000-index.txt 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. Filename: 000-index.txt
  2. Title: Index of Tor Proposals
  3. Version: $Revision$
  4. Last-Modified: $Date$
  5. Author: Nick Mathewson
  6. Created: 26-Jan-2007
  7. Status: Meta
  8. Overview:
  9. This document provides an index to Tor proposals.
  10. This is an informational document.
  11. Everything in this document below the line of '=' signs is automatically
  12. generated by reindex.pl; do not edit by hand.
  13. ============================================================
  14. Proposals by number:
  15. 000 Index of Tor Proposals [META]
  16. 001 The Tor Proposal Process [META]
  17. 098 Proposals that should be written [META]
  18. 099 Miscellaneous proposals [META]
  19. 100 Tor Unreliable Datagram Extension Proposal [DEAD]
  20. 101 Voting on the Tor Directory System [CLOSED]
  21. 102 Dropping "opt" from the directory format [CLOSED]
  22. 103 Splitting identity key from regularly used signing key [CLOSED]
  23. 104 Long and Short Router Descriptors [CLOSED]
  24. 105 Version negotiation for the Tor protocol [FINISHED]
  25. 106 Checking fewer things during TLS handshakes [CLOSED]
  26. 107 Uptime Sanity Checking [CLOSED]
  27. 108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
  28. 109 No more than one server per IP address [CLOSED]
  29. 110 Avoiding infinite length circuits [OPEN]
  30. 111 Prioritizing local traffic over relayed traffic [FINISHED]
  31. 112 Bring Back Pathlen Coin Weight [SUPERSEDED]
  32. 113 Simplifying directory authority administration [OPEN]
  33. 114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
  34. 115 Two Hop Paths [OPEN]
  35. 116 Two hop paths from entry guards [OPEN]
  36. 117 IPv6 exits [OPEN]
  37. 118 Advertising multiple ORPorts at once [NEEDS-RESEARCH]
  38. 119 New PROTOCOLINFO command for controllers [CLOSED]
  39. 120 Suicide descriptors when Tor servers stop [OPEN]
  40. 121 Hidden Service Authentication [OPEN]
  41. 122 Network status entries need a new Unnamed flag [CLOSED]
  42. 123 Naming authorities automatically create bindings [FINISHED]
  43. 124 Blocking resistant TLS certificate usage [SUPERSEDED]
  44. 125 Behavior for bridge users, bridge relays, and bridge authorities [FINISHED]
  45. 126 Getting GeoIP data and publishing usage summaries [FINISHED]
  46. 127 Relaying dirport requests to Tor download site / website [DRAFT]
  47. 128 Families of private bridges [DRAFT]
  48. 129 Block Insecure Protocols by Default [FINISHED]
  49. 130 Version 2 Tor connection protocol [FINISHED]
  50. 131 Help users to verify they are using Tor [DRAFT]
  51. Proposals by status:
  52. OPEN:
  53. 110 Avoiding infinite length circuits
  54. 113 Simplifying directory authority administration
  55. 115 Two Hop Paths
  56. 116 Two hop paths from entry guards
  57. 117 IPv6 exits
  58. 120 Suicide descriptors when Tor servers stop
  59. 121 Hidden Service Authentication
  60. ACCEPTED:
  61. NEEDS-RESEARCH:
  62. 118 Advertising multiple ORPorts at once
  63. META:
  64. 000 Index of Tor Proposals
  65. 001 The Tor Proposal Process
  66. 098 Proposals that should be written
  67. 099 Miscellaneous proposals
  68. FINISHED:
  69. 105 Version negotiation for the Tor protocol
  70. 111 Prioritizing local traffic over relayed traffic
  71. 123 Naming authorities automatically create bindings
  72. 125 Behavior for bridge users, bridge relays, and bridge authorities
  73. 126 Getting GeoIP data and publishing usage summaries
  74. 129 Block Insecure Protocols by Default
  75. 130 Version 2 Tor connection protocol
  76. CLOSED:
  77. 101 Voting on the Tor Directory System
  78. 102 Dropping "opt" from the directory format
  79. 103 Splitting identity key from regularly used signing key
  80. 104 Long and Short Router Descriptors
  81. 106 Checking fewer things during TLS handshakes
  82. 107 Uptime Sanity Checking
  83. 108 Base "Stable" Flag on Mean Time Between Failures
  84. 109 No more than one server per IP address
  85. 114 Distributed Storage for Tor Hidden Service Descriptors
  86. 119 New PROTOCOLINFO command for controllers
  87. 122 Network status entries need a new Unnamed flag
  88. SUPERSEDED:
  89. 112 Bring Back Pathlen Coin Weight
  90. 124 Blocking resistant TLS certificate usage
  91. DEAD:
  92. 100 Tor Unreliable Datagram Extension Proposal
  93. DRAFT:
  94. 127 Relaying dirport requests to Tor download site / website
  95. 128 Families of private bridges
  96. 131 Help users to verify they are using Tor