mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-14 07:03:44 +01:00
189 lines
9.3 KiB
Plaintext
189 lines
9.3 KiB
Plaintext
Filename: 000-index.txt
|
|
Title: Index of Tor Proposals
|
|
Author: Nick Mathewson
|
|
Created: 26-Jan-2007
|
|
Status: Meta
|
|
|
|
Overview:
|
|
|
|
This document provides an index to Tor proposals.
|
|
|
|
This is an informational document.
|
|
|
|
Everything in this document below the line of '=' signs is automatically
|
|
generated by reindex.py; do not edit by hand.
|
|
|
|
============================================================
|
|
Proposals by number:
|
|
|
|
000 Index of Tor Proposals [META]
|
|
001 The Tor Proposal Process [META]
|
|
098 Proposals that should be written [META]
|
|
099 Miscellaneous proposals [META]
|
|
100 Tor Unreliable Datagram Extension Proposal [DEAD]
|
|
101 Voting on the Tor Directory System [CLOSED]
|
|
102 Dropping "opt" from the directory format [CLOSED]
|
|
103 Splitting identity key from regularly used signing key [CLOSED]
|
|
104 Long and Short Router Descriptors [CLOSED]
|
|
105 Version negotiation for the Tor protocol [CLOSED]
|
|
106 Checking fewer things during TLS handshakes [CLOSED]
|
|
107 Uptime Sanity Checking [CLOSED]
|
|
108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
|
|
109 No more than one server per IP address [CLOSED]
|
|
110 Avoiding infinite length circuits [ACCEPTED]
|
|
111 Prioritizing local traffic over relayed traffic [CLOSED]
|
|
112 Bring Back Pathlen Coin Weight [SUPERSEDED]
|
|
113 Simplifying directory authority administration [SUPERSEDED]
|
|
114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
|
|
115 Two Hop Paths [DEAD]
|
|
116 Two hop paths from entry guards [DEAD]
|
|
117 IPv6 exits [ACCEPTED]
|
|
118 Advertising multiple ORPorts at once [ACCEPTED]
|
|
119 New PROTOCOLINFO command for controllers [CLOSED]
|
|
120 Shutdown descriptors when Tor servers stop [DEAD]
|
|
121 Hidden Service Authentication [FINISHED]
|
|
122 Network status entries need a new Unnamed flag [CLOSED]
|
|
123 Naming authorities automatically create bindings [CLOSED]
|
|
124 Blocking resistant TLS certificate usage [SUPERSEDED]
|
|
125 Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
|
|
126 Getting GeoIP data and publishing usage summaries [CLOSED]
|
|
127 Relaying dirport requests to Tor download site / website [DRAFT]
|
|
128 Families of private bridges [DEAD]
|
|
129 Block Insecure Protocols by Default [CLOSED]
|
|
130 Version 2 Tor connection protocol [CLOSED]
|
|
131 Help users to verify they are using Tor [NEEDS-REVISION]
|
|
132 A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
|
|
133 Incorporate Unreachable ORs into the Tor Network [DRAFT]
|
|
134 More robust consensus voting with diverse authority sets [REJECTED]
|
|
135 Simplify Configuration of Private Tor Networks [CLOSED]
|
|
136 Mass authority migration with legacy keys [CLOSED]
|
|
137 Keep controllers informed as Tor bootstraps [CLOSED]
|
|
138 Remove routers that are not Running from consensus documents [CLOSED]
|
|
139 Download consensus documents only when it will be trusted [CLOSED]
|
|
140 Provide diffs between consensuses [ACCEPTED]
|
|
141 Download server descriptors on demand [DRAFT]
|
|
142 Combine Introduction and Rendezvous Points [DEAD]
|
|
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
|
|
144 Increase the diversity of circuits by detecting nodes belonging the same provider [DRAFT]
|
|
145 Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
|
|
146 Add new flag to reflect long-term stability [OPEN]
|
|
147 Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
|
|
148 Stream end reasons from the client side should be uniform [CLOSED]
|
|
149 Using data from NETINFO cells [OPEN]
|
|
150 Exclude Exit Nodes from a circuit [CLOSED]
|
|
151 Improving Tor Path Selection [FINISHED]
|
|
152 Optionally allow exit from single-hop circuits [CLOSED]
|
|
153 Automatic software update protocol [SUPERSEDED]
|
|
154 Automatic Software Update Protocol [SUPERSEDED]
|
|
155 Four Improvements of Hidden Service Performance [FINISHED]
|
|
156 Tracking blocked ports on the client side [OPEN]
|
|
157 Make certificate downloads specific [ACCEPTED]
|
|
158 Clients download consensus + microdescriptors [OPEN]
|
|
159 Exit Scanning [OPEN]
|
|
160 Authorities vote for bandwidth offsets in consensus [FINISHED]
|
|
161 Computing Bandwidth Adjustments [FINISHED]
|
|
162 Publish the consensus in multiple flavors [OPEN]
|
|
163 Detecting whether a connection comes from a client [OPEN]
|
|
164 Reporting the status of server votes [OPEN]
|
|
165 Easy migration for voting authority sets [OPEN]
|
|
166 Including Network Statistics in Extra-Info Documents [ACCEPTED]
|
|
167 Vote on network parameters in consensus [CLOSED]
|
|
168 Reduce default circuit window [OPEN]
|
|
169 Eliminate TLS renegotiation for the Tor connection handshake [DRAFT]
|
|
170 Configuration options regarding circuit building [DRAFT]
|
|
172 GETINFO controller option for circuit information [ACCEPTED]
|
|
173 GETINFO Option Expansion [ACCEPTED]
|
|
174 Optimistic Data for Tor: Server Side [OPEN]
|
|
|
|
|
|
Proposals by status:
|
|
|
|
DRAFT:
|
|
127 Relaying dirport requests to Tor download site / website
|
|
132 A Tor Web Service For Verifying Correct Browser Configuration
|
|
133 Incorporate Unreachable ORs into the Tor Network
|
|
141 Download server descriptors on demand
|
|
144 Increase the diversity of circuits by detecting nodes belonging the same provider
|
|
169 Eliminate TLS renegotiation for the Tor connection handshake [for 0.2.2]
|
|
170 Configuration options regarding circuit building
|
|
NEEDS-REVISION:
|
|
131 Help users to verify they are using Tor
|
|
OPEN:
|
|
143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [for 0.2.1.x]
