Browse Source

r16919@tombo: nickm | 2008-07-11 13:04:28 -0400
Update proposal statuses for 0.2.1.x.


svn:r15843

Nick Mathewson 16 years ago
parent
commit
f66b810616

+ 20 - 20
doc/spec/proposals/000-index.txt

@@ -32,17 +32,17 @@ Proposals by number:
 107  Uptime Sanity Checking [CLOSED]
 107  Uptime Sanity Checking [CLOSED]
 108  Base "Stable" Flag on Mean Time Between Failures [CLOSED]
 108  Base "Stable" Flag on Mean Time Between Failures [CLOSED]
 109  No more than one server per IP address [CLOSED]
 109  No more than one server per IP address [CLOSED]
-110  Avoiding infinite length circuits [NEEDS-REVISION]
+110  Avoiding infinite length circuits [ACCEPTED]
 111  Prioritizing local traffic over relayed traffic [FINISHED]
 111  Prioritizing local traffic over relayed traffic [FINISHED]
 112  Bring Back Pathlen Coin Weight [SUPERSEDED]
 112  Bring Back Pathlen Coin Weight [SUPERSEDED]
 113  Simplifying directory authority administration [SUPERSEDED]
 113  Simplifying directory authority administration [SUPERSEDED]
 114  Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
 114  Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
 115  Two Hop Paths [DEAD]
 115  Two Hop Paths [DEAD]
 116  Two hop paths from entry guards [DEAD]
 116  Two hop paths from entry guards [DEAD]
-117  IPv6 exits [NEEDS-REVISION]
+117  IPv6 exits [ACCEPTED]
-118  Advertising multiple ORPorts at once [DRAFT]
+118  Advertising multiple ORPorts at once [ACCEPTED]
 119  New PROTOCOLINFO command for controllers [CLOSED]
 119  New PROTOCOLINFO command for controllers [CLOSED]
-120  Shutdown descriptors when Tor servers stop [OPEN]
+120  Shutdown descriptors when Tor servers stop [DEAD]
 121  Hidden Service Authentication [OPEN]
 121  Hidden Service Authentication [OPEN]
 122  Network status entries need a new Unnamed flag [CLOSED]
 122  Network status entries need a new Unnamed flag [CLOSED]
 123  Naming authorities automatically create bindings [CLOSED]
 123  Naming authorities automatically create bindings [CLOSED]
@@ -50,27 +50,27 @@ Proposals by number:
 125  Behavior for bridge users, bridge relays, and bridge authorities [FINISHED]
 125  Behavior for bridge users, bridge relays, and bridge authorities [FINISHED]
 126  Getting GeoIP data and publishing usage summaries [CLOSED]
 126  Getting GeoIP data and publishing usage summaries [CLOSED]
 127  Relaying dirport requests to Tor download site / website [DRAFT]
 127  Relaying dirport requests to Tor download site / website [DRAFT]
-128  Families of private bridges [DRAFT]
+128  Families of private bridges [FINISHED]
 129  Block Insecure Protocols by Default [CLOSED]
 129  Block Insecure Protocols by Default [CLOSED]
 130  Version 2 Tor connection protocol [CLOSED]
 130  Version 2 Tor connection protocol [CLOSED]
 131  Help users to verify they are using Tor [NEEDS-REVISION]
 131  Help users to verify they are using Tor [NEEDS-REVISION]
 132  A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
 132  A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
 133  Incorporate Unreachable ORs into the Tor Network [DRAFT]
 133  Incorporate Unreachable ORs into the Tor Network [DRAFT]
-134  More robust consensus voting with diverse authority sets [DRAFT]
+134  More robust consensus voting with diverse authority sets [ACCEPTED]
 135  Simplify Configuration of Private Tor Networks [ACCEPTED]
 135  Simplify Configuration of Private Tor Networks [ACCEPTED]
 136  Mass authority migration with legacy keys [FINISHED]
 136  Mass authority migration with legacy keys [FINISHED]
-137  Keep controllers informed as Tor bootstraps [OPEN]
+137  Keep controllers informed as Tor bootstraps [FINISHED]
 138  Remove routers that are not Running from consensus documents [CLOSED]
 138  Remove routers that are not Running from consensus documents [CLOSED]
 139  Download consensus documents only when it will be trusted [CLOSED]
 139  Download consensus documents only when it will be trusted [CLOSED]
-140  Provide diffs between consensuses [OPEN]
+140  Provide diffs between consensuses [ACCEPTED]
 141  Download server descriptors on demand [DRAFT]
 141  Download server descriptors on demand [DRAFT]
 142  Combine Introduction and Rendezvous Points [OPEN]
 142  Combine Introduction and Rendezvous Points [OPEN]
 143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
 143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
 144  Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
 144  Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
 145  Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
 145  Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
 146  Add new flag to reflect long-term stability [OPEN]
 146  Add new flag to reflect long-term stability [OPEN]
-147  Eliminate the need for v2 directories in generating v3 directories [OPEN]
+147  Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
-148  Stream end reasons from the client side should be uniform [OPEN]
+148  Stream end reasons from the client side should be uniform [ACCEPTED]
 149  Using data from NETINFO cells [OPEN]
 149  Using data from NETINFO cells [OPEN]
 150  Exclude Exit Nodes from a circuit [DRAFT]
 150  Exclude Exit Nodes from a circuit [DRAFT]
 151  Improving Tor Path Selection [DRAFT]
 151  Improving Tor Path Selection [DRAFT]
@@ -79,35 +79,32 @@ Proposals by number:
 Proposals by status:
 Proposals by status:
 
