123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188 |
- Filename: 000-index.txt
- Title: Index of Tor Proposals
- Author: Nick Mathewson
- Created: 26-Jan-2007
- Status: Meta
- Overview:
- This document provides an index to Tor proposals.
- This is an informational document.
- Everything in this document below the line of '=' signs is automatically
- generated by reindex.py; do not edit by hand.
- ============================================================
- Proposals by number:
- 000 Index of Tor Proposals [META]
- 001 The Tor Proposal Process [META]
- 098 Proposals that should be written [META]
- 099 Miscellaneous proposals [META]
- 100 Tor Unreliable Datagram Extension Proposal [DEAD]
- 101 Voting on the Tor Directory System [CLOSED]
- 102 Dropping "opt" from the directory format [CLOSED]
- 103 Splitting identity key from regularly used signing key [CLOSED]
- 104 Long and Short Router Descriptors [CLOSED]
- 105 Version negotiation for the Tor protocol [CLOSED]
- 106 Checking fewer things during TLS handshakes [CLOSED]
- 107 Uptime Sanity Checking [CLOSED]
- 108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
- 109 No more than one server per IP address [CLOSED]
- 110 Avoiding infinite length circuits [ACCEPTED]
- 111 Prioritizing local traffic over relayed traffic [CLOSED]
- 112 Bring Back Pathlen Coin Weight [SUPERSEDED]
- 113 Simplifying directory authority administration [SUPERSEDED]
- 114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
- 115 Two Hop Paths [DEAD]
- 116 Two hop paths from entry guards [DEAD]
- 117 IPv6 exits [ACCEPTED]
- 118 Advertising multiple ORPorts at once [ACCEPTED]
- 119 New PROTOCOLINFO command for controllers [CLOSED]
- 120 Shutdown descriptors when Tor servers stop [DEAD]
- 121 Hidden Service Authentication [FINISHED]
- 122 Network status entries need a new Unnamed flag [CLOSED]
- 123 Naming authorities automatically create bindings [CLOSED]
- 124 Blocking resistant TLS certificate usage [SUPERSEDED]
- 125 Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
- 126 Getting GeoIP data and publishing usage summaries [CLOSED]
- 127 Relaying dirport requests to Tor download site / website [DRAFT]
- 128 Families of private bridges [DEAD]
- 129 Block Insecure Protocols by Default [CLOSED]
- 130 Version 2 Tor connection protocol [CLOSED]
- 131 Help users to verify they are using Tor [NEEDS-REVISION]
- 132 A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
- 133 Incorporate Unreachable ORs into the Tor Network [DRAFT]
- 134 More robust consensus voting with diverse authority sets [REJECTED]
- 135 Simplify Configuration of Private Tor Networks [CLOSED]
- 136 Mass authority migration with legacy keys [CLOSED]
- 137 Keep controllers informed as Tor bootstraps [CLOSED]
- 138 Remove routers that are not Running from consensus documents [CLOSED]
- 139 Download consensus documents only when it will be trusted [CLOSED]
- 140 Provide diffs between consensuses [ACCEPTED]
- 141 Download server descriptors on demand [DRAFT]
- 142 Combine Introduction and Rendezvous Points [DEAD]
- 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
- 144 Increase the diversity of circuits by detecting nodes belonging the same provider [DRAFT]
- 145 Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
- 146 Add new flag to reflect long-term stability [OPEN]
- 147 Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
- 148 Stream end reasons from the client side should be uniform [CLOSED]
- 149 Using data from NETINFO cells [OPEN]
- 150 Exclude Exit Nodes from a circuit [CLOSED]
- 151 Improving Tor Path Selection [FINISHED]
- 152 Optionally allow exit from single-hop circuits [CLOSED]
- 153 Automatic software update protocol [SUPERSEDED]
- 154 Automatic Software Update Protocol [SUPERSEDED]
- 155 Four Improvements of Hidden Service Performance [FINISHED]
- 156 Tracking blocked ports on the client side [OPEN]
- 157 Make certificate downloads specific [ACCEPTED]
- 158 Clients download consensus + microdescriptors [OPEN]
- 159 Exit Scanning [OPEN]
- 160 Authorities vote for bandwidth offsets in consensus [FINISHED]
- 161 Computing Bandwidth Adjustments [FINISHED]
- 162 Publish the consensus in multiple flavors [OPEN]
- 163 Detecting whether a connection comes from a client [OPEN]
- 164 Reporting the status of server votes [OPEN]
- 165 Easy migration for voting authority sets [OPEN]
- 166 Including Network Statistics in Extra-Info Documents [ACCEPTED]
- 167 Vote on network parameters in consensus [CLOSED]
- 168 Reduce default circuit window [OPEN]
- 169 Eliminate TLS renegotiation for the Tor connection handshake [DRAFT]
- 170 Configuration options regarding circuit building [DRAFT]
- 172 GETINFO controller option for circuit information [ACCEPTED]
- 173 GETINFO Option Expansion [ACCEPTED]
- 174 Optimistic Data for Tor: Server Side [OPEN]
- Proposals by status:
- DRAFT:
- 127 Relaying dirport requests to Tor download site / website
- 132 A Tor Web Service For Verifying Correct Browser Configuration
- 133 Incorporate Unreachable ORs into the Tor Network
- 141 Download server descriptors on demand
- 144 Increase the diversity of circuits by detecting nodes belonging the same provider
- 169 Eliminate TLS renegotiation for the Tor connection handshake [for 0.2.2]
- 170 Configuration options regarding circuit building
- NEEDS-REVISION:
- 131 Help users to verify they are using Tor
- OPEN:
- 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [for 0.2.1.x]
- 145 Separate "suitable as a guard" from "suitable as a new guard" [for 0.2.1.x]
- 146 Add new flag to reflect long-term stability [for 0.2.1.x]
- 149 Using data from NETINFO cells [for 0.2.1.x]
- 156 Tracking blocked ports on the client side [for 0.2.?]
