| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154 | 
							- Filename: 000-index.txt
 
- Title: Index of Tor Proposals
 
- Version: $Revision$
 
- Last-Modified: $Date$
 
- Author: Nick Mathewson
 
- Created: 26-Jan-2007
 
- Status: Meta
 
- Overview:
 
-    This document provides an index to Tor proposals.
 
-    This is an informational document.
 
-    Everything in this document below the line of '=' signs is automatically
 
-    generated by reindex.pl; do not edit by hand.
 
- ============================================================
 
- Proposals by number:
 
- 000  Index of Tor Proposals [META]
 
- 001  The Tor Proposal Process [META]
 
- 098  Proposals that should be written [META]
 
- 099  Miscellaneous proposals [META]
 
- 100  Tor Unreliable Datagram Extension Proposal [DEAD]
 
- 101  Voting on the Tor Directory System [CLOSED]
 
- 102  Dropping "opt" from the directory format [CLOSED]
 
- 103  Splitting identity key from regularly used signing key [CLOSED]
 
- 104  Long and Short Router Descriptors [CLOSED]
 
- 105  Version negotiation for the Tor protocol [CLOSED]
 
- 106  Checking fewer things during TLS handshakes [CLOSED]
 
- 107  Uptime Sanity Checking [CLOSED]
 
- 108  Base "Stable" Flag on Mean Time Between Failures [CLOSED]
 
- 109  No more than one server per IP address [CLOSED]
 
- 110  Avoiding infinite length circuits [ACCEPTED]
 
- 111  Prioritizing local traffic over relayed traffic [FINISHED]
 
- 112  Bring Back Pathlen Coin Weight [SUPERSEDED]
 
- 113  Simplifying directory authority administration [SUPERSEDED]
 
- 114  Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
 
- 115  Two Hop Paths [DEAD]
 
- 116  Two hop paths from entry guards [DEAD]
 
- 117  IPv6 exits [ACCEPTED]
 
- 118  Advertising multiple ORPorts at once [ACCEPTED]
 
- 119  New PROTOCOLINFO command for controllers [CLOSED]
 
- 120  Shutdown descriptors when Tor servers stop [DEAD]
 
- 121  Hidden Service Authentication [OPEN]
 
- 122  Network status entries need a new Unnamed flag [CLOSED]
 
- 123  Naming authorities automatically create bindings [CLOSED]
 
- 124  Blocking resistant TLS certificate usage [SUPERSEDED]
 
- 125  Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
 
- 126  Getting GeoIP data and publishing usage summaries [CLOSED]
 
- 127  Relaying dirport requests to Tor download site / website [DRAFT]
 
- 128  Families of private bridges [FINISHED]
 
- 129  Block Insecure Protocols by Default [CLOSED]
 
- 130  Version 2 Tor connection protocol [CLOSED]
 
- 131  Help users to verify they are using Tor [NEEDS-REVISION]
 
- 132  A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
 
- 133  Incorporate Unreachable ORs into the Tor Network [DRAFT]
 
- 134  More robust consensus voting with diverse authority sets [ACCEPTED]
 
- 135  Simplify Configuration of Private Tor Networks [FINISHED]
 
- 136  Mass authority migration with legacy keys [FINISHED]
 
- 137  Keep controllers informed as Tor bootstraps [CLOSED]
 
- 138  Remove routers that are not Running from consensus documents [CLOSED]
 
- 139  Download consensus documents only when it will be trusted [CLOSED]
 
- 140  Provide diffs between consensuses [ACCEPTED]
 
- 141  Download server descriptors on demand [DRAFT]
 
- 142  Combine Introduction and Rendezvous Points [OPEN]
 
- 143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
 
- 144  Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
 
- 145  Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
 
- 146  Add new flag to reflect long-term stability [OPEN]
 
- 147  Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
 
- 148  Stream end reasons from the client side should be uniform [ACCEPTED]
 
- 149  Using data from NETINFO cells [OPEN]
 
- 150  Exclude Exit Nodes from a circuit [CLOSED]
 
