Filename: 000-index.txt
Title: Index of Tor Proposals
Author: Nick Mathewson
Created: 26-Jan-2007
Status: Meta

Overview:

   This document provides an index to Tor proposals.

   This is an informational document.

   Everything in this document below the line of '=' signs is automatically
   generated by reindex.py; do not edit by hand.

============================================================
Proposals by number:

000  Index of Tor Proposals [META]
001  The Tor Proposal Process [META]
098  Proposals that should be written [META]
099  Miscellaneous proposals [META]
100  Tor Unreliable Datagram Extension Proposal [DEAD]
101  Voting on the Tor Directory System [CLOSED]
102  Dropping "opt" from the directory format [CLOSED]
103  Splitting identity key from regularly used signing key [CLOSED]
104  Long and Short Router Descriptors [CLOSED]
105  Version negotiation for the Tor protocol [CLOSED]
106  Checking fewer things during TLS handshakes [CLOSED]
107  Uptime Sanity Checking [CLOSED]
108  Base "Stable" Flag on Mean Time Between Failures [CLOSED]
109  No more than one server per IP address [CLOSED]
110  Avoiding infinite length circuits [CLOSED]
111  Prioritizing local traffic over relayed traffic [CLOSED]
112  Bring Back Pathlen Coin Weight [SUPERSEDED]
113  Simplifying directory authority administration [SUPERSEDED]
114  Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
115  Two Hop Paths [DEAD]
116  Two hop paths from entry guards [DEAD]
117  IPv6 exits [ACCEPTED]
118  Advertising multiple ORPorts at once [SUPERSEDED]
119  New PROTOCOLINFO command for controllers [CLOSED]
120  Shutdown descriptors when Tor servers stop [DEAD]
121  Hidden Service Authentication [FINISHED]
122  Network status entries need a new Unnamed flag [CLOSED]
123  Naming authorities automatically create bindings [CLOSED]
124  Blocking resistant TLS certificate usage [SUPERSEDED]
125  Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
126  Getting GeoIP data and publishing usage summaries [CLOSED]
127  Relaying dirport requests to Tor download site / website [DRAFT]
128  Families of private bridges [DEAD]
129  Block Insecure Protocols by Default [CLOSED]
130  Version 2 Tor connection protocol [CLOSED]
131  Help users to verify they are using Tor [NEEDS-REVISION]
132  A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
133  Incorporate Unreachable ORs into the Tor Network [DRAFT]
134  More robust consensus voting with diverse authority sets [REJECTED]
135  Simplify Configuration of Private Tor Networks [CLOSED]
136  Mass authority migration with legacy keys [CLOSED]
137  Keep controllers informed as Tor bootstraps [CLOSED]
138  Remove routers that are not Running from consensus documents [CLOSED]
139  Download consensus documents only when it will be trusted [CLOSED]
140  Provide diffs between consensuses [ACCEPTED]
141  Download server descriptors on demand [DRAFT]
142  Combine Introduction and Rendezvous Points [DEAD]
143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
144  Increase the diversity of circuits by detecting nodes belonging the same provider [DRAFT]
145  Separate "suitable as a guard" from "suitable as a new guard" [NEEDS-RESEARCH]