 
  DRAFT:
  DRAFT:
-   118  Advertising multiple ORPorts at once
    127  Relaying dirport requests to Tor download site / website
    127  Relaying dirport requests to Tor download site / website
-   128  Families of private bridges
    132  A Tor Web Service For Verifying Correct Browser Configuration
    132  A Tor Web Service For Verifying Correct Browser Configuration
    133  Incorporate Unreachable ORs into the Tor Network
    133  Incorporate Unreachable ORs into the Tor Network
-   134  More robust consensus voting with diverse authority sets
    141  Download server descriptors on demand
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the
    144  Increase the diversity of circuits by detecting nodes belonging the
    150  Exclude Exit Nodes from a circuit
    150  Exclude Exit Nodes from a circuit
    151  Improving Tor Path Selection
    151  Improving Tor Path Selection
  OPEN:
  OPEN:
-   120  Shutdown descriptors when Tor servers stop
    121  Hidden Service Authentication
    121  Hidden Service Authentication
-   137  Keep controllers informed as Tor bootstraps
-   140  Provide diffs between consensuses
    142  Combine Introduction and Rendezvous Points
    142  Combine Introduction and Rendezvous Points
    143  Improvements of Distributed Storage for Tor Hidden Service Descriptors
    143  Improvements of Distributed Storage for Tor Hidden Service Descriptors
    145  Separate "suitable as a guard" from "suitable as a new guard"
    145  Separate "suitable as a guard" from "suitable as a new guard"
    146  Add new flag to reflect long-term stability
    146  Add new flag to reflect long-term stability
-   147  Eliminate the need for v2 directories in generating v3 directories
-   148  Stream end reasons from the client side should be uniform
    149  Using data from NETINFO cells
    149  Using data from NETINFO cells
  NEEDS-REVISION:
  NEEDS-REVISION:
-   110  Avoiding infinite length circuits
-   117  IPv6 exits
    131  Help users to verify they are using Tor
    131  Help users to verify they are using Tor
  NEEDS-RESEARCH:
  NEEDS-RESEARCH:
  ACCEPTED:
  ACCEPTED:
+   110  Avoiding infinite length circuits
+   117  IPv6 exits
+   118  Advertising multiple ORPorts at once
+   134  More robust consensus voting with diverse authority sets
    135  Simplify Configuration of Private Tor Networks
    135  Simplify Configuration of Private Tor Networks
+   140  Provide diffs between consensuses
+   147  Eliminate the need for v2 directories in generating v3 directories
+   148  Stream end reasons from the client side should be uniform
  META:
  META:
    000  Index of Tor Proposals
    000  Index of Tor Proposals
    001  The Tor Proposal Process
    001  The Tor Proposal Process
@@ -116,7 +113,9 @@ Proposals by status:
  FINISHED:
  FINISHED:
    111  Prioritizing local traffic over relayed traffic
    111  Prioritizing local traffic over relayed traffic
    125  Behavior for bridge users, bridge relays, and bridge authorities
    125  Behavior for bridge users, bridge relays, and bridge authorities
+   128  Families of private bridges
    136  Mass authority migration with legacy keys
    136  Mass authority migration with legacy keys
+   137  Keep controllers informed as Tor bootstraps
  CLOSED:
  CLOSED:
    101  Voting on the Tor Directory System
    101  Voting on the Tor Directory System
    102  Dropping "opt" from the directory format
    102  Dropping "opt" from the directory format
@@ -144,3 +143,4 @@ Proposals by status:
    100  Tor Unreliable Datagram Extension Proposal
    100  Tor Unreliable Datagram Extension Proposal
    115  Two Hop Paths
    115  Two Hop Paths
    116  Two hop paths from entry guards
    116  Two hop paths from entry guards
+   120  Shutdown descriptors when Tor servers stop