- 151  Improving Tor Path Selection [DRAFT]
 
- 152  Optionally allow exit from single-hop circuits  [CLOSED]
 
- 153  Automatic software update protocol [DRAFT]
 
- 154  Automatic Software Update Protocol [OPEN]
 
- 155  Four Improvements of Hidden Service Performance [OPEN]
 
- Proposals by status:
 
-  DRAFT:
 
-    127  Relaying dirport requests to Tor download site / website
 
-    132  A Tor Web Service For Verifying Correct Browser Configuration
 
-    133  Incorporate Unreachable ORs into the Tor Network
 
-    141  Download server descriptors on demand
 
-    144  Increase the diversity of circuits by detecting nodes belonging the
 
-    151  Improving Tor Path Selection
 
-    153  Automatic software update protocol
 
-  OPEN:
 
-    121  Hidden Service Authentication
 
-    142  Combine Introduction and Rendezvous Points
 
-    143  Improvements of Distributed Storage for Tor Hidden Service Descriptors
 
-    145  Separate "suitable as a guard" from "suitable as a new guard"
 
-    146  Add new flag to reflect long-term stability
 
-    149  Using data from NETINFO cells
 
-    154  Automatic Software Update Protocol
 
-    155  Four Improvements of Hidden Service Performance
 
-  NEEDS-REVISION:
 
-    131  Help users to verify they are using Tor
 
-  NEEDS-RESEARCH:
 
-  ACCEPTED:
 
-    110  Avoiding infinite length circuits
 
-    117  IPv6 exits
 
-    118  Advertising multiple ORPorts at once
 
-    134  More robust consensus voting with diverse authority sets
 
-    140  Provide diffs between consensuses
 
-    147  Eliminate the need for v2 directories in generating v3 directories
 
-    148  Stream end reasons from the client side should be uniform
 
-  META:
 
-    000  Index of Tor Proposals
 
-    001  The Tor Proposal Process
 
-    098  Proposals that should be written
 
-    099  Miscellaneous proposals
 
-  FINISHED:
 
-    111  Prioritizing local traffic over relayed traffic
 
-    128  Families of private bridges
 
-    135  Simplify Configuration of Private Tor Networks
 
-    136  Mass authority migration with legacy keys
 
-  CLOSED:
 
-    101  Voting on the Tor Directory System
 
-    102  Dropping "opt" from the directory format
 
-    103  Splitting identity key from regularly used signing key
 
-    104  Long and Short Router Descriptors
 
-    105  Version negotiation for the Tor protocol
 
-    106  Checking fewer things during TLS handshakes
 
-    107  Uptime Sanity Checking
 
-    108  Base "Stable" Flag on Mean Time Between Failures
 
-    109  No more than one server per IP address
 
-    114  Distributed Storage for Tor Hidden Service Descriptors
 
-    119  New PROTOCOLINFO command for controllers
 
-    122  Network status entries need a new Unnamed flag
 
-    123  Naming authorities automatically create bindings
 
-    125  Behavior for bridge users, bridge relays, and bridge authorities
 
-    126  Getting GeoIP data and publishing usage summaries
 
-    129  Block Insecure Protocols by Default
 
-    130  Version 2 Tor connection protocol
 
-    137  Keep controllers informed as Tor bootstraps
 
-    138  Remove routers that are not Running from consensus documents
 
-    139  Download consensus documents only when it will be trusted
 
-    150  Exclude Exit Nodes from a circuit
 
-    152  Optionally allow exit from single-hop circuits 
 
-  SUPERSEDED:
 
-    112  Bring Back Pathlen Coin Weight
 
-    113  Simplifying directory authority administration
 
-    124  Blocking resistant TLS certificate usage
 
-  DEAD:
 
-    100  Tor Unreliable Datagram Extension Proposal
 
-    115  Two Hop Paths
 
-    116  Two hop paths from entry guards
 
-    120  Shutdown descriptors when Tor servers stop
 
 
  |