aboutsummaryrefslogtreecommitdiff
path: root/doc/spec/proposals/000-index.txt
blob: aa8126d82cb33d4df727cf4b0313a2c402b8ced9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
Filename: 000-index.txt
Title: Index of Tor Proposals
Version: $Revision$
Last-Modified: $Date$
Author: Nick Mathewson
Created: 26-Jan-2007
Status: Meta

Overview:

   This document provides an index to Tor proposals.

   This is an informational document.

   Everything in this document below the line of '=' signs is automatically
   generated by reindex.pl; do not edit by hand.

============================================================
Proposals by number:

000  Index of Tor Proposals [META]
001  The Tor Proposal Process [META]
098  Proposals that should be written [META]
099  Miscellaneous proposals [META]
100  Tor Unreliable Datagram Extension Proposal [DEAD]
101  Voting on the Tor Directory System [CLOSED]
102  Dropping "opt" from the directory format [CLOSED]
103  Splitting identity key from regularly used signing key [CLOSED]
104  Long and Short Router Descriptors [CLOSED]
105  Version negotiation for the Tor protocol [CLOSED]
106  Checking fewer things during TLS handshakes [CLOSED]
107  Uptime Sanity Checking [CLOSED]
108  Base "Stable" Flag on Mean Time Between Failures [CLOSED]
109  No more than one server per IP address [CLOSED]
110  Avoiding infinite length circuits [ACCEPTED]
111  Prioritizing local traffic over relayed traffic [FINISHED]
112  Bring Back Pathlen Coin Weight [SUPERSEDED]
113  Simplifying directory authority administration [SUPERSEDED]
114  Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
115  Two Hop Paths [DEAD]
116  Two hop paths from entry guards [DEAD]
117  IPv6 exits [ACCEPTED]
118  Advertising multiple ORPorts at once [ACCEPTED]
119  New PROTOCOLINFO command for controllers [CLOSED]
120  Shutdown descriptors when Tor servers stop [DEAD]
121  Hidden Service Authentication [OPEN]
122  Network status entries need a new Unnamed flag [CLOSED]
123  Naming authorities automatically create bindings [CLOSED]
124  Blocking resistant TLS certificate usage [SUPERSEDED]
125  Behavior for bridge users, bridge relays, and bridge authorities [FINISHED]
126  Getting GeoIP data and publishing usage summaries [CLOSED]
127  Relaying dirport requests to Tor download site / website [DRAFT]
128  Families of private bridges [FINISHED]
129  Block Insecure Protocols by Default [CLOSED]
130  Version 2 Tor connection protocol [CLOSED]
131  Help users to verify they are using Tor [NEEDS-REVISION]
132  A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
133  Incorporate Unreachable ORs into the Tor Network [DRAFT]
134  More robust consensus voting with diverse authority sets [ACCEPTED]
135  Simplify Configuration of Private Tor Networks [ACCEPTED]
136  Mass authority migration with legacy keys [FINISHED]
137  Keep controllers informed as Tor bootstraps [FINISHED]
138  Remove routers that are not Running from consensus documents [CLOSED]
139  Download consensus documents only when it will be trusted [CLOSED]
140  Provide diffs between consensuses [ACCEPTED]
141  Download server descriptors on demand [DRAFT]
142  Combine Introduction and Rendezvous Points [OPEN]
143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
144  Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
145  Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
146  Add new flag to reflect long-term stability [OPEN]
147  Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
148  Stream end reasons from the client side should be uniform [ACCEPTED]
149  Using data from NETINFO cells [OPEN]
150  Exclude Exit Nodes from a circuit [ACCEPTED]
151  Improving Tor Path Selection [DRAFT]


Proposals by status:

 DRAFT:
   127  Relaying dirport requests to Tor download site / website
   132  A Tor Web Service For Verifying Correct Browser Configuration
   133  Incorporate Unreachable ORs into the Tor Network
   141  Download server descriptors on demand
   144  Increase the diversity of circuits by detecting nodes belonging the
   151  Improving Tor Path Selection
 OPEN:
   121  Hidden Service Authentication
   142  Combine Introduction and Rendezvous Points
   143  Improvements of Distributed Storage for Tor Hidden Service Descriptors
   145  Separate "suitable as a guard" from "suitable as a new guard"
   146  Add new flag to reflect long-term stability
   149  Using data from NETINFO cells
 NEEDS-REVISION:
   131  Help users to verify they are using Tor
 NEEDS-RESEARCH:
 ACCEPTED:
   110  Avoiding infinite length circuits
   117  IPv6 exits
   118  Advertising multiple ORPorts at once
   134  More robust consensus voting with diverse authority sets
   135  Simplify Configuration of Private Tor Networks
   140  Provide diffs between consensuses
   147  Eliminate the need for v2 directories in generating v3 directories
   148  Stream end reasons from the client side should be uniform
   150  Exclude Exit Nodes from a circuit
 META:
   000  Index of Tor Proposals
   001  The Tor Proposal Process
   098  Proposals that should be written
   099  Miscellaneous proposals
 FINISHED:
   111  Prioritizing local traffic over relayed traffic
   125  Behavior for bridge users, bridge relays, and bridge authorities
   128  Families of private bridges
   136  Mass authority migration with legacy keys
   137  Keep controllers informed as Tor bootstraps
 CLOSED:
   101  Voting on the Tor Directory System
   102  Dropping "opt" from the directory format
   103  Splitting identity key from regularly used signing key
   104  Long and Short Router Descriptors
   105  Version negotiation for the Tor protocol
   106  Checking fewer things during TLS handshakes
   107  Uptime Sanity Checking
   108  Base "Stable" Flag on Mean Time Between Failures
   109  No more than one server per IP address
   114  Distributed Storage for Tor Hidden Service Descriptors
   119  New PROTOCOLINFO command for controllers
   122  Network status entries need a new Unnamed flag
   123  Naming authorities automatically create bindings
   126  Getting GeoIP data and publishing usage summaries
   129  Block Insecure Protocols by Default
   130  Version 2 Tor connection protocol
   138  Remove routers that are not Running from consensus documents
   139  Download consensus documents only when it will be trusted
 SUPERSEDED:
   112  Bring Back Pathlen Coin Weight
   113  Simplifying directory authority administration
   124  Blocking resistant TLS certificate usage
 DEAD:
   100  Tor Unreliable Datagram Extension Proposal
   115  Two Hop Paths
   116  Two hop paths from entry guards
   120  Shutdown descriptors when Tor servers stop