+ 2 - 1
doc/spec/proposals/117-ipv6-exits.txt

@@ -4,7 +4,7 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: coderman
 Author: coderman
 Created: 10-Jul-2007
 Created: 10-Jul-2007
-Status: Needs-Revision
+Status: Accepted
 
 
 Overview
 Overview
 
 
@@ -214,6 +214,7 @@ Contents
     type that can hold an ipv6 address, since the way we encode ipv6
     type that can hold an ipv6 address, since the way we encode ipv6
     addresses elsewhere ("0.0.0.0 indicates that the next 16 bytes are ipv6")
     addresses elsewhere ("0.0.0.0 indicates that the next 16 bytes are ipv6")
     is a bit dumb. -nickm]
     is a bit dumb. -nickm]
+   [Actually, the length field lets us distinguish EXITPOLICY. -nickm]
 
 
 2.2. Directory specification
 2.2. Directory specification
 
 

+ 1 - 1
doc/spec/proposals/120-shutdown-descriptors.txt

@@ -4,7 +4,7 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: Roger Dingledine
 Author: Roger Dingledine
 Created: 15-Aug-2007
 Created: 15-Aug-2007
-Status: Open
+Status: Dead
 
 
 Overview:
 Overview:
 
 

+ 4 - 1
doc/spec/proposals/128-bridge-families.txt

@@ -4,7 +4,10 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: Roger Dingledine
 Author: Roger Dingledine
 Created: 2007-12-xx
 Created: 2007-12-xx
-Status: Draft
+Status: Finished
+
+  [This proposal is part implemented, and part dead (won't-implement).
+  Roger should add a note and merge it into the spec.]
 
 
 1. Overview
 1. Overview
 
 

+ 1 - 1
doc/spec/proposals/134-robust-voting.txt

@@ -2,7 +2,7 @@ Filename: 134-robust-voting.txt
 Title: More robust consensus voting with diverse authority sets
 Title: More robust consensus voting with diverse authority sets
 Author: Peter Palfrader
 Author: Peter Palfrader
 Created: 2008-04-01
 Created: 2008-04-01
-Status: Draft
+Status: Accepted
 
 
 Overview:
 Overview:
 
 

+ 1 - 1
doc/spec/proposals/137-bootstrap-phases.txt

@@ -4,7 +4,7 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: Roger Dingledine
 Author: Roger Dingledine
 Created: 07-Jun-2008
 Created: 07-Jun-2008
-Status: Open
+Status: Finished
 
 
 1. Overview.
 1. Overview.
 
 

+ 1 - 1
doc/spec/proposals/140-consensus-diffs.txt

@@ -4,7 +4,7 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: Peter Palfrader
 Author: Peter Palfrader
 Created: 13-Jun-2008
 Created: 13-Jun-2008
-Status: Open
+Status: Accepted
 
 
 1. Overview.
 1. Overview.
 
 

+ 3 - 0
doc/spec/proposals/145-newguard-flag.txt

@@ -6,6 +6,9 @@ Author: Nick Mathewson
 Created: 1-Jul-2008
 Created: 1-Jul-2008
 Status: Open
 Status: Open
 
 
+[This could be obsoleted by proposal 141, which could replace NewGuard
+with a Guard weight.]
+
 Overview
 Overview
 
 
    Right now, Tor has one flag that clients use both to tell which
    Right now, Tor has one flag that clients use both to tell which

+ 1 - 1
doc/spec/proposals/148-uniform-client-end-reason.txt

@@ -4,7 +4,7 @@ Version: $Revision$
 Last-Modified: $Date$
 Last-Modified: $Date$
 Author: Roger Dingledine
 Author: Roger Dingledine
 Created: 2-Jul-2008
 Created: 2-Jul-2008
-Status: Open
+Status: Accepted
 
 
 Overview
 Overview