146  Add new flag to reflect long-term stability [NEEDS-RESEARCH]
147  Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
148  Stream end reasons from the client side should be uniform [CLOSED]
149  Using data from NETINFO cells [SUPERSEDED]
150  Exclude Exit Nodes from a circuit [CLOSED]
151  Improving Tor Path Selection [FINISHED]
152  Optionally allow exit from single-hop circuits [CLOSED]
153  Automatic software update protocol [SUPERSEDED]
154  Automatic Software Update Protocol [SUPERSEDED]
155  Four Improvements of Hidden Service Performance [FINISHED]
156  Tracking blocked ports on the client side [OPEN]
157  Make certificate downloads specific [ACCEPTED]
158  Clients download consensus + microdescriptors [FINISHED]
159  Exit Scanning [OPEN]
160  Authorities vote for bandwidth offsets in consensus [FINISHED]
161  Computing Bandwidth Adjustments [FINISHED]
162  Publish the consensus in multiple flavors [FINISHED]
163  Detecting whether a connection comes from a client [SUPERSEDED]
164  Reporting the status of server votes [OPEN]
165  Easy migration for voting authority sets [OPEN]
166  Including Network Statistics in Extra-Info Documents [CLOSED]
167  Vote on network parameters in consensus [CLOSED]
168  Reduce default circuit window [OPEN]
169  Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
170  Configuration options regarding circuit building [SUPERSEDED]
171  Separate streams across circuits by connection metadata [CLOSED]
172  GETINFO controller option for circuit information [ACCEPTED]
173  GETINFO Option Expansion [ACCEPTED]
174  Optimistic Data for Tor: Server Side [CLOSED]
175  Automatically promoting Tor clients to nodes [DRAFT]
176  Proposed version-3 link handshake for Tor [CLOSED]
177  Abstaining from votes on individual flags [OPEN]
178  Require majority of authorities to vote for consensus parameters [CLOSED]
179  TLS certificate and parameter normalization [CLOSED]
180  Pluggable transports for circumvention [OPEN]
181  Optimistic Data for Tor: Client Side [CLOSED]
182  Credit Bucket [DRAFT]
183  Refill Intervals [CLOSED]
184  Miscellaneous changes for a v3 Tor link protocol [CLOSED]
185  Directory caches without DirPort [OPEN]
186  Multiple addresses for one OR or bridge [DRAFT]
187  Reserve a cell type to allow client authorization [CLOSED]
188  Bridge Guards and other anti-enumeration defenses [OPEN]
189  AUTHORIZE and AUTHORIZED cells [OPEN]
190  Bridge Client Authorization Based on a Shared Secret [NEEDS-REVISION]
191  Bridge Detection Resistance against MITM-capable Adversaries [OPEN]
192  Automatically retrieve and store information about bridges [OPEN]
193  Safe cookie authentication for Tor controllers [CLOSED]
194  Mnemonic .onion URLs [OPEN]
195  TLS certificate normalization for Tor 0.2.4.x [DRAFT]
196  Extended ORPort and TransportControlPort [OPEN]
197  Message-based Inter-Controller IPC Channel [OPEN]
198  Restore semantics of TLS ClientHello [OPEN]
199  Integration of BridgeFinder and BridgeFinderHelper [OPEN]
200  Adding new, extensible CREATE, EXTEND, and related cells [OPEN]
201  Make bridges report statistics on daily v3 network status requests [OPEN]


