROTOCOLINFO command for controllers [in 0.2.0.x]
|
|
121 Hidden Service Authentication [in 0.2.1.x]
|
|
122 Network status entries need a new Unnamed flag [in 0.2.0.x]
|
|
123 Naming authorities automatically create bindings [in 0.2.0.x]
|
|
125 Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
|
|
126 Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
|
|
129 Block Insecure Protocols by Default [in 0.2.0.x]
|
|
130 Version 2 Tor connection protocol [in 0.2.0.x]
|
|
135 Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
|
|
136 Mass authority migration with legacy keys [in 0.2.0.x]
|
|
137 Keep controllers informed as Tor bootstraps [in 0.2.1.x]
|
|
138 Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
|
|
139 Download consensus documents only when it will be trusted [in 0.2.1.x]
|
|
140 Provide diffs between consensuses [in 0.3.1.1-alpha]
|
|
148 Stream end reasons from the client side should be uniform [in 0.2.1.9-alpha]
|
|
150 Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
|
|
151 Improving Tor Path Selection [in 0.2.2.2-alpha]
|
|
152 Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
|
|
155 Four Improvements of Hidden Service Performance [in 0.2.1.x]
|
|
157 Make certificate downloads specific [for 0.2.4.x]
|
|
158 Clients download consensus + microdescriptors [in 0.2.3.1-alpha]
|
|
161 Computing Bandwidth Adjustments [for 0.2.1.x]
|
|
162 Publish the consensus in multiple flavors [in 0.2.3.1-alpha]
|
|
166 Including Network Statistics in Extra-Info Documents [for 0.2.2]
|
|
167 Vote on network parameters in consensus [in 0.2.2]
|
|
171 Separate streams across circuits by connection metadata [in 0.2.3.3-alpha]
|
|
174 Optimistic Data for Tor: Server Side [in 0.2.3.1-alpha]
|
|
176 Proposed version-3 link handshake for Tor [for 0.2.3]
|
|
178 Require majority of authorities to vote for consensus parameters [in 0.2.3.9-alpha]
|
|
179 TLS certificate and parameter normalization [for 0.2.3.x]
|
|
180 Pluggable transports for circumvention [in 0.2.3.x]
|
|
181 Optimistic Data for Tor: Client Side [in 0.2.3.3-alpha]
|
|
183 Refill Intervals [in 0.2.3.5-alpha]
|
|
184 Miscellaneous changes for a v3 Tor link protocol [for 0.2.3.x]
|
|
186 Multiple addresses for one OR or bridge [for 0.2.4.x+]
|
|
187 Reserve a cell type to allow client authorization [for 0.2.3.x]
|
|
193 Safe cookie authentication for Tor controllers
|
|
198 Restore semantics of TLS ClientHello [for 0.2.4.x]
|
|
200 Adding new, extensible CREATE, EXTEND, and related cells [in 0.2.4.8-alpha]
|
|
204 Subdomain support for Hidden Service addresses
|
|
205 Remove global client-side DNS caching [in 0.2.4.7-alpha.]
|
|
206 Preconfigured directory sources for bootstrapping [in 0.2.4.7-alpha]
|
|
207 Directory guards [for 0.2.4.x]
|
|
208 IPv6 Exits Redux [for 0.2.4.x] [in 0.2.4.7-alpha]
|
|
214 Allow 4-byte circuit IDs in a new link protocol [in 0.2.4.11-alpha]
|
|
215 Let the minimum consensus method change with time [in 0.2.6.1-alpha]
|
|
216 Improved circuit-creation key exchange [in 0.2.4.8-alpha]
|
|
218 Controller events to better understand connection/circuit usage [in 0.2.5.2-alpha]
|
|
220 Migrate server identity keys to Ed25519 [in 0.3.0.1-alpha]
|
|
221 Stop using CREATE_FAST [for 0.2.5.x]
|
|
222 Stop sending client timestamps [in 0.2.4.18]
|
|
224 Next-Generation Hidden Services in Tor [in 0.3.2.1-alpha]
|
|
227 Include package fingerprints in consensus documents [in 0.2.6.3-alpha]
|
|
228 Cross-certifying identity keys with onion keys
|
|
235 Stop assigning (and eventually supporting) the Named flag [in 0.2.6, 0.2.7]
|
|
236 The move to a single guard node
|
|
237 All relays are directory servers [for 0.2.7.x]
|
|
238 Better hidden service stats from Tor relays
|
|
243 Give out HSDir flag only to relays with Stable flag
|
|
244 Use RFC5705 Key Exporting in our AUTHENTICATE calls [in 0.3.0.1-alpha]
|
|
250 Random Number Generation During Tor Voting
|
|
251 Padding for netflow record resolution reduction [in 0.3.1.1-alpha]
|
|
264 Putting version numbers on the Tor subprotocols [in 0.2.9.4-alpha]
|
|
271 Another algorithm for guard selection [in 0.3.0.1-alpha]
|
|
272 Listed routers should be Valid, Running, and treated as such [in 0.2.9.3-alpha, 0.2.9.4-alpha]
|
|
274 Rotate onion keys less frequently [in 0.3.1.1-alpha]
|
|
278 Directory Compression Scheme Negotiation [in 0.3.1.1-alpha]
|
|
283 Move IPv6 ORPorts from microdescriptors to the microdesc consensus [for 0.3.3.x] [in 0.3.3.1-alpha]
|
|
284 Hidden Service v3 Control Port
|
|
289 Authenticating sendme cells to mitigate bandwidth attacks [in 0.4.1.1-alpha]
|
|
293 Other ways for relays to know when to publish [for 0.3.5] [in 0.4.0.1-alpha]
|
|
297 Relaxing the protover-based shutdown rules [for 0.3.5.x] [in 0.4.0.x]
|
|
298 Putting family lines in canonical form [for 0.3.6.x] [in 0.4.0.1-alpha]
|
|
302 Hiding onion service clients using padding [in 0.4.1.1-alpha]
|
|
304 Extending SOCKS5 Onion Service Error Codes
|
|
305 ESTABLISH_INTRO Cell DoS Defense Extension
|
|
SUPERSEDED:
|
|
112 Bring Back Pathlen Coin Weight
|
|
113 Simplifying directory authority administration
|
|
118 Advertising multiple ORPorts at once
|
|
124 Blocking resistant TLS certificate usage
|
|
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors
|
|
145 Separate "suitable as a guard" from "suitable as a new guard"
|
|
146 Add new flag to reflect long-term stability
|
|
149 Using data from NETINFO cells
|
|
153 Automatic software update protocol
|
|
154 Automatic Software Update Protocol
|
|
156 Tracking blocked ports on the client side
|
|
163 Detecting whether a connection comes from a client
|
|
169 Eliminate TLS renegotiation for the Tor connection handshake
|
|
170 Configuration options regarding circuit building
|
|
185 Directory caches without DirPort
|
|
194 Mnemonic .onion URLs
|
|
210 Faster Headless Consensus Bootstrapping
|
|
225 Strawman proposal: commit-and-reveal shared rng
|
|
247 Defending Against Guard Discovery Attacks using Vanguards
|
|
252 Single Onion Services
|
|
266 Removing current obsolete clients from the Tor network
|
|
280 Privacy-Preserving Statistics with Privcount in Tor
|
|
DEAD:
|
|
100 Tor Unreliable Datagram Extension Proposal
|
|
115 Two Hop Paths
|
|
116 Two hop paths from entry guards
|
|
120 Shutdown descriptors when Tor servers stop
|
|
128 Families of private bridges
|
|
142 Combine Introduction and Rendezvous Points
|
|
195 TLS certificate normalization for Tor 0.2.4.x
|
|
213 Remove stream-level sendmes from the design
|
|
253 Out of Band Circuit HMACs
|
|
258 Denial-of-service resistance for directory authorities
|
|
REJECTED:
|
|
134 More robust consensus voting with diverse authority sets
|
|
147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.4.x]
|
|
165 Easy migration for voting authority sets
|
|
168 Reduce default circuit window
|
|
175 Automatically promoting Tor clients to nodes
|
|
197 Message-based Inter-Controller IPC Channel
|
|
229 Further SOCKS5 extensions
|
|
233 Making Tor2Web mode faster
|
|
234 Adding remittance field to directory specification
|
|
241 Resisting guard-turnover attacks
|
|
246 Merging Hidden Service Directories and Introduction Points
|
|
286 Controller APIs for hibernation access on mobile
|
|
OBSOLETE:
|
|
127 Relaying dirport requests to Tor download site / website
|
|
131 Help users to verify they are using Tor
|
|
132 A Tor Web Service For Verifying Correct Browser Configuration
|
|
141 Download server descriptors on demand
|
|
144 Increase the diversity of circuits by detecting nodes belonging the same provider
|
|
164 Reporting the status of server votes
|
|
173 GETINFO Option Expansion
|
|
182 Credit Bucket
|
|
189 AUTHORIZE and AUTHORIZED cells
|
|
190 Bridge Client Authorization Based on a Shared Secret
|
|
191 Bridge Detection Resistance against MITM-capable Adversaries
|
|
192 Automatically retrieve and store information about bridges [for 0.2.[45].x]
|
|
199 Integration of BridgeFinder and BridgeFinderHelper
|
|
203 Avoiding censorship by impersonating an HTTPS server
|
|
209 Tuning the Parameters for the Path Bias Defense [for 0.2.4.x+]
|
|
230 How to change RSA1024 relay identity keys [for 0.2.?]
|
|
231 Migrating authority RSA1024 identity keys [for 0.2.?]
|
|
259 New Guard Selection Behaviour
|
|
261 AEZ for relay cryptography
|
|
263 Request to change key exchange protocol for handshake v1.2
|
|
268 New Guard Selection Behaviour
|
|
270 RebelAlliance: A Post-Quantum Secure Hybrid Handshake Based on NewHope
|
|
RESERVE:
|
|
133 Incorporate Unreachable ORs into the Tor Network
|
|
172 GETINFO controller option for circuit information
|
|
177 Abstaining from votes on individual flags [for 0.2.4.x]
|
|
211 Internal Mapaddress for Tor Configuration Testing [for 0.2.4.x+]
|
|
223 Ace: Improved circuit-creation key exchange
|
|
226 "Scalability and Stability Improvements to BridgeDB: Switching to a Distributed Database System and RDBMS"
|
|
242 Better performance and usability for the MyFamily option
|
|
255 Controller features to allow for load-balancing hidden services
|
|
256 Key revocation for relays and authorities
|
|
281 Downloading microdescriptors in bulk
|
|
INFORMATIONAL:
|
|
159 Exit Scanning
|