|
|
145 Separate "suitable as a guard" from "suitable as a new guard" [for 0.2.1.x]
|
|
146 Add new flag to reflect long-term stability [for 0.2.1.x]
|
|
149 Using data from NETINFO cells [for 0.2.1.x]
|
|
156 Tracking blocked ports on the client side [for 0.2.?]
|
|
158 Clients download consensus + microdescriptors
|
|
159 Exit Scanning
|
|
162 Publish the consensus in multiple flavors [for 0.2.2]
|
|
163 Detecting whether a connection comes from a client [for 0.2.2]
|
|
164 Reporting the status of server votes [for 0.2.2]
|
|
165 Easy migration for voting authority sets
|
|
168 Reduce default circuit window [for 0.2.2]
|
|
174 Optimistic Data for Tor: Server Side
|
|
ACCEPTED:
|
|
110 Avoiding infinite length circuits [for 0.2.1.x] [in 0.2.1.3-alpha]
|
|
117 IPv6 exits [for 0.2.1.x]
|
|
118 Advertising multiple ORPorts at once [for 0.2.1.x]
|
|
140 Provide diffs between consensuses [for 0.2.2.x]
|
|
147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.1.x]
|
|
157 Make certificate downloads specific [for 0.2.1.x]
|
|
166 Including Network Statistics in Extra-Info Documents [for 0.2.2]
|
|
172 GETINFO controller option for circuit information
|
|
173 GETINFO Option Expansion
|
|
META:
|
|
000 Index of Tor Proposals
|
|
001 The Tor Proposal Process
|
|
098 Proposals that should be written
|
|
099 Miscellaneous proposals
|
|
FINISHED:
|
|
121 Hidden Service Authentication [in 0.2.1.x]
|
|
151 Improving Tor Path Selection
|
|
155 Four Improvements of Hidden Service Performance [in 0.2.1.x]
|
|
160 Authorities vote for bandwidth offsets in consensus [for 0.2.2.x]
|
|
161 Computing Bandwidth Adjustments [for 0.2.2.x]
|
|
CLOSED:
|
|
101 Voting on the Tor Directory System [in 0.2.0.x]
|
|
102 Dropping "opt" from the directory format [in 0.2.0.x]
|
|
103 Splitting identity key from regularly used signing key [in 0.2.0.x]
|
|
104 Long and Short Router Descriptors [in 0.2.0.x]
|
|
105 Version negotiation for the Tor protocol [in 0.2.0.x]
|
|
106 Checking fewer things during TLS handshakes [in 0.2.0.x]
|
|
107 Uptime Sanity Checking [in 0.2.0.x]
|
|
108 Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
|
|
109 No more than one server per IP address [in 0.2.0.x]
|
|
111 Prioritizing local traffic over relayed traffic [in 0.2.0.x]
|
|
114 Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
|
|
119 New PROTOCOLINFO command for controllers [in 0.2.0.x]
|
|
122 Network status entries need a new Unnamed flag [in 0.2.0.x]
|
|
123 Naming authorities automatically create bindings [in 0.2.0.x]
|
|
125 Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
|
|
126 Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
|
|
129 Block Insecure Protocols by Default [in 0.2.0.x]
|
|
130 Version 2 Tor connection protocol [in 0.2.0.x]
|
|
135 Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
|
|
136 Mass authority migration with legacy keys [in 0.2.0.x]
|
|
137 Keep controllers informed as Tor bootstraps [in 0.2.1.x]
|
|
138 Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
|
|
139 Download consensus documents only when it will be trusted [in 0.2.1.x]
|
|
148 Stream end reasons from the client side should be uniform [in 0.2.1.9-alpha]
|
|
150 Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
|
|
152 Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
|
|
167 Vote on network parameters in consensus [in 0.2.2]
|
|
SUPERSEDED:
|
|
112 Bring Back Pathlen Coin Weight
|
|
113 Simplifying directory authority administration
|
|
124 Blocking resistant TLS certificate usage
|
|
153 Automatic software update protocol
|
|
154 Automatic Software Update Protocol
|
|
DEAD:
|
|
100 Tor Unreliable Datagram Extension Proposal
|
|
115 Two Hop Paths
|
|
116 Two hop paths from entry guards
|
|
120 Shutdown descriptors when Tor servers stop
|
|
128 Families of private bridges
|
|
142 Combine Introduction and Rendezvous Points
|
|
REJECTED:
|
|
134 More robust consensus voting with diverse authority sets
|