Proposals by status:

 DRAFT:
   127  Relaying dirport requests to Tor download site / website
   132  A Tor Web Service For Verifying Correct Browser Configuration
   133  Incorporate Unreachable ORs into the Tor Network
   141  Download server descriptors on demand
   144  Increase the diversity of circuits by detecting nodes belonging the same provider
   175  Automatically promoting Tor clients to nodes
   182  Credit Bucket
   186  Multiple addresses for one OR or bridge
   195  TLS certificate normalization for Tor 0.2.4.x [for 0.2.4.x]
 NEEDS-REVISION:
   131  Help users to verify they are using Tor
   190  Bridge Client Authorization Based on a Shared Secret
 NEEDS-RESEARCH:
   145  Separate "suitable as a guard" from "suitable as a new guard"
   146  Add new flag to reflect long-term stability
 OPEN:
   143  Improvements of Distributed Storage for Tor Hidden Service Descriptors
   156  Tracking blocked ports on the client side
   159  Exit Scanning
   164  Reporting the status of server votes
   165  Easy migration for voting authority sets
   168  Reduce default circuit window
   177  Abstaining from votes on individual flags [for 0.2.3.x]
   180  Pluggable transports for circumvention [for 0.2.3.x]
   185  Directory caches without DirPort
   188  Bridge Guards and other anti-enumeration defenses
   189  AUTHORIZE and AUTHORIZED cells
   191  Bridge Detection Resistance against MITM-capable Adversaries
   192  Automatically retrieve and store information about bridges [for 0.2.[45].x]
   194  Mnemonic .onion URLs
   196  Extended ORPort and TransportControlPort [for 0.2.4.x]
   197  Message-based Inter-Controller IPC Channel [for 0.2.4.x]
   198  Restore semantics of TLS ClientHello
   199  Integration of BridgeFinder and BridgeFinderHelper [for 0.2.3.x+]
   200  Adding new, extensible CREATE, EXTEND, and related cells
   201  Make bridges report statistics on daily v3 network status requests [for 0.2.4.x]
 ACCEPTED:
   117  IPv6 exits [for 0.2.3.x]
   140  Provide diffs between consensuses
   147  Eliminate the need for v2 directories in generating v3 directories [for 0.2.3.x]
   157  Make certificate downloads specific [for 0.2.3.x]
   172  GETINFO controller option for circuit information [for 0.2.3.x]
   173  GETINFO Option Expansion [for 0.2.3.x]
 META:
   000  Index of Tor Proposals
   001  The Tor Proposal Process
   098  Proposals that should be written
   099  Miscellaneous proposals
 FINISHED:
   121  Hidden Service Authentication [in 0.2.1.x]
   151  Improving Tor Path Selection
   155  Four Improvements of Hidden Service Performance [in 0.2.1.x]
   158  Clients download consensus + microdescriptors [in 0.2.3.1-alpha]
   160  Authorities vote for bandwidth offsets in consensus [for 0.2.1.x]
   161  Computing Bandwidth Adjustments [for 0.2.1.x]
   162  Publish the consensus in multiple flavors [in 0.2.3.1-alpha]
 CLOSED:
   101  Voting on the Tor Directory System [in 0.2.0.x]
   102  Dropping "opt" from the directory format [in 0.2.0.x]
   103  Splitting identity key from regularly used signing key [in 0.2.0.x]
   104  Long and Short Router Descriptors [in 0.2.0.x]
   105  Version negotiation for the Tor protocol [in 0.2.0.x]
   106  Checking fewer things during TLS handshakes [in 0.2.0.x]
   107  Uptime Sanity Checking [in 0.2.0.x]
   108  Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
   109  No more than one server per IP address [in 0.2.0.x]
   110  Avoiding infinite length circuits [for 0.2.3.x] [in 0.2.1.3-alpha, 0.2.3.11-alpha]
   111  Prioritizing local traffic over relayed traffic [in 0.2.0.x]
   114  Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
   119  New PROTOCOLINFO command for controllers [in 0.2.0.x]
   122  Network status entries need a new Unnamed flag [in 0.2.0.x]
   123  Naming authorities automatically create bindings [in 0.2.0.x]
   125  Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
   126  Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
   129  Block Insecure Protocols by Default [in 0.2.0.x]
   130  Version 2 Tor connection protocol [in 0.2.0.x]
   135  Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
   136  Mass authority migration with legacy keys [in 0.2.0.x]
   137  Keep controllers informed as Tor bootstraps [in 0.2.1.x]
   138  Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
   139  Download consensus documents only when it will be trusted [in 0.2.1.x]
   148  Stream end reasons from the client side should be uniform [in 0.2.1.9-alpha]
   150  Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
   152  Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
   166  Including Network Statistics in Extra-Info Documents [for 0.2.2]
   167  Vote on network parameters in consensus [in 0.2.2]
   171  Separate streams across circuits by connection metadata [in 0.2.3.3-alpha]
   174  Optimistic Data for Tor: Server Side [in 0.2.3.1-alpha]
   176  Proposed version-3 link handshake for Tor [for 0.2.3]
   178  Require majority of authorities to vote for consensus parameters [in 0.2.3.9-alpha]
   179  TLS certificate and parameter normalization [for 0.2.3.x]
   181  Optimistic Data for Tor: Client Side [in 0.2.3.3-alpha]
   183  Refill Intervals [in 0.2.3.5-alpha]
   184  Miscellaneous changes for a v3 Tor link protocol [for 0.2.3.x]
   187  Reserve a cell type to allow client authorization [for 0.2.3.x]
   193  Safe cookie authentication for Tor controllers
 SUPERSEDED:
   112  Bring Back Pathlen Coin Weight
   113  Simplifying directory authority administration
   118  Advertising multiple ORPorts at once
   124  Blocking resistant TLS certificate usage
   149  Using data from NETINFO cells
   153  Automatic software update protocol
   154  Automatic Software Update Protocol
   163  Detecting whether a connection comes from a client
   169  Eliminate TLS renegotiation for the Tor connection handshake
   170  Configuration options regarding circuit building
 DEAD:
   100  Tor Unreliable Datagram Extension Proposal
   115  Two Hop Paths
   116  Two hop paths from entry guards
   120  Shutdown descriptors when Tor servers stop
   128  Families of private bridges
   142  Combine Introduction and Rendezvous Points
 REJECTED:
   134  More robust consensus voting with diverse authority sets