- 158 Clients download consensus + microdescriptors
- 159 Exit Scanning
- 162 Publish the consensus in multiple flavors [for 0.2.2]
- 163 Detecting whether a connection comes from a client [for 0.2.2]
- 164 Reporting the status of server votes [for 0.2.2]
- 165 Easy migration for voting authority sets
- 168 Reduce default circuit window [for 0.2.2]
- 174 Optimistic Data for Tor: Server Side
- ACCEPTED:
- 110 Avoiding infinite length circuits [for 0.2.1.x] [in 0.2.1.3-alpha]
- 117 IPv6 exits [for 0.2.1.x]
- 118 Advertising multiple ORPorts at once [for 0.2.1.x]
- 140 Provide diffs between consensuses [for 0.2.2.x]
- 147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.1.x]
- 157 Make certificate downloads specific [for 0.2.1.x]
- 166 Including Network Statistics in Extra-Info Documents [for 0.2.2]
- 172 GETINFO controller option for circuit information
- 173 GETINFO Option Expansion
- META:
- 000 Index of Tor Proposals
- 001 The Tor Proposal Process
- 098 Proposals that should be written
- 099 Miscellaneous proposals
- FINISHED:
- 121 Hidden Service Authentication [in 0.2.1.x]
- 151 Improving Tor Path Selection
- 155 Four Improvements of Hidden Service Performance [in 0.2.1.x]
- 160 Authorities vote for bandwidth offsets in consensus [for 0.2.2.x]
- 161 Computing Bandwidth Adjustments [for 0.2.2.x]
- CLOSED:
- 101 Voting on the Tor Directory System [in 0.2.0.x]
- 102 Dropping "opt" from the directory format [in 0.2.0.x]
- 103 Splitting identity key from regularly used signing key [in 0.2.0.x]
- 104 Long and Short Router Descriptors [in 0.2.0.x]
- 105 Version negotiation for the Tor protocol [in 0.2.0.x]
- 106 Checking fewer things during TLS handshakes [in 0.2.0.x]
- 107 Uptime Sanity Checking [in 0.2.0.x]
- 108 Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
- 109 No more than one server per IP address [in 0.2.0.x]
- 111 Prioritizing local traffic over relayed traffic [in 0.2.0.x]
- 114 Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
- 119 New PROTOCOLINFO command for controllers [in 0.2.0.x]
- 122 Network status entries need a new Unnamed flag [in 0.2.0.x]
- 123 Naming authorities automatically create bindings [in 0.2.0.x]
- 125 Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
- 126 Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
- 129 Block Insecure Protocols by Default [in 0.2.0.x]
- 130 Version 2 Tor connection protocol [in 0.2.0.x]
- 135 Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
- 136 Mass authority migration with legacy keys [in 0.2.0.x]
- 137 Keep controllers informed as Tor bootstraps [in 0.2.1.x]
- 138 Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
- 139 Download consensus documents only when it will be trusted [in 0.2.1.x]
- 148 Stream end reasons from the client side should be uniform [in 0.2.1.9-alpha]
- 150 Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
- 152 Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
- 167 Vote on network parameters in consensus [in 0.2.2]
- SUPERSEDED:
- 112 Bring Back Pathlen Coin Weight
- 113 Simplifying directory authority administration
- 124 Blocking resistant TLS certificate usage
- 153 Automatic software update protocol
- 154 Automatic Software Update Protocol
- DEAD:
- 100 Tor Unreliable Datagram Extension Proposal
- 115 Two Hop Paths
- 116 Two hop paths from entry guards
- 120 Shutdown descriptors when Tor servers stop
- 128 Families of private bridges
- 142 Combine Introduction and Rendezvous Points
- REJECTED:
- 134 More robust consensus voting with diverse authority